<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Issue w/ allowing ping through PIX Firewall 515E - No NAT needed in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504981#M609885</link>
    <description>&lt;P&gt;&lt;SPAN class="postbody"&gt;&lt;SPAN style="color: orange; "&gt;Hello, &lt;BR /&gt; &lt;BR /&gt; I have a Cisco PIX firewall 515E version 6.3 connected on one interface&amp;nbsp; (eth1) to a linux PC (200.0.10.5 in subnet 200.0.10.0/24) and on the&amp;nbsp; other (eth0) to a SoHo router (interface IP 200.0.11.2 in network&amp;nbsp; 200.0.11.0/24 - behind the router is the network 200.0.12.0/24). I would&amp;nbsp; like to allow ping through it and I don't want to perform NAT. &lt;BR /&gt; &lt;BR /&gt; So I went on Cisco.com and did exactly what is described here: &lt;A class="postlink" href="http://www.cisco.com/en/US/docs/security/pix/pix63/configuration/guide/bafwcfg.html#wp1113041" target="_blank"&gt;T&lt;/A&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/pix/pix63/configuration/guide/bafwcfg.html#wp1113041" target="_blank"&gt;&lt;SPAN class="postlink"&gt;wo interfaces without NAT&lt;/SPAN&gt;.&lt;/A&gt;.. but I doesn't work. &lt;BR /&gt; &lt;BR /&gt; Here is my config:&lt;/SPAN&gt; &lt;BR /&gt; &lt;BR /&gt; pixfirewall# sh ru &lt;BR /&gt; : Saved &lt;BR /&gt; : &lt;BR /&gt; PIX Version 6.3(5) &lt;BR /&gt; interface ethernet0 auto &lt;BR /&gt; interface ethernet1 auto &lt;BR /&gt; interface ethernet2 auto shutdown &lt;BR /&gt; interface ethernet3 auto shutdown &lt;BR /&gt; interface ethernet4 auto shutdown &lt;BR /&gt; interface ethernet5 auto shutdown &lt;BR /&gt; nameif ethernet0 outside security0 &lt;BR /&gt; nameif ethernet1 inside security100 &lt;BR /&gt; nameif ethernet2 intf2 security4 &lt;BR /&gt; nameif ethernet3 intf3 security6 &lt;BR /&gt; nameif ethernet4 intf4 security8 &lt;BR /&gt; nameif ethernet5 intf5 security10 &lt;BR /&gt; enable password 8Ry2YjIyt7RRXU24 encrypted &lt;BR /&gt; passwd 2KFQnbNIdI.2KYOU encrypted &lt;BR /&gt; hostname pixfirewall &lt;BR /&gt; fixup protocol dns maximum-length 512 &lt;BR /&gt; fixup protocol ftp 21 &lt;BR /&gt; fixup protocol h323 h225 1720 &lt;BR /&gt; fixup protocol h323 ras 1718-1719 &lt;BR /&gt; fixup protocol http 80 &lt;BR /&gt; fixup protocol rsh 514 &lt;BR /&gt; fixup protocol rtsp 554 &lt;BR /&gt; fixup protocol sip 5060 &lt;BR /&gt; fixup protocol sip udp 5060 &lt;BR /&gt; fixup protocol skinny 2000 &lt;BR /&gt; fixup protocol smtp 25 &lt;BR /&gt; fixup protocol sqlnet 1521 &lt;BR /&gt; fixup protocol tftp 69 &lt;BR /&gt; names &lt;BR /&gt; pager lines 24 &lt;BR /&gt; logging buffered debugging &lt;BR /&gt; mtu outside 1500 &lt;BR /&gt; mtu inside 1500 &lt;BR /&gt; mtu intf2 1500 &lt;BR /&gt; mtu intf3 1500 &lt;BR /&gt; mtu intf4 1500 &lt;BR /&gt; mtu intf5 1500 &lt;BR /&gt; ip address outside 200.0.11.1 255.255.255.0 &lt;BR /&gt; ip address inside 200.0.10.1 255.255.255.0 &lt;BR /&gt; no ip address intf2 &lt;BR /&gt; no ip address intf3 &lt;BR /&gt; no ip address intf4 &lt;BR /&gt; no ip address intf5 &lt;BR /&gt; ip audit info action alarm &lt;BR /&gt; ip audit attack action alarm &lt;BR /&gt; no failover &lt;BR /&gt; failover timeout 0:00:00 &lt;BR /&gt; failover poll 15 &lt;BR /&gt; no failover ip address outside &lt;BR /&gt; no failover ip address inside &lt;BR /&gt; no failover ip address intf2 &lt;BR /&gt; no failover ip address intf3 &lt;BR /&gt; no failover ip address intf4 &lt;BR /&gt; no failover ip address intf5 &lt;BR /&gt; pdm history enable &lt;BR /&gt; arp timeout 14400 &lt;BR /&gt; nat (inside) 0 200.0.11.0 255.255.255.0 0 0 &lt;BR /&gt; conduit permit icmp any any &lt;BR /&gt; route outside 0.0.0.0 0.0.0.0 200.0.11.2 1 &lt;BR /&gt; timeout xlate 3:00:00 &lt;BR /&gt; timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00 &lt;BR /&gt; timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00 &lt;BR /&gt; timeout sip-disconnect 0:02:00 sip-invite 0:03:00 &lt;BR /&gt; timeout uauth 0:05:00 absolute &lt;BR /&gt; aaa-server TACACS+ protocol tacacs+ &lt;BR /&gt; aaa-server TACACS+ max-failed-attempts 3 &lt;BR /&gt; aaa-server TACACS+ deadtime 10 &lt;BR /&gt; aaa-server RADIUS protocol radius &lt;BR /&gt; aaa-server RADIUS max-failed-attempts 3 &lt;BR /&gt; aaa-server RADIUS deadtime 10 &lt;BR /&gt; aaa-server LOCAL protocol local &lt;BR /&gt; no snmp-server location &lt;BR /&gt; no snmp-server contact &lt;BR /&gt; snmp-server community public &lt;BR /&gt; no snmp-server enable traps &lt;BR /&gt; no floodguard enable &lt;BR /&gt; telnet timeout 5 &lt;BR /&gt; ssh timeout 5 &lt;BR /&gt; console timeout 0 &lt;BR /&gt; terminal width 80 &lt;BR /&gt; Cryptochecksum:a6a630892bef2247cecfd7667cf871a9 &lt;BR /&gt; : end &lt;BR /&gt; &lt;BR /&gt; &lt;SPAN style="color: orange;"&gt;&lt;BR /&gt; The LINK llights are ON. &lt;BR /&gt; The router is, I believe, properly configured. &lt;BR /&gt; &lt;SPAN style="font-weight: bold;"&gt;Help please ?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 18:49:33 GMT</pubDate>
