<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cannot ping external IP from inside firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cannot-ping-external-ip-from-inside-firewall/m-p/1646331#M564866</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are not allowed to ping from the inside network the external interface of the ASA, you should be able to ping any other external IP but not the IP of another interface of the ASA, only the directly attached interface is able to respond to ping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is a limitation on the ASA&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 28 Feb 2011 19:13:38 GMT</pubDate>
    <dc:creator>PAUL GILBERT ARIAS</dc:creator>
    <dc:date>2011-02-28T19:13:38Z</dc:date>
    <item>
      <title>Cannot ping external IP from inside firewall</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-external-ip-from-inside-firewall/m-p/1646329#M564864</link>
      <description>&lt;P&gt;I am trying to ping 99.23.119.78 from inside our firewall and am receiving a request timeout. I receive a response from outside the firewall though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone help?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my current config:&lt;/P&gt;&lt;P&gt;Result of the command: "show running-config"&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(1) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password qVQaNBP31RadYDLM encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif ATT&lt;BR /&gt; security-level 0&lt;BR /&gt; pppoe client vpdn group ATT&lt;BR /&gt; ip address pppoe setroute &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt; port-object eq ftp&lt;BR /&gt; port-object eq ftp-data&lt;BR /&gt; port-object eq www&lt;BR /&gt;access-list ATT_access_in remark Linkstation Access&lt;BR /&gt;access-list ATT_access_in extended permit tcp any host 99.23.119.78 object-group DM_INLINE_TCP_1 &lt;BR /&gt;access-list ATT_access_in remark Linkstation FTP&lt;BR /&gt;access-list ATT_access_in extended permit tcp any interface ATT eq ftp &lt;BR /&gt;access-list ATT_access_in remark Linkstation FTP-Data&lt;BR /&gt;access-list ATT_access_in extended permit tcp any interface ATT eq ftp-data &lt;BR /&gt;access-list ATT_access_in remark Linkstation FTP HTTP Customer&lt;BR /&gt;access-list ATT_access_in extended permit tcp any interface ATT eq www &lt;BR /&gt;access-list ATT_access_in remark Linkstation Remote Admin&lt;BR /&gt;access-list ATT_access_in extended permit tcp any host 99.23.119.73 eq www &lt;BR /&gt;access-list ATT_access_in remark RealVNC&lt;BR /&gt;access-list ATT_access_in extended permit tcp any interface ATT eq 5510 &lt;BR /&gt;access-list ATT_access_in extended permit tcp any host 99.23.119.78 eq 29000 &lt;BR /&gt;access-list ATT_access_in extended permit tcp any host 99.23.119.78 eq 39000 &lt;BR /&gt;access-list ATT_access_in extended permit tcp any host 192.168.1.4 eq 5510 &lt;BR /&gt;access-list ATT_access_in remark Linkstation Access&lt;BR /&gt;access-list ATT_access_in remark Linkstation FTP&lt;BR /&gt;access-list ATT_access_in remark Linkstation FTP-Data&lt;BR /&gt;access-list ATT_access_in remark Linkstation FTP HTTP Customer&lt;BR /&gt;access-list ATT_access_in remark Linkstation Remote Admin&lt;BR /&gt;access-list ATT_access_in remark RealVNC&lt;BR /&gt;access-list ATT_access_in remark Linkstation Access&lt;BR /&gt;access-list ATT_access_in remark Linkstation FTP&lt;BR /&gt;access-list ATT_access_in remark Linkstation FTP-Data&lt;BR /&gt;access-list ATT_access_in remark Linkstation FTP HTTP Customer&lt;BR /&gt;access-list ATT_access_in remark Linkstation Remote Admin&lt;BR /&gt;access-list ATT_access_in remark RealVNC&lt;BR /&gt;access-list ATT_access_in extended permit icmp any any echo &lt;BR /&gt;access-list ATT_access_in extended permit icmp any any echo-reply &lt;BR /&gt;access-list extended extended permit tcp any host 192.168.1.3 eq ftp &lt;BR /&gt;access-list extended extended permit tcp any host 192.168.1.3 eq ftp-data &lt;BR /&gt;access-list extended extended permit tcp any host 192.168.1.3 eq www &lt;BR /&gt;access-list extended extended permit tcp any host 99.23.119.73 eq 5900 &lt;BR /&gt;access-list extended extended permit tcp any host 99.23.119.73 eq 5510 &lt;BR /&gt;access-list extended extended permit tcp any host 99.23.119.73 eq 5511 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu ATT 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (ATT) 1 interface&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,ATT) tcp 99.23.119.73 www 192.168.1.3 www netmask 255.255.255.255 &lt;BR /&gt;static (inside,ATT) tcp interface 29000 192.168.1.4 29000 netmask 255.255.255.255 &lt;BR /&gt;static (inside,ATT) tcp interface 39000 192.168.1.4 39000 netmask 255.255.255.255 &lt;BR /&gt;static (inside,ATT) tcp interface 5510 192.168.1.4 5510 netmask 255.255.255.255 &lt;BR /&gt;static (inside,ATT) tcp interface 5511 192.168.1.4 5511 netmask 255.255.255.255 &lt;BR /&gt;static (inside,ATT) tcp interface 3389 192.168.1.4 3389 netmask 255.255.255.255 &lt;BR /&gt;static (inside,ATT) tcp interface www 192.168.1.3 9000 netmask 255.255.255.255&amp;nbsp; dns &lt;BR /&gt;access-group ATT_access_in in interface ATT&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 ATT&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 ATT&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;vpdn group ATT request dialout pppoe&lt;BR /&gt;vpdn group ATT localname &lt;A href="mailto:eossolutions@static.att.net" target="_blank"&gt;eossolutions@static.att.net&lt;/A&gt;&lt;BR /&gt;vpdn group ATT ppp authentication pap&lt;BR /&gt;vpdn username &lt;A href="mailto:eossolutions@static.att.net" target="_blank"&gt;eossolutions@static.att.net&lt;/A&gt; password ********* store-local&lt;BR /&gt;dhcpd auto_config ATT&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.5-192.168.1.132 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:bd6ede5c5400c2d1472282d3834f49f1&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:58:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-external-ip-from-inside-firewall/m-p/1646329#M564864</guid>
      <dc:creator>jill.kane</dc:creator>
      <dc:date>2019-03-11T19:58:38Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot ping external IP from inside firewall</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-external-ip-from-inside-firewall/m-p/1646330#M564865</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml#asatrace"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml#asatrace&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Feb 2011 19:10:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-external-ip-from-inside-firewall/m-p/1646330#M564865</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2011-02-28T19:10:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot ping external IP from inside firewall</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-external-ip-from-inside-firewall/m-p/1646331#M564866</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are not allowed to ping from the inside network the external interface of the ASA, you should be able to ping any other external IP but not the IP of another interface of the ASA, only the directly attached interface is able to respond to ping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is a limitation on the ASA&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Feb 2011 19:13:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-external-ip-from-inside-firewall/m-p/1646331#M564866</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-28T19:13:38Z</dc:date>
    </item>
  </channel>
</rss>

