<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Ping and NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ping-and-nat/m-p/1563984#M579857</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;do some nat exemption for echo-replies to your server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 24 Nov 2010 10:58:28 GMT</pubDate>
    <dc:creator>cadet alain</dc:creator>
    <dc:date>2010-11-24T10:58:28Z</dc:date>
    <item>
      <title>Ping and NAT</title>
      <link>https://community.cisco.com/t5/network-security/ping-and-nat/m-p/1563981#M579854</link>
      <description>&lt;P&gt;Hi Folks,&lt;/P&gt;&lt;P&gt;I am having issue with pinging from one server on inside (Security level 100) to other subinterface (Security level 60). Server which is pinging is 10.74.20.56 and it is pinging to destination 10.128.4.33. and this 10.128.4.33 is natted to 192.168.14.131 (Destination NATing).&lt;/P&gt;&lt;P&gt;I have allowed icmp(1), snmp,snmp-trap,syslog towards 10.74.20.56.&lt;/P&gt;&lt;P&gt;Here is some of the config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service SOLARWINDS_ACCESS&lt;BR /&gt; description ech&lt;BR /&gt; service-object icmp&lt;BR /&gt; service-object udp eq snmp&lt;BR /&gt; service-object udp eq snmptrap&lt;BR /&gt; service-object udp eq syslog&lt;/P&gt;&lt;P&gt;access-list Inside_access_in remark ***Allow All Traffic from Inside ***&lt;BR /&gt;access-list Inside_access_in extended permit ip any any&lt;BR /&gt;access-list Inside_access_in remark *** TEST ACE ***&lt;BR /&gt;access-list Inside_access_in extended deny ip any any&lt;BR /&gt;access-list TUNN_INT_access_in remark *** Allow access to Solarwinds ***&lt;BR /&gt;access-list TUNN_INT_access_in extended permit object-group SOLARWINDS_ACCESS 10.128.3.0 255.255.255.0 host SOLARWINDS&lt;BR /&gt;access-list TUNN_INT_access_in remark *** Allow all traffic***&lt;BR /&gt;access-list TUNN_INT_access_in extended permit ip any host SOLARWINDS&lt;BR /&gt;access-list UPS_INT_access_in remark *** Allow PING to Solarwinds&amp;nbsp; ****&lt;BR /&gt;access-list UPS_INT_access_in extended permit icmp 192.168.14.0 255.255.255.0 host SOLARWINDS object-group ICMP-TRAFF&lt;BR /&gt;access-list UPS_INT_access_in remark *** Allow All Traffic ***&lt;BR /&gt;access-list UPS_INT_access_in extended permit object-group SOLARWINDS_ACCESS 192.168.14.0 255.255.255.0 host SOLARWINDS&lt;BR /&gt;access-list MGT_iDIRECT_access_in remark *** Allow&amp;nbsp; access to Solarwinds ***&lt;BR /&gt;access-list MGT_iDIRECT_access_in extended permit object-group SOLARWINDS_ACCESS 10.128.4.0 255.255.255.0 host SOLARWINDS&lt;BR /&gt;access-list MGT_iDIRECT_access_in remark *** Allow all access to Solarwinds ***&lt;BR /&gt;access-list MGT_iDIRECT_access_in extended permit ip 10.128.4.0 255.255.255.0 host SOLARWINDS inactive&lt;BR /&gt;access-list MGT_iDIRECT_access_in remark *** Deny access to all unknown traffic ***&lt;BR /&gt;access-list MGT_iDIRECT_access_in extended permit ip any any&lt;BR /&gt;access-list PERMIT_ICMP extended permit icmp any object-group NMS-SRV object-group ICMP-TRAFF log&lt;BR /&gt;access-list Solarwinds_NMS1 extended permit ip host NMS1 host SOLARWINDS&lt;BR /&gt;access-list Solarwinds_NMS2 extended permit ip host NMS2 host SOLARWINDS&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any Inside&lt;BR /&gt;no asdm history enable&lt;BR /&gt;static (UPS_INT,Inside) 10.128.4.34&amp;nbsp; access-list Solarwinds_NMS2&lt;BR /&gt;static (UPS_INT,Inside) 10.128.4.33&amp;nbsp; access-list Solarwinds_NMS1&lt;BR /&gt;access-group MGT_iDIRECT_access_in in interface MGT_iDIRECT&lt;BR /&gt;access-group UPS_INT_access_in in interface UPS_INT&lt;BR /&gt;access-group TUNN_INT_access_in in interface TUNN_INT&lt;BR /&gt;access-group Inside_access_in in interface Inside&lt;/P&gt;&lt;P&gt;As far as documentation, i should be able to ping it as i am pining from higer to lower level and return traffic is allowed&lt;/P&gt;&lt;P&gt;Please suggest&lt;/P&gt;&lt;P&gt;&lt;BR /&gt; &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:12:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-and-nat/m-p/1563981#M579854</guid>
      <dc:creator>thundercisco</dc:creator>
      <dc:date>2019-03-11T19:12:35Z</dc:date>
    </item>
    <item>
      <title>Re: Ping and NAT</title>