    <dc:creator>SamanthaDS</dc:creator>
    <dc:date>2019-03-11T18:49:33Z</dc:date>
    <item>
      <title>Issue w/ allowing ping through PIX Firewall 515E - No NAT needed</title>
      <link>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504981#M609885</link>
      <description>&lt;P&gt;&lt;SPAN class="postbody"&gt;&lt;SPAN style="color: orange; "&gt;Hello, &lt;BR /&gt; &lt;BR /&gt; I have a Cisco PIX firewall 515E version 6.3 connected on one interface&amp;nbsp; (eth1) to a linux PC (200.0.10.5 in subnet 200.0.10.0/24) and on the&amp;nbsp; other (eth0) to a SoHo router (interface IP 200.0.11.2 in network&amp;nbsp; 200.0.11.0/24 - behind the router is the network 200.0.12.0/24). I would&amp;nbsp; like to allow ping through it and I don't want to perform NAT. &lt;BR /&gt; &lt;BR /&gt; So I went on Cisco.com and did exactly what is described here: &lt;A class="postlink" href="http://www.cisco.com/en/US/docs/security/pix/pix63/configuration/guide/bafwcfg.html#wp1113041" target="_blank"&gt;T&lt;/A&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/pix/pix63/configuration/guide/bafwcfg.html#wp1113041" target="_blank"&gt;&lt;SPAN class="postlink"&gt;wo interfaces without NAT&lt;/SPAN&gt;.&lt;/A&gt;.. but I doesn't work. &lt;BR /&gt; &lt;BR /&gt; Here is my config:&lt;/SPAN&gt; &lt;BR /&gt; &lt;BR /&gt; pixfirewall# sh ru &lt;BR /&gt; : Saved &lt;BR /&gt; : &lt;BR /&gt; PIX Version 6.3(5) &lt;BR /&gt; interface ethernet0 auto &lt;BR /&gt; interface ethernet1 auto &lt;BR /&gt; interface ethernet2 auto shutdown &lt;BR /&gt; interface ethernet3 auto shutdown &lt;BR /&gt; interface ethernet4 auto shutdown &lt;BR /&gt; interface ethernet5 auto shutdown &lt;BR /&gt; nameif ethernet0 outside security0 &lt;BR /&gt; nameif ethernet1 inside security100 &lt;BR /&gt; nameif ethernet2 intf2 security4 &lt;BR /&gt; nameif ethernet3 intf3 security6 &lt;BR /&gt; nameif ethernet4 intf4 security8 &lt;BR /&gt; nameif ethernet5 intf5 security10 &lt;BR /&gt; enable password 8Ry2YjIyt7RRXU24 encrypted &lt;BR /&gt; passwd 2KFQnbNIdI.2KYOU encrypted &lt;BR /&gt; hostname pixfirewall &lt;BR /&gt; fixup protocol dns maximum-length 512 &lt;BR /&gt; fixup protocol ftp 21 &lt;BR /&gt; fixup protocol h323 h225 1720 &lt;BR /&gt; fixup protocol h323 ras 1718-1719 &lt;BR /&gt; fixup protocol http 80 &lt;BR /&gt; fixup protocol rsh 514 &lt;BR /&gt; fixup protocol rtsp 554 &lt;BR /&gt; fixup protocol sip 5060 &lt;BR /&gt; fixup protocol sip udp 5060 &lt;BR /&gt; fixup protocol skinny 2000 &lt;BR /&gt; fixup protocol smtp 25 &lt;BR /&gt; fixup protocol sqlnet 1521 &lt;BR /&gt; fixup protocol tftp 69 &lt;BR /&gt; names &lt;BR /&gt; pager lines 24 &lt;BR /&gt; logging buffered debugging &lt;BR /&gt; mtu outside 1500 &lt;BR /&gt; mtu inside 1500 &lt;BR /&gt; mtu intf2 1500 &lt;BR /&gt; mtu intf3 1500 &lt;BR /&gt; mtu intf4 1500 &lt;BR /&gt; mtu intf5 1500 &lt;BR /&gt; ip address outside 200.0.11.1 255.255.255.0 &lt;BR /&gt; ip address inside 200.0.10.1 255.255.255.0 &lt;BR /&gt; no ip address intf2 &lt;BR /&gt; no ip address intf3 &lt;BR /&gt; no ip address intf4 &lt;BR /&gt; no ip address intf5 &lt;BR /&gt; ip audit info action alarm &lt;BR /&gt; ip audit attack action alarm &lt;BR /&gt; no failover &lt;BR /&gt; failover timeout 0:00:00 &lt;BR /&gt; failover poll 15 &lt;BR /&gt; no failover ip address outside &lt;BR /&gt; no failover ip address inside &lt;BR /&gt; no failover ip address intf2 &lt;BR /&gt; no failover ip address intf3 &lt;BR /&gt; no failover ip address intf4 &lt;BR /&gt; no failover ip address intf5 &lt;BR /&gt; pdm history enable &lt;BR /&gt; arp timeout 14400 &lt;BR /&gt; nat (inside) 0 200.0.11.0 255.255.255.0 0 0 &lt;BR /&gt; conduit permit icmp any any &lt;BR /&gt; route outside 0.0.0.0 0.0.0.0 200.0.11.2 1 &lt;BR /&gt; timeout xlate 3:00:00 &lt;BR /&gt; timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00 &lt;BR /&gt; timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00 &lt;BR /&gt; timeout sip-disconnect 0:02:00 sip-invite 0:03:00 &lt;BR /&gt; timeout uauth 0:05:00 absolute &lt;BR /&gt; aaa-server TACACS+ protocol tacacs+ &lt;BR /&gt; aaa-server TACACS+ max-failed-attempts 3 &lt;BR /&gt; aaa-server TACACS+ deadtime 10 &lt;BR /&gt; aaa-server RADIUS protocol radius &lt;BR /&gt; aaa-server RADIUS max-failed-attempts 3 &lt;BR /&gt; aaa-server RADIUS deadtime 10 &lt;BR /&gt; aaa-server LOCAL protocol local &lt;BR /&gt; no snmp-server location &lt;BR /&gt; no snmp-server contact &lt;BR /&gt; snmp-server community public &lt;BR /&gt; no snmp-server enable traps &lt;BR /&gt; no floodguard enable &lt;BR /&gt; telnet timeout 5 &lt;BR /&gt; ssh timeout 5 &lt;BR /&gt; console timeout 0 &lt;BR /&gt; terminal width 80 &lt;BR /&gt; Cryptochecksum:a6a630892bef2247cecfd7667cf871a9 &lt;BR /&gt; : end &lt;BR /&gt; &lt;BR /&gt; &lt;SPAN style="color: orange;"&gt;&lt;BR /&gt; The LINK llights are ON. &lt;BR /&gt; The router is, I believe, properly configured. &lt;BR /&gt; &lt;SPAN style="font-weight: bold;"&gt;Help please ?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:49:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504981#M609885</guid>
      <dc:creator>SamanthaDS</dc:creator>
      <dc:date>2019-03-11T18:49:33Z</dc:date>
    </item>
    <item>
      <title>Re: Issue w/ allowing ping through PIX Firewall 515E - No NAT ne</title>
      <link>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504982#M609886</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Samantha,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you want the pings to be initiated only from one of the networks. Or you want the 200.0.10.0/24 to be able to ping 200.0.11.0/24 and 200.0.12.0/24 and vice versa. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Namit&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Oct 2010 12:36:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504982#M609886</guid>
      <dc:creator>Namit Agarwal</dc:creator>
      <dc:date>2010-10-04T12:36:42Z</dc:date>
    </item>
    <item>
      <title>Re: Issue w/ allowing ping through PIX Firewall 515E - No NAT ne</title>
      <link>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504983#M609887</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Namit,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to allow icmp resquest (and replies) in &lt;STRONG&gt;both&lt;/STRONG&gt; ways.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Oct 2010 12:42:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504983#M609887</guid>
      <dc:creator>SamanthaDS</dc:creator>
      <dc:date>2010-10-04T12:42:21Z</dc:date>
    </item>
    <item>
      <title>Re: Issue w/ allowing ping through PIX Firewall 515E - No NAT ne</title>
      <link>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504984#M609888</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can try&amp;nbsp; configuring nat exempt as follows:-&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 200.0.10.0 255.255.255.0 200.0.12.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As for the traffic coming from low security level to high i.e from 200.0.12.0 network to 200.0.10.0 , you need to specify an access-list on the outside interface which allows the traffic from 200.0.12.0 to 200.0.10.0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also add "fixup protocol icmp " to allow the reply traffic when its gets initiated from high to low.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Following are command refrence links:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/pix/pix63/command/reference/mr.html#wp1032129"&gt;http://www.cisco.com/en/US/docs/security/pix/pix63/command/reference/mr.html#wp1032129&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access-list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/pix/pix63/command/reference/ab.html#wp1067755"&gt;http://www.cisco.com/en/US/docs/security/pix/pix63/command/reference/ab.html#wp1067755&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Shilpa&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Oct 2010 12:45:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504984#M609888</guid>
      <dc:creator>Shilpa Gupta</dc:creator>
      <dc:date>2010-10-04T12:45:27Z</dc:date>
