<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic FW log clarifications in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fw-log-clarifications/m-p/1517497#M588955</link>
    <description>&lt;P&gt;Hi all Expert,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Can someone help me to understand the log output of my ASA.&amp;nbsp; First let me try to explain the dilemma. I am trying to reach the ASA interface in another DMZ. Let's say that I am in the inside interface and try to reach DMZ100(ping from inside 10.10.10.10 to DMZ100 AT 10.100.1.1). There is what the ASA shows and what I am trying to understand:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. I have icmp enable in the default inspection rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6 Nov 25 2010 10:20:56 302021 10.10.10.10 1 10.100.1.1 0 Teardown ICMP connection for faddr 10.10.10.10/1 gaddr 10.100.1.1/0 laddr 10.100.1.1/0&lt;/P&gt;&lt;P&gt;And below is the explanation given by the ASA when I hover my mouse over the output&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt; ICMP connection is removed in the fast path when statefull ICMP packet is enabled using ICMP INSPECT COMMAND&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt;ICMP is enable under inspect rule&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. icmp is disable in the inspection rule&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class inspection_default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; no inspect icmp&lt;/P&gt;&lt;P&gt;6 Nov 25 2010 10:27:12 302020 10.10.10.10 1 10.100.1.1 0 Built inbound ICMP connection for faddr 10.10.10.10/1 gaddr 10.100.1.1/0 laddr 10.100.1.1/0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG style="text-decoration: underline; "&gt;ICMP session is established in the fast-path when statefull ICMP packet is enabled using ICMP inspection command&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking for an explanation for the statements in bold and underlign and both cases the host from inside keep sending request timed out. Ideas and comments to resolved the request time out to reply will be greatly appreciate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jean Paul&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 19:14:39 GMT</pubDate>
    <dc:creator>Jean Paul Enerst</dc:creator>
    <dc:date>2019-03-11T19:14:39Z</dc:date>
    <item>
      <title>FW log clarifications</title>
      <link>https://community.cisco.com/t5/network-security/fw-log-clarifications/m-p/1517497#M588955</link>
      <description>&lt;P&gt;Hi all Expert,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Can someone help me to understand the log output of my ASA.&amp;nbsp; First let me try to explain the dilemma. I am trying to reach the ASA interface in another DMZ. Let's say that I am in the inside interface and try to reach DMZ100(ping from inside 10.10.10.10 to DMZ100 AT 10.100.1.1). There is what the ASA shows and what I am trying to understand:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. I have icmp enable in the default inspection rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6 Nov 25 2010 10:20:56 302021 10.10.10.10 1 10.100.1.1 0 Teardown ICMP connection for faddr 10.10.10.10/1 gaddr 10.100.1.1/0 laddr 10.100.1.1/0&lt;/P&gt;&lt;P&gt;And below is the explanation given by the ASA when I hover my mouse over the output&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt; ICMP connection is removed in the fast path when statefull ICMP packet is enabled using ICMP INSPECT COMMAND&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt;ICMP is enable under inspect rule&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. icmp is disable in the inspection rule&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class inspection_default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; no inspect icmp&lt;/P&gt;&lt;P&gt;6 Nov 25 2010 10:27:12 302020 10.10.10.10 1 10.100.1.1 0 Built inbound ICMP connection for faddr 10.10.10.10/1 gaddr 10.100.1.1/0 laddr 10.100.1.1/0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG style="text-decoration: underline; "&gt;ICMP session is established in the fast-path when statefull ICMP packet is enabled using ICMP inspection command&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking for an explanation for the statements in bold and underlign and both cases the host from inside keep sending request timed out. Ideas and comments to resolved the request time out to reply will be greatly appreciate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jean Paul&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:14:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fw-log-clarifications/m-p/1517497#M588955</guid>
      <dc:creator>Jean Paul Enerst</dc:creator>
      <dc:date>2019-03-11T19:14:39Z</dc:date>
    </item>
    <item>
      <title>Re: FW log clarifications</title>
      <link>https://community.cisco.com/t5/network-security/fw-log-clarifications/m-p/1517498#M588956</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ASA does not support that. You can't ping the cross interface (ie: if you are connected to the inside interface of the ASA, you can't ping the DMZ interface of the ASA). This is not supported by design.&lt;/P&gt;&lt;P&gt;If you are connected to the ASA inside interface, you can only ping the ASA inside interface, and to ping the DMZ interface, you would need to be connected from the DMZ interface of the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ICMP inspection is for ICMP traffic through the ASA, ie: a host from inside network tried to ping a host at dmz network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Nov 2010 22:32:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fw-log-clarifications/m-p/1517498#M588956</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-11-25T22:32:48Z</dc:date>
    </item>
  </channel>
</rss>