      <link>https://community.cisco.com/t5/network-security/ping-and-nat/m-p/1563982#M579855</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When traffic comes from a higher security interface to a lower security interface, the replies are allowed for TCP/UDP traffic.&lt;/P&gt;&lt;P&gt;In case of ICMP, it has to be either allowed by an ACL or inspected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check to make sure that the ACL applied to the lower security interface permits the ICMP echo-replies or that ICMP is being inspected by the service-policy to allow the return packets back.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Nov 2010 15:31:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-and-nat/m-p/1563982#M579855</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-11-22T15:31:19Z</dc:date>
    </item>
    <item>
      <title>Re: Ping and NAT</title>
      <link>https://community.cisco.com/t5/network-security/ping-and-nat/m-p/1563983#M579856</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Thnx for response, but problem is that when state inpection is enable it will add original address in statetable and return traffic will not match this state entry and will be denied. e.g&lt;/P&gt;&lt;P&gt;lets say ping source is 10.47.20.56 and destination is 10.128.4.33 and when packet hit interface , entry will be made to state table. and then destination address will be natted to 192.168.14.131, because i am having destination nat enable,. When packet returns back then source will be 192.168.14.131 and destination will be 10.47.20.56 and when this entry will not match to state entry it will be denied&lt;/P&gt;&lt;P&gt;Please suggest&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Nov 2010 08:01:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-and-nat/m-p/1563983#M579856</guid>
      <dc:creator>thundercisco</dc:creator>
      <dc:date>2010-11-24T08:01:17Z</dc:date>
    </item>
    <item>
      <title>Re: Ping and NAT</title>
      <link>https://community.cisco.com/t5/network-security/ping-and-nat/m-p/1563984#M579857</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;do some nat exemption for echo-replies to your server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Nov 2010 10:58:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-and-nat/m-p/1563984#M579857</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2010-11-24T10:58:28Z</dc:date>
    </item>
    <item>
      <title>Re: Ping and NAT</title>
      <link>https://community.cisco.com/t5/network-security/ping-and-nat/m-p/1563985#M579858</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Please elaborate.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Nov 2010 11:30:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-and-nat/m-p/1563985#M579858</guid>
      <dc:creator>thundercisco</dc:creator>
      <dc:date>2010-11-24T11:30:09Z</dc:date>
    </item>
    <item>
      <title>Re: Ping and NAT</title>
      <link>https://community.cisco.com/t5/network-security/ping-and-nat/m-p/1563986#M579859</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;PRE&gt;nat (inside) 0 access-list no_nat : nat 0 is nat exemption and the ACL tells&lt;BR /&gt; which traffic to exempt from nat.&lt;BR /&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Nov 2010 14:44:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-and-nat/m-p/1563986#M579859</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2010-11-24T14:44:00Z</dc:date>
    </item>
    <item>
      <title>Re: Ping and NAT</title>
      <link>https://community.cisco.com/t5/network-security/ping-and-nat/m-p/1563987#M579860</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;But lets say if issue nat (0) for traffic coming from inside then i&lt;/P&gt;&lt;P&gt;will no be able to rach my servers, as servers real ip address is 192.168.14.131 and this address not reachable from inside.&lt;/P&gt;&lt;P&gt;So i will have to NAT this is the reason i did destination nat. Source 10.47.20.56 dest 10.128.4.33 and when packet arrives this way then destination will be NATed to 192.168.14.131. It will reach the destination i could see it capture, but on the way back they are dropped. I&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Nov 2010 14:49:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-and-nat/m-p/1563987#M579860</guid>
      <dc:creator>thundercisco</dc:creator>
      <dc:date>2010-11-24T14:49:39Z</dc:date>
    </item>
    <item>
      <title>Re: Ping and NAT</title>
      <link>https://community.cisco.com/t5/network-security/ping-and-nat/m-p/1563988#M579861</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Problem is fixed, i found that packet coming back was&amp;nbsp; coming on different interface than orignating. so ifixed routing and problem solved&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Nov 2010 18:41:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-and-nat/m-p/1563988#M579861</guid>
      <dc:creator>thundercisco</dc:creator>
      <dc:date>2010-11-26T18:41:01Z</dc:date>
    </item>
  </channel>
</rss>