    </item>
    <item>
      <title>Re: Issue w/ allowing ping through PIX Firewall 515E - No NAT ne</title>
      <link>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504985#M609889</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Samantha,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The default behavior of the firewall is that the Inbound ICMP through the PIX is denied by default; outbound ICMP is permitted, but the incoming reply is denied by default.So to be able to allow the ping from the network behind the outside interface we need a matching NAT statement and an ACL (which is already in place using conduit ). Please take a look at the following link, hope it helps &lt;A href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml#topic3"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml#topic3&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Namit &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Oct 2010 12:46:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504985#M609889</guid>
      <dc:creator>Namit Agarwal</dc:creator>
      <dc:date>2010-10-04T12:46:43Z</dc:date>
    </item>
    <item>
      <title>Re: Issue w/ allowing ping through PIX Firewall 515E - No NAT ne</title>
      <link>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504986#M609890</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi again,&lt;/P&gt;&lt;P&gt;Refering to your link I saw I missed the static line entry... As I don't perform NAT I added this to my config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;PRE&gt;&lt;STRONG&gt;static (inside,outside) 200.0.10.5 200.0.10.5 netmask 255.255.255.255 0 0&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;Unfortunatly it still doesn't work... Any other clue ?&lt;BR /&gt;Thanks.&lt;/SPAN&gt;&lt;/PRE&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Oct 2010 13:12:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504986#M609890</guid>
      <dc:creator>SamanthaDS</dc:creator>
      <dc:date>2010-10-04T13:12:07Z</dc:date>
    </item>
    <item>
      <title>Re: Issue w/ allowing ping through PIX Firewall 515E - No NAT ne</title>
      <link>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504987#M609891</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Shilpa,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tired your solution as well but it still doesn't work...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Oct 2010 13:13:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504987#M609891</guid>
      <dc:creator>SamanthaDS</dc:creator>
      <dc:date>2010-10-04T13:13:23Z</dc:date>
    </item>
    <item>
      <title>Re: Issue w/ allowing ping through PIX Firewall 515E - No NAT ne</title>
      <link>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504988#M609892</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Samantha,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please run the following command on the PIX "debug icmp trace" when you initiate pings and paste the output.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Namit&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Oct 2010 13:21:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504988#M609892</guid>
      <dc:creator>Namit Agarwal</dc:creator>
      <dc:date>2010-10-04T13:21:14Z</dc:date>
    </item>
    <item>
      <title>Re: Issue w/ allowing ping through PIX Firewall 515E - No NAT ne</title>
      <link>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504989#M609893</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have added the static command for 200.0.10.0 network, could you please try add static command for 200.0.12.0 netwok on the device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and also are you performing any kind of nat on router?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Shilpa&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Oct 2010 13:22:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504989#M609893</guid>
      <dc:creator>Shilpa Gupta</dc:creator>
      <dc:date>2010-10-04T13:22:32Z</dc:date>
    </item>
    <item>
      <title>Re: Issue w/ allowing ping through PIX Firewall 515E - No NAT ne</title>
