<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Ping from Outside allowed but not enabled on Outside ACL. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ping-from-outside-allowed-but-not-enabled-on-outside-acl/m-p/3824871#M6478</link>
    <description>&lt;P&gt;That is if&amp;nbsp;&lt;SPAN&gt;192.168.1.217 is the IP on the outside PC.&amp;nbsp; With no actual information on where in the network these IPs are allocated, it is difficult to know where the issue is.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You could run a packet-tracer to see what rule is actually allowing the traffic.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Sat, 23 Mar 2019 16:05:24 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2019-03-23T16:05:24Z</dc:date>
    <item>
      <title>Ping from Outside allowed but not enabled on Outside ACL.</title>
      <link>https://community.cisco.com/t5/network-security/ping-from-outside-allowed-but-not-enabled-on-outside-acl/m-p/3824087#M6476</link>
      <description>&lt;P&gt;So I have a basic lab setup - see attached. My outside host machine is able to ping my internal host when icmp is not enable on the ACL on Outside. Anyone know why this may be or is the case?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ASA# sh run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;: Serial Number: JMX184940D6&lt;BR /&gt;: Hardware: ASA5505, 512 MB RAM, CPU Geode 500 MHz&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.1(7)&lt;BR /&gt;!&lt;BR /&gt;hostname SiteP-ASA&lt;BR /&gt;enable password kqNsU0EdOEv8n9Op encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;switchport access vlan 15&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;switchport access vlan 15&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 192.168.1.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan10&lt;BR /&gt;no forward interface Vlan2&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.1.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan15&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.15.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network Internal_Lan&lt;BR /&gt;subnet 192.168.15.0 255.255.255.0&lt;BR /&gt;object network Dellr610_Srv&lt;BR /&gt;host 192.168.15.1&lt;BR /&gt;description Dellr610_Srv on Inside&lt;BR /&gt;object network Virtual_Environment_192.168.15.0&lt;BR /&gt;range 192.168.15.0 192.168.15.255&lt;BR /&gt;description Virtual_Environment_192.168.15.0 on inside_LAN&lt;BR /&gt;object network Outside_HP_Upstairs_WS&lt;BR /&gt;host 192.168.1.217&lt;BR /&gt;description Outside HP Upstairs WS&lt;BR /&gt;object service Server_Port_3080&lt;BR /&gt;service tcp source eq 3080 destination eq 3080&lt;BR /&gt;description Port needed to access servers&lt;BR /&gt;object network Site_P_Outside_Lan&lt;BR /&gt;range 192.168.1.1 192.168.1.254&lt;BR /&gt;description Site_P_Outside_Lan&lt;BR /&gt;object service DNS&lt;BR /&gt;service udp source eq domain destination eq domain&lt;BR /&gt;description Domain Name Service&lt;BR /&gt;object service DNS_TCP&lt;BR /&gt;service tcp source eq domain destination eq domain&lt;BR /&gt;description Domain Name Service TCP&lt;BR /&gt;object service DNS_Tcp&lt;BR /&gt;service udp source eq domain destination eq domain&lt;BR /&gt;object-group network Internal_Subnets&lt;BR /&gt;description Internal_Subnets&lt;BR /&gt;network-object object Dellr610_Srv&lt;BR /&gt;network-object object Virtual_Environment_192.168.15.0&lt;BR /&gt;object-group icmp-type ICMP_Connectivity_Testing&lt;BR /&gt;icmp-object echo&lt;BR /&gt;icmp-object echo-reply&lt;BR /&gt;icmp-object time-exceeded&lt;BR /&gt;icmp-object traceroute&lt;BR /&gt;icmp-object information-reply&lt;BR /&gt;icmp-object information-request&lt;BR /&gt;icmp-object unreachable&lt;BR /&gt;object-group service Web_Ports&lt;BR /&gt;description Web_Ports needed to access the internet NOT WORKING&lt;BR /&gt;service-object tcp-udp destination eq www&lt;BR /&gt;service-object tcp destination eq https&lt;BR /&gt;service-object object DNS&lt;BR /&gt;service-object object DNS_TCP&lt;BR /&gt;service-object tcp destination eq ssh&lt;BR /&gt;service-object icmp&lt;BR /&gt;service-object tcp destination eq domain&lt;BR /&gt;service-object tcp destination eq 2598&lt;BR /&gt;object-group network Site_P_Outside_Lan_Mgmt_Hosts&lt;BR /&gt;description Outside_Lan hosts allowed to inside servers&lt;BR /&gt;network-object object Outside_HP_Upstairs_WS&lt;BR /&gt;object-group service Server_Ports&lt;BR /&gt;description Ports needed to access servers from Outside/Inside&lt;BR /&gt;service-object object Server_Port_3080&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt;network-object object Internal_Lan&lt;BR /&gt;network-object object Virtual_Environment_192.168.15.0&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;network-object object Site_P_Outside_Lan&lt;BR /&gt;group-object Site_P_Outside_Lan_Mgmt_Hosts&lt;BR /&gt;object-group network DM_INLINE_NETWORK_5&lt;BR /&gt;group-object Internal_Subnets&lt;BR /&gt;network-object object Virtual_Environment_192.168.15.0&lt;BR /&gt;object-group network DM_INLINE_NETWORK_6&lt;BR /&gt;network-object object Internal_Lan&lt;BR /&gt;network-object object Virtual_Environment_192.168.15.0&lt;BR /&gt;object-group network DM_INLINE_NETWORK_7&lt;BR /&gt;group-object Internal_Subnets&lt;BR /&gt;network-object object Virtual_Environment_192.168.15.0&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt;protocol-object udp&lt;BR /&gt;protocol-object tcp&lt;BR /&gt;object-group network DM_INLINE_NETWORK_9&lt;BR /&gt;network-object object Internal_Lan&lt;BR /&gt;network-object object Virtual_Environment_192.168.15.0&lt;BR /&gt;access-list outside_access_in extended permit ip object Site_P_Outside_Lan object-group DM_INLINE_NETWORK_2&lt;BR /&gt;access-list Inside extended permit ip 192.168.15.0 255.255.255.0 any log inactive&lt;BR /&gt;access-list Inside extended permit ip any any log inactive&lt;BR /&gt;access-list Inside remark Internal_Subnets allowed to Internet&lt;BR /&gt;access-list Inside extended permit ip object-group Internal_Subnets any inactive&lt;BR /&gt;access-list Inside remark Ports needed for testing&lt;BR /&gt;access-list Inside extended permit icmp object-group DM_INLINE_NETWORK_7 any object-group ICMP_Connectivity_Testing&lt;BR /&gt;access-list Inside remark Ports needed to access internet web pages&lt;BR /&gt;access-list Inside extended permit ip object-group DM_INLINE_NETWORK_5 any&lt;BR /&gt;access-list Inside remark Ports needed from connectivity testing&lt;BR /&gt;access-list Inside extended permit icmp object-group DM_INLINE_NETWORK_1 object-group Internal_Subnets object-group ICMP_Connectivity_Testing inactive&lt;BR /&gt;access-list Inside extended permit ip object Outside_HP_Upstairs_WS object-group DM_INLINE_NETWORK_9 inactive&lt;BR /&gt;access-list Inside extended permit ip object-group DM_INLINE_NETWORK_6 object Outside_HP_Upstairs_WS inactive&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-717.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group Inside in interface inside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 192.168.1.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.217 255.255.255.255 outside&lt;BR /&gt;http 192.168.15.10 255.255.255.255 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 192.168.1.217 255.255.255.255 outside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 2&lt;/P&gt;
&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;username cisco password 3USUcOPFUiMCO4Jk encrypted&lt;BR /&gt;username neteng password bzvbyY6YRFaansCf encrypted&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;no active&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination address email callhome@cisco.com&lt;BR /&gt;destination transport-method http&lt;BR /&gt;subscribe-to-alert-group diagnostic&lt;BR /&gt;subscribe-to-alert-group environment&lt;BR /&gt;subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:336b3dbcfc0aea619aeb9791f6bc0b74&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:58:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-from-outside-allowed-but-not-enabled-on-outside-acl/m-p/3824087#M6476</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2020-02-21T16:58:26Z</dc:date>
    </item>
    <item>
      <title>Re: Ping from Outside allowed but not enabled on Outside ACL.</title>
      <link>https://community.cisco.com/t5/network-security/ping-from-outside-allowed-but-not-enabled-on-outside-acl/m-p/3824096#M6477</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;The following acl is allowing your outside subnet to access your internal subnet:&lt;BR /&gt;&lt;BR /&gt;access-list outside_access_in extended permit ip object Site_P_Outside_Lan object-group DM_INLINE_NETWORK_2&lt;BR /&gt;&lt;BR /&gt;Remove it and your ping won't work anymore.&lt;BR /&gt;</description>
