<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: icmp list in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/icmp-list/m-p/1505279#M599343</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ICMP traffic to the firewall is not controlled using access-lists. Instead you will have to use the "icmp" command details of which can be found below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/i1.html#wp1685750"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/i1.html#wp1685750&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example, if you would like to allow the subnet 192.168.100.0/24 to ping the "inside" interface of the firewall, the command would be&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;icmp permit 192.168.100.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that clears things out!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 04 Nov 2010 03:14:21 GMT</pubDate>
    <dc:creator>praprama</dc:creator>
    <dc:date>2010-11-04T03:14:21Z</dc:date>
    <item>
      <title>icmp list</title>
      <link>https://community.cisco.com/t5/network-security/icmp-list/m-p/1505276#M599340</link>
      <description>&lt;P&gt;i have an acl which is :&lt;/P&gt;&lt;P&gt;access-list local_inside extended permit icmp 192.168.100.0 255.255.255.0 any log alerts interval 400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. if it says only icmp protocol to any, does it cover icmp echo &amp;amp; echo-reply both?&lt;/P&gt;&lt;P&gt;2. does interval 400 indicate a period of 400 secs after which the next hit for the same list will be shown. existing flow using the present session till the time interval?&lt;/P&gt;&lt;P&gt;3. since destination is any here, will it register icmp from source to interface ip of the firewall itself, if ping be tried to those interfaces or will it only have flow through the firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TIA.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:03:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-list/m-p/1505276#M599340</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2019-03-11T19:03:54Z</dc:date>
    </item>
    <item>
      <title>Re: icmp list</title>
      <link>https://community.cisco.com/t5/network-security/icmp-list/m-p/1505277#M599341</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. it covers both icmp echo and reply.&lt;/P&gt;&lt;P&gt;2.interval specifies the log interval at which to generate system log message 106100. Valid values are from 1 to 600 seconds. The default is 300.&lt;/P&gt;&lt;P&gt;3. Access-list will register the the pings which flow through the firewall and not to the interface of the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope the above answers your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Rahul&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Nov 2010 11:41:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-list/m-p/1505277#M599341</guid>
      <dc:creator>rmavila</dc:creator>
      <dc:date>2010-11-03T11:41:37Z</dc:date>
    </item>
    <item>
      <title>Re: icmp list</title>
      <link>https://community.cisco.com/t5/network-security/icmp-list/m-p/1505278#M599342</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the answers. A small bit here, since the acl says any destination, shouldnt icmp to fw interface also count under those.&lt;/P&gt;&lt;P&gt;If this is not it, where would icmp from same source subnet to fw interface be accounted for.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TIA&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Nov 2010 00:27:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-list/m-p/1505278#M599342</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2010-11-04T00:27:05Z</dc:date>
    </item>
    <item>
      <title>Re: icmp list</title>
      <link>https://community.cisco.com/t5/network-security/icmp-list/m-p/1505279#M599343</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ICMP traffic to the firewall is not controlled using access-lists. Instead you will have to use the "icmp" command details of which can be found below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/i1.html#wp1685750"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/i1.html#wp1685750&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example, if you would like to allow the subnet 192.168.100.0/24 to ping the "inside" interface of the firewall, the command would be&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;icmp permit 192.168.100.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that clears things out!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Nov 2010 03:14:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-list/m-p/1505279#M599343</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-11-04T03:14:21Z</dc:date>
    </item>
  </channel>
</rss>