      <link>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504990#M609894</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So I ran the "debug icmp trace" command and here is what happenned.&lt;/P&gt;&lt;P&gt;When I tried to ping &lt;EM&gt;from&lt;/EM&gt; the inside (from 200.0.10.5) &lt;EM&gt;to &lt;/EM&gt;the firewall interfaces (200.0.10.1 and 200.0.11.1) or the router (200.0.11.2), nothing appeared on the firewall console.&lt;/P&gt;&lt;P&gt;After that I tried to ping &lt;EM&gt;from&lt;/EM&gt; the firewall and this appeared on the console :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;pixfirewall(config)# debug icmp trace
ICMP trace on
Warning: this may cause problems on busy networks
pixfirewall(config)# ping 200.0.10.5
1: ICMP echo request (len 32 id 9233 seq 0) 200.0.10.1 &amp;gt; 200.0.10.5
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 200.0.10.5 NO response received -- 1000ms
2: ICMP echo request (len 32 id 9233 seq 1) 200.0.10.1 &amp;gt; 200.0.10.5
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 200.0.10.5 NO response received -- 1000ms
3: ICMP echo request (len 32 id 9233 seq 2) 200.0.10.1 &amp;gt; 200.0.10.5
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 200.0.10.5 NO response received -- 1000ms
pixfirewall(config)# ping 200.0.12.1
4: ICMP echo request (len 32 id 9233 seq 0) 200.0.11.1 &amp;gt; 200.0.12.1
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 200.0.12.1 NO response received -- 1000ms
5: ICMP echo request (len 32 id 9233 seq 1) 200.0.11.1 &amp;gt; 200.0.12.1
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 200.0.12.1 NO response received -- 1000ms
6: ICMP echo request (len 32 id 9233 seq 2) 200.0.11.1 &amp;gt; 200.0.12.1
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 200.0.12.1 NO response received -- 1000ms
pixfirewall(config)# ping 200.0.11.2
7: ICMP echo request (len 32 id 9233 seq 0) 200.0.11.1 &amp;gt; 200.0.11.2
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 200.0.11.2 NO response received -- 1000ms
8: ICMP echo request (len 32 id 9233 seq 1) 200.0.11.1 &amp;gt; 200.0.11.2
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 200.0.11.2 NO response received -- 1000ms
9: ICMP echo request (len 32 id 9233 seq 2) 200.0.11.1 &amp;gt; 200.0.11.2
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 200.0.11.2 NO response received -- 1000ms&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;I have to add that I cleared the arp table of the firewall and whenever I tried to ping from the inside, the arp table is updated with new entries (even though I don't receive icmp replies).&lt;/SPAN&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Oct 2010 13:31:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504990#M609894</guid>
      <dc:creator>SamanthaDS</dc:creator>
      <dc:date>2010-10-04T13:31:25Z</dc:date>
    </item>
    <item>
      <title>Re: Issue w/ allowing ping through PIX Firewall 515E - No NAT ne</title>
      <link>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504991#M609895</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't perform NAT on the router.&lt;/P&gt;&lt;P&gt;I'm not sure to understand your proposition about the static command... the only thing I added so far was for the host 200.0.10.5&lt;SPAN class="content"&gt;&lt;PRE&gt;&lt;STRONG&gt;static (inside,outside) 200.0.10.5 200.0.10.5 netmask 255.255.255.255 0 0&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Oct 2010 13:35:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504991#M609895</guid>
      <dc:creator>SamanthaDS</dc:creator>
      <dc:date>2010-10-04T13:35:25Z</dc:date>
    </item>
    <item>
      <title>Re: Issue w/ allowing ping through PIX Firewall 515E - No NAT ne</title>
      <link>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504992#M609896</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Samantha,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please add the following commands and try &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;icmp permit 0 0 outside &lt;/P&gt;&lt;P&gt;icmp permit 0 0 inside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Namit &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Oct 2010 13:36:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504992#M609896</guid>
      <dc:creator>Namit Agarwal</dc:creator>
      <dc:date>2010-10-04T13:36:59Z</dc:date>
    </item>
    <item>
      <title>Re: Issue w/ allowing ping through PIX Firewall 515E - No NAT ne</title>