      <pubDate>Fri, 22 Mar 2019 03:52:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-from-outside-allowed-but-not-enabled-on-outside-acl/m-p/3824096#M6477</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2019-03-22T03:52:40Z</dc:date>
    </item>
    <item>
      <title>Re: Ping from Outside allowed but not enabled on Outside ACL.</title>
      <link>https://community.cisco.com/t5/network-security/ping-from-outside-allowed-but-not-enabled-on-outside-acl/m-p/3824871#M6478</link>
      <description>&lt;P&gt;That is if&amp;nbsp;&lt;SPAN&gt;192.168.1.217 is the IP on the outside PC.&amp;nbsp; With no actual information on where in the network these IPs are allocated, it is difficult to know where the issue is.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You could run a packet-tracer to see what rule is actually allowing the traffic.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 23 Mar 2019 16:05:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-from-outside-allowed-but-not-enabled-on-outside-acl/m-p/3824871#M6478</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2019-03-23T16:05:24Z</dc:date>
    </item>
    <item>
      <title>Re: Ping from Outside allowed but not enabled on Outside ACL.</title>
      <link>https://community.cisco.com/t5/network-security/ping-from-outside-allowed-but-not-enabled-on-outside-acl/m-p/3824894#M6479</link>
      <description>Right. Ok I thought I must choose the icmp service to allow it but I guess that is allowed on all ip suite.</description>
      <pubDate>Sat, 23 Mar 2019 18:37:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-from-outside-allowed-but-not-enabled-on-outside-acl/m-p/3824894#M6479</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2019-03-23T18:37:57Z</dc:date>
    </item>
    <item>
      <title>Re: Ping from Outside allowed but not enabled on Outside ACL.</title>
      <link>https://community.cisco.com/t5/network-security/ping-from-outside-allowed-but-not-enabled-on-outside-acl/m-p/3824896#M6480</link>
      <description>&lt;P&gt;Also, if I ping from Outside machine to Inside I don't even see the pings (echo request and reply) in the Real-time log viewer. I am filtering using Outside ip subnet or filtering everything and still don't see it. See attached while running -t&lt;/P&gt;</description>
      <pubDate>Sat, 23 Mar 2019 18:49:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-from-outside-allowed-but-not-enabled-on-outside-acl/m-p/3824896#M6480</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2019-03-23T18:49:08Z</dc:date>
    </item>
    <item>
      <title>Re: Ping from Outside allowed but not enabled on Outside ACL.</title>
      <link>https://community.cisco.com/t5/network-security/ping-from-outside-allowed-but-not-enabled-on-outside-acl/m-p/3824900#M6481</link>
      <description>Shouldn't I see echo-reply and request in the logs?</description>
      <pubDate>Sat, 23 Mar 2019 19:04:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-from-outside-allowed-but-not-enabled-on-outside-acl/m-p/3824900#M6481</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2019-03-23T19:04:05Z</dc:date>
    </item>
    <item>
      <title>Re: Ping from Outside allowed but not enabled on Outside ACL.</title>
      <link>https://community.cisco.com/t5/network-security/ping-from-outside-allowed-but-not-enabled-on-outside-acl/m-p/3825260#M6482</link>
      <description>What's your final config today and what is the source IP and destination IP?&lt;BR /&gt;&lt;BR /&gt;Have you ran a packet-tracer to see if the traffic is allowed? Because of it isn't then you wouldn't see any echo-reply.</description>
      <pubDate>Mon, 25 Mar 2019 03:46:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-from-outside-allowed-but-not-enabled-on-outside-acl/m-p/3825260#M6482</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2019-03-25T03:46:10Z</dc:date>
    </item>
    <item>
      <title>Re: Ping from Outside allowed but not enabled on Outside ACL.</title>
      <link>https://community.cisco.com/t5/network-security/ping-from-outside-allowed-but-not-enabled-on-outside-acl/m-p/3825950#M6483</link>
      <description>Hi!&lt;BR /&gt;Sorry I did not realize that ICMP falls under IP and would be allowed if I am allowing IP in a rule.</description>
      <pubDate>Tue, 26 Mar 2019 01:36:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-from-outside-allowed-but-not-enabled-on-outside-acl/m-p/3825950#M6483</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2019-03-26T01:36:23Z</dc:date>
    </item>
  </channel>
</rss>

