<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Why enable ICMP inspection will allow ICMP traffic to pass A in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/why-enable-icmp-inspection-will-allow-icmp-traffic-to-pass-asa/m-p/1605005#M615061</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, not echo, it will allow the respective echo-reply back in if icmp inspection is enabled.&lt;/P&gt;&lt;P&gt;For echo, you still need to allow that through in your access-list as echo will be the first connection through the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And it would be best if you enable icmp inspection because the firewall will check that only the legitimate reply gets through. With access-list, it will pretty much allow any replies to come through.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 24 Feb 2011 00:55:22 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2011-02-24T00:55:22Z</dc:date>
    <item>
      <title>Why enable ICMP inspection will allow ICMP traffic to pass ASA ?</title>
      <link>https://community.cisco.com/t5/network-security/why-enable-icmp-inspection-will-allow-icmp-traffic-to-pass-asa/m-p/1605001#M615057</link>
      <description>&lt;P&gt;I have ASA 5510. I know by default ASA does not allow ICMP echo to pass through ASA so the host behind my ASA will not get echo replies.&lt;/P&gt;&lt;P&gt;I used to think that I must create access list to enable the ICMP packets to pass through ASA. Then I found that I can also create a service policy to enable ICMP inspectiom to achieve the same goal.&lt;/P&gt;&lt;P&gt;But why? How does applicaiton inspection on ICMP "make" ASA allow ICMP to pass without any access list configured?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:54:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-enable-icmp-inspection-will-allow-icmp-traffic-to-pass-asa/m-p/1605001#M615057</guid>
      <dc:creator>cooperchien</dc:creator>
      <dc:date>2019-03-11T19:54:56Z</dc:date>
    </item>
    <item>
      <title>Re: Why enable ICMP inspection will allow ICMP traffic to pass A</title>
      <link>https://community.cisco.com/t5/network-security/why-enable-icmp-inspection-will-allow-icmp-traffic-to-pass-asa/m-p/1605002#M615058</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You will have to configure access-list to pass through the ICMP ECHO if you already have access-list applied to your interfaces, however, with the "inspect icmp", it will dynamically allow the corresponding ICMP ECHO Reply to pass through without needing to have access-list to allow the ECHO Reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is more information on ICMP inspection for your reference:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/i2.html#wp1735986"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/i2.html#wp1735986&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Feb 2011 07:28:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-enable-icmp-inspection-will-allow-icmp-traffic-to-pass-asa/m-p/1605002#M615058</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-02-23T07:28:31Z</dc:date>
    </item>
    <item>
      <title>Re: Why enable ICMP inspection will allow ICMP traffic to pass A</title>
      <link>https://community.cisco.com/t5/network-security/why-enable-icmp-inspection-will-allow-icmp-traffic-to-pass-asa/m-p/1605003#M615059</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pBl_BlockLabel"&gt;ICMP Inspection&lt;/P&gt;&lt;A name="wp1041181"&gt;&lt;/A&gt;&lt;P class="pB1_Body1"&gt;An ICMP inspection session is on the basis of the source address of the&amp;nbsp; inside host that originates the ICMP packet. &lt;SPAN style="text-decoration: underline; color: #333333;"&gt; Dynamic Access Control&amp;nbsp; Lists (ACLs) are created for return ICMP packets of the allowed types&amp;nbsp; (echo-reply, time-exceeded, destination unreachable, and timestamp&amp;nbsp; reply)&lt;/SPAN&gt; for each session.&amp;nbsp; There are no port numbers associated&amp;nbsp; with an&amp;nbsp; ICMP session, and the permitted IP address of the return packet is&amp;nbsp; wild-carded in the ACL.&amp;nbsp; The wild-card address is because the IP address&amp;nbsp; of the return packet cannot be known in advance for time-exceeded and&amp;nbsp; destination-unreachable replies.&amp;nbsp; These replies can come from&amp;nbsp; intermediate devices rather than the intended destination.&lt;/P&gt;&lt;P class="pB1_Body1"&gt;&lt;/P&gt;&lt;P class="pB1_Body1"&gt;&lt;A class="jive-link-external-small active_link" href="http://www.cisco.com/en/US/docs/ios/12_2t/12_2t15/feature/guide/ftfwicmp.html"&gt;http://www.cisco.com/en/US/docs/ios/12_2t/12_2t15/feature/guide/ftfwicmp.html&lt;/A&gt;&lt;/P&gt;&lt;P class="pB1_Body1"&gt;&lt;/P&gt;&lt;P class="pB1_Body1"&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Arial;"&gt;UDP and ICMP do not themselves contain any connection information (such as sequence numbers). However, at the very minimum, they contain an IP address pair. UDP also contains port pairs, and ICMP has type and code information. All of these data can be analyzed in order to build "virtual connections" in the cache. For instance, a cache entry will be created by any UDP packet which originates on the LAN. Its IP address and port pairs will be stored. For a short period of time, UDP packets from the WAN which have matching IP and UDP information will be allowed back in through the firewall. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.ssimail.com/Stateful.htm"&gt;http://www.ssimail.com/Stateful.htm&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Feb 2011 07:47:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-enable-icmp-inspection-will-allow-icmp-traffic-to-pass-asa/m-p/1605003#M615059</guid>
      <dc:creator>uber_cookie</dc:creator>
      <dc:date>2011-02-23T07:47:04Z</dc:date>
    </item>
    <item>
      <title>Re: Why enable ICMP inspection will allow ICMP traffic to pass A</title>
      <link>https://community.cisco.com/t5/network-security/why-enable-icmp-inspection-will-allow-icmp-traffic-to-pass-asa/m-p/1605004#M615060</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is it true that by default ASA has inpsection engine configured not to allow ICMP echo to pass through. Then I when I enable stateful inspection on ICMP, the inspection engine will start to allow all ICMP types such as echo to pass through ASA?&lt;/P&gt;&lt;P&gt;I am thinking that it is inspection engine that blocks the ICMP packet because I do not see any new access list created after I enable or disable ICMP inspection.&lt;/P&gt;&lt;P&gt;I used to think that enabling stateful inspection of ICMP and allowing ICMP to pass through firewall are two different things. Is it by design Cisco thinks that if you enable stateful inspection on ICMP, it is safe to allow ICMP to pass through ASA?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Feb 2011 19:18:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-enable-icmp-inspection-will-allow-icmp-traffic-to-pass-asa/m-p/1605004#M615060</guid>
      <dc:creator>cooperchien</dc:creator>
      <dc:date>2011-02-23T19:18:48Z</dc:date>
    </item>
    <item>
      <title>Re: Why enable ICMP inspection will allow ICMP traffic to pass A</title>
      <link>https://community.cisco.com/t5/network-security/why-enable-icmp-inspection-will-allow-icmp-traffic-to-pass-asa/m-p/1605005#M615061</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, not echo, it will allow the respective echo-reply back in if icmp inspection is enabled.&lt;/P&gt;&lt;P&gt;For echo, you still need to allow that through in your access-list as echo will be the first connection through the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And it would be best if you enable icmp inspection because the firewall will check that only the legitimate reply gets through. With access-list, it will pretty much allow any replies to come through.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Feb 2011 00:55:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/why-enable-icmp-inspection-will-allow-icmp-traffic-to-pass-asa/m-p/1605005#M615061</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-02-24T00:55:22Z</dc:date>
    </item>
  </channel>
</rss>