      <link>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504993#M609897</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;&lt;P&gt;Hi Samantha,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please add the following commands and try. If it does not work please paste the debugs again after adding these commands. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;icmp permit 0 0 outside &lt;/P&gt;&lt;P&gt;icmp permit 0 0 inside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Namit &lt;/P&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Oct 2010 13:38:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504993#M609897</guid>
      <dc:creator>Namit Agarwal</dc:creator>
      <dc:date>2010-10-04T13:38:17Z</dc:date>
    </item>
    <item>
      <title>Re: Issue w/ allowing ping through PIX Firewall 515E - No NAT ne</title>
      <link>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504994#M609898</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We sometime add self static translation for both source and destination.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So we added for source&amp;nbsp; and I wanted you to test it by adding the static for destination as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As from the debugs, I&amp;nbsp; understand that when you ping from the PIX to any host on&amp;nbsp; 200.0.12.0/24, you are not able to see any response.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First of all try to ping the host in 200.0.12.0/24 network from the router itself and then check if you have any access-list configured on the router which might be blocking the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Shilpa&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Oct 2010 13:42:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504994#M609898</guid>
      <dc:creator>Shilpa Gupta</dc:creator>
      <dc:date>2010-10-04T13:42:00Z</dc:date>
    </item>
    <item>
      <title>Re: Issue w/ allowing ping through PIX Firewall 515E - No NAT ne</title>
      <link>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504995#M609899</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I add those two entries to the config and tried to ping again but it still does'nt work. I got the same as before &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Oct 2010 13:43:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504995#M609899</guid>
      <dc:creator>SamanthaDS</dc:creator>
      <dc:date>2010-10-04T13:43:30Z</dc:date>
    </item>
    <item>
      <title>Re: Issue w/ allowing ping through PIX Firewall 515E - No NAT ne</title>
      <link>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504996#M609900</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Samantha,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please add the command "fixup protocol icmp" on the PIX if you have not done so already and test the pings then. If it still does not help, please apply captures on the inside and outside interfaces and paste the captures here. For help with captures, please refer the below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-1222"&gt;https://supportforums.cisco.com/docs/DOC-1222&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, please post the output of "show nat", "show global" and "show static" from the PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Oct 2010 13:47:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504996#M609900</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-10-04T13:47:26Z</dc:date>
    </item>
    <item>
      <title>Re: Issue w/ allowing ping through PIX Firewall 515E - No NAT ne</title>
      <link>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504997#M609901</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, so I added:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;PRE&gt;&lt;STRONG&gt;static (inside,outside) 200.0.11.2 200.0.11.2 netmask 255.255.255.255 0 0&lt;BR /&gt;&lt;/STRONG&gt;&lt;SPAN class="content"&gt;&lt;PRE&gt;&lt;SPAN class="content"&gt;&lt;PRE&gt;&lt;SPAN class="content"&gt;&lt;PRE&gt;&lt;SPAN class="content"&gt;&lt;PRE&gt;&lt;STRONG&gt;static (inside,outside) 200.0.12.1 200.0.12.1 netmask 255.255.255.255 0 0&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;/SPAN&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;... still doesn't work. I also checked the router and there are no access-lists on it, here is its config:&lt;BR /&gt;&lt;BR /&gt;Router#sh ru Building configuration...&amp;nbsp; &lt;BR /&gt;Current configuration : 859 bytes &lt;BR /&gt;! &lt;BR /&gt;version 12.3 service config &lt;BR /&gt;no service pad &lt;BR /&gt;service timestamps debug datetime msec &lt;BR /&gt;service timestamps log datetime msec n&lt;BR /&gt;o service password-encryption &lt;BR /&gt;! &lt;BR /&gt;hostname Router &lt;BR /&gt;! &lt;BR /&gt;boot-start-marker boot-end-marker &lt;BR /&gt;! &lt;BR /&gt;enable secret 5 $1$fn64$YmP90qmUj8lxDjvEtwU.N1 &lt;BR /&gt;enable password Cisco &lt;BR /&gt;! &lt;BR /&gt;no aaa new-model ip subnet-zero &lt;BR /&gt;! &lt;BR /&gt;! &lt;BR /&gt;! &lt;BR /&gt;! &lt;BR /&gt;! &lt;BR /&gt;! &lt;BR /&gt;! &lt;BR /&gt;! &lt;BR /&gt;! &lt;BR /&gt;interface Ethernet0&amp;nbsp; &lt;BR /&gt;ip address 200.0.12.1 255.255.255.0&amp;nbsp; &lt;BR /&gt;no cdp enable &lt;BR /&gt;! &lt;BR /&gt;interface Ethernet1&amp;nbsp; &lt;BR /&gt;ip address 200.0.11.2 255.255.255.0&amp;nbsp; &lt;BR /&gt;duplex auto&amp;nbsp; no cdp enable &lt;BR /&gt;! &lt;BR /&gt;ip classless &lt;BR /&gt;ip http server &lt;BR /&gt;no ip http secure-server &lt;BR /&gt;! &lt;BR /&gt;! &lt;BR /&gt;! &lt;BR /&gt;control-plane &lt;BR /&gt;! &lt;BR /&gt;! &lt;BR /&gt;line con 0&amp;nbsp; &lt;BR /&gt;exec-timeout 0 0&amp;nbsp; &lt;BR /&gt;no modem enable&amp;nbsp; &lt;BR /&gt;transport preferred all &lt;BR /&gt;transport output all &lt;BR /&gt;line aux 0&amp;nbsp; &lt;BR /&gt;transport preferred all&amp;nbsp; &lt;BR /&gt;transport output all &lt;BR /&gt;line vty 0 4&amp;nbsp; &lt;BR /&gt;password cisco &lt;BR /&gt;login&amp;nbsp; &lt;BR /&gt;transport preferred all&amp;nbsp; &lt;BR /&gt;transport input all&amp;nbsp; &lt;BR /&gt;transport output all &lt;BR /&gt;! &lt;BR /&gt;scheduler max-task-time 5000 end&lt;/PRE&gt;
&lt;/SPAN&gt;Thanks.&lt;/PRE&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Oct 2010 13:52:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504997#M609901</guid>
      <dc:creator>SamanthaDS</dc:creator>
      <dc:date>2010-10-04T13:52:56Z</dc:date>
    </item>
    <item>
      <title>Re: Issue w/ allowing ping through PIX Firewall 515E - No NAT ne</title>
      <link>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504998#M609902</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Prapanch,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are the outputs of "show nat", "show global" and "show static" from the PIX:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;pixfirewall# show nat&lt;BR /&gt;nat (inside) 0 access-list nonat&lt;BR /&gt;nat (inside) 0 200.0.11.0 255.255.255.0 0 0&lt;BR /&gt; pixfirewall# show global&lt;BR /&gt;pixfirewall# show static&lt;BR /&gt;static (inside,outside) 200.0.10.5 200.0.10.5 netmask 255.255.255.255 0 0&lt;BR /&gt; static (inside,outside) 200.0.11.2 200.0.11.2 netmask 255.255.255.255 0 0&lt;BR /&gt;static (inside,outside) 200.0.12.1 200.0.12.1 netmask 255.255.255.255 0 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And here are the captures:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;pixfirewall(config)# access-list cap-list permit ip any any&lt;BR /&gt; pixfirewall(config)# capture in-cap interface inside access-list cap-list buff$&lt;BR /&gt; pixfirewall(config)# capture out-cap interface outside access-list cap-list bu$&lt;BR /&gt; pixfirewall(config)# ping 200.0.11.2&lt;BR /&gt; 31: ICMP echo request (len 32 id 9233 seq 0) 200.0.11.1 &amp;gt; 200.0.11.2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 200.0.11.2 NO response received -- 1000ms&lt;BR /&gt; 32: ICMP echo request (len 32 id 9233 seq 1) 200.0.11.1 &amp;gt; 200.0.11.2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 200.0.11.2 NO response received -- 1000ms&lt;BR /&gt; 33: ICMP echo request (len 32 id 9233 seq 2) 200.0.11.1 &amp;gt; 200.0.11.2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 200.0.11.2 NO response received -- 1000ms&lt;BR /&gt; pixfirewall(config)# ping 200.0.12.1&lt;BR /&gt; 34: ICMP echo request (len 32 id 9233 seq 0) 200.0.11.1 &amp;gt; 200.0.12.1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 200.0.12.1 NO response received -- 1000ms&lt;BR /&gt; 35: ICMP echo request (len 32 id 9233 seq 1) 200.0.11.1 &amp;gt; 200.0.12.1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 200.0.12.1 NO response received -- 1000ms&lt;BR /&gt; 36: ICMP echo request (len 32 id 9233 seq 2) 200.0.11.1 &amp;gt; 200.0.12.1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 200.0.12.1 NO response received -- 1000ms&lt;BR /&gt; pixfirewall(config)# ping 200.0.10.5&lt;BR /&gt; 37: ICMP echo request (len 32 id 9233 seq 0) 200.0.10.1 &amp;gt; 200.0.10.5&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 200.0.10.5 NO response received -- 1000ms&lt;BR /&gt; 38: ICMP echo request (len 32 id 9233 seq 1) 200.0.10.1 &amp;gt; 200.0.10.5&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 200.0.10.5 NO response received -- 1000ms&lt;BR /&gt; 39: ICMP echo request (len 32 id 9233 seq 2) 200.0.10.1 &amp;gt; 200.0.10.5&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 200.0.10.5 NO response received -- 1000ms&lt;BR /&gt; pixfirewall(config)# ping 200.0.11.2&lt;BR /&gt; 40: ICMP echo request (len 32 id 9233 seq 0) 200.0.11.1 &amp;gt; 200.0.11.2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 200.0.11.2 NO response received -- 1000ms&lt;BR /&gt; 41: ICMP echo request (len 32 id 9233 seq 1) 200.0.11.1 &amp;gt; 200.0.11.2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 200.0.11.2 NO response received -- 1000ms&lt;BR /&gt; 42: ICMP echo request (len 32 id 9233 seq 2) 200.0.11.1 &amp;gt; 200.0.11.2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 200.0.11.2 NO response received -- 1000ms&lt;BR /&gt; pixfirewall(config)# sh capture out-cap&lt;BR /&gt; 5 packets captured&lt;BR /&gt; 13:59:25.192433 200.0.11.2.51029 &amp;gt; 255.255.255.255.69:&amp;nbsp; udp 22&lt;BR /&gt; 13:59:28.190007 200.0.11.2.51029 &amp;gt; 255.255.255.255.69:&amp;nbsp; udp 22&lt;BR /&gt; 13:59:32.189885 200.0.11.2.51029 &amp;gt; 255.255.255.255.69:&amp;nbsp; udp 22&lt;BR /&gt; 13:59:37.189733 200.0.11.2.51029 &amp;gt; 255.255.255.255.69:&amp;nbsp; udp 22&lt;BR /&gt; 13:59:43.189611 200.0.11.2.51029 &amp;gt; 255.255.255.255.69:&amp;nbsp; udp 22&lt;BR /&gt; 5 packets shown&lt;BR /&gt; pixfirewall(config)# sh capture in-cap&lt;BR /&gt; 3 packets captured&lt;BR /&gt; 13:57:25.302886 200.0.10.1 &amp;gt; &lt;A href="http://200.0.10.5/" target="_blank"&gt;200.0.10.5&lt;/A&gt;: icmp: echo request&lt;BR /&gt; 13:57:26.295028 200.0.10.1 &amp;gt; &lt;A href="http://200.0.10.5/" target="_blank"&gt;200.0.10.5&lt;/A&gt;: icmp: echo request&lt;BR /&gt; 13:57:27.295043 200.0.10.1 &amp;gt; &lt;A href="http://200.0.10.5/" target="_blank"&gt;200.0.10.5&lt;/A&gt;: icmp: echo request&lt;BR /&gt; 3 packets shown&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm sorry I have to leave now but I will come again tomorrow,&lt;/P&gt;&lt;P&gt;Thanks everyone for trying hard to help,&lt;/P&gt;&lt;P&gt;Samantha.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Oct 2010 14:06:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504998#M609902</guid>
      <dc:creator>SamanthaDS</dc:creator>
      <dc:date>2010-10-04T14:06:04Z</dc:date>
    </item>
    <item>
      <title>Re: Issue w/ allowing ping through PIX Firewall 515E - No NAT ne</title>
      <link>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504999#M609903</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi again Prapanch !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Were you able to figure something out with the captures and outputs I sent you?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again,&lt;/P&gt;&lt;P&gt;Samantha.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Oct 2010 06:48:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1504999#M609903</guid>
      <dc:creator>SamanthaDS</dc:creator>
      <dc:date>2010-10-05T06:48:35Z</dc:date>
    </item>
    <item>
      <title>Re: Issue w/ allowing ping through PIX Firewall 515E - No NAT ne</title>
      <link>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1505000#M609905</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Samantha,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It certainly looks like the PIX is dropping the ICMP packets. Have you added the "fixup protocol icmp" command? Also, can you paste a sanitized configuration here from the PIX once again? Seems like a lot of changes have been made since you started out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Oct 2010 15:36:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-w-allowing-ping-through-pix-firewall-515e-no-nat-needed/m-p/1505000#M609905</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-10-05T15:36:50Z</dc:date>
    </item>
  </channel>
</rss>

