<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ICMP &amp; ICMP Error Inspection in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/icmp-icmp-error-inspection/m-p/1479085#M681565</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are using PAT, then certainly you are hitting this bug. But I stated earlier, it is highly recommended to upgrade the code as 7.0 is very old code.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ashu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 03 May 2010 20:42:35 GMT</pubDate>
    <dc:creator>astripat</dc:creator>
    <dc:date>2010-05-03T20:42:35Z</dc:date>
    <item>
      <title>ICMP &amp; ICMP Error Inspection</title>
      <link>https://community.cisco.com/t5/network-security/icmp-icmp-error-inspection/m-p/1479082#M681562</link>
      <description>&lt;P&gt;I'm currently running PIX 7.0.4.10 and preparing for an ASA conversion.&amp;nbsp; In anticipation of the move I've been cleaning up the configs and decided to turn on ICMP &amp;amp;ICMP Error Inspection so I could get replace the "permit icmp any any" statement on my outside ACL with a more secure option. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, traceroutes from Windows boxes now only show the first and last hops.&amp;nbsp; I tried clearing the xlate, but still no go.&amp;nbsp; If I add the permit statement back in it works.&amp;nbsp; Isn't ICMP Error Inspection supposed to take care of this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am I missing something?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:40:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-icmp-error-inspection/m-p/1479082#M681562</guid>
      <dc:creator>terrygwazdosky</dc:creator>
      <dc:date>2019-03-11T17:40:16Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP &amp; ICMP Error Inspection</title>
      <link>https://community.cisco.com/t5/network-security/icmp-icmp-error-inspection/m-p/1479083#M681563</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inspect icmp error should take care of the traceroute. However, if it does not work, we can try the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list external_access_in extended permit icmp any any unreachable &lt;BR /&gt;access-list external_access_in extended permit icmp any any time-exceeded&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group external_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;BR /&gt; class ttl&lt;BR /&gt;&amp;nbsp; set connection decrement-ttl&lt;BR /&gt;class-map ttl&lt;BR /&gt; match any&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Try after that and see if traceroute works. If it still fails, then please see if you are using PAT, if so, you might be running into this bug. CSCeg53811&amp;nbsp;&amp;nbsp;&amp;nbsp; Outbound traceroute not working with pat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On a sidenote, 7.o is pretty old code and upgrading to 7.2.4 won't be a bad option.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ashu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 May 2010 19:44:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-icmp-error-inspection/m-p/1479083#M681563</guid>
      <dc:creator>astripat</dc:creator>
      <dc:date>2010-05-03T19:44:58Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP &amp; ICMP Error Inspection</title>
      <link>https://community.cisco.com/t5/network-security/icmp-icmp-error-inspection/m-p/1479084#M681564</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When I try to access that bug ID I get: &lt;SPAN style="color: #ff0000;"&gt;"Information contained within bug ID CSCeg53811 is&amp;nbsp; only available to Cisco employees."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using PAT but I'm going to hold off on upgrading the PIX since I'll be going up to the ASA within a week or so.&amp;nbsp; I'll try it again afterwards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 May 2010 20:39:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-icmp-error-inspection/m-p/1479084#M681564</guid>
      <dc:creator>terrygwazdosky</dc:creator>
      <dc:date>2010-05-03T20:39:47Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP &amp; ICMP Error Inspection</title>
      <link>https://community.cisco.com/t5/network-security/icmp-icmp-error-inspection/m-p/1479085#M681565</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are using PAT, then certainly you are hitting this bug. But I stated earlier, it is highly recommended to upgrade the code as 7.0 is very old code.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ashu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 May 2010 20:42:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-icmp-error-inspection/m-p/1479085#M681565</guid>
      <dc:creator>astripat</dc:creator>
      <dc:date>2010-05-03T20:42:35Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP &amp; ICMP Error Inspection</title>
      <link>https://community.cisco.com/t5/network-security/icmp-icmp-error-inspection/m-p/1479086#M681566</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The bug has to do with the embedded icmp packet in the icmp time exceeded not being overrid by the inspection.&lt;/P&gt;&lt;P&gt;You will have no issues with the ASA with newer code I bet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 May 2010 20:44:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-icmp-error-inspection/m-p/1479086#M681566</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-05-03T20:44:38Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP &amp; ICMP Error Inspection</title>
      <link>https://community.cisco.com/t5/network-security/icmp-icmp-error-inspection/m-p/1479087#M681567</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks guys!&amp;nbsp; I spent a few hours troubleshooting this... glad it wasn't just me.&amp;nbsp; &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 May 2010 20:49:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-icmp-error-inspection/m-p/1479087#M681567</guid>
      <dc:creator>terrygwazdosky</dc:creator>
      <dc:date>2010-05-03T20:49:54Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP &amp; ICMP Error Inspection</title>
      <link>https://community.cisco.com/t5/network-security/icmp-icmp-error-inspection/m-p/1479088#M681568</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;STRONG style="color: #000000; "&gt;terrygwazdosky&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;In context to your first statement , i would like to tell you that Outbound traceroute requires access-list on the outside interface for time-exceeded and unreachable (for UDP Traceroute) as just enabling ICMP Inspection and ICMP Error inspection in the policy-map &lt;STRONG&gt;wont &lt;/STRONG&gt;allow the return traffic from the Upstream / Intermediate hops .&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 May 2010 23:34:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-icmp-error-inspection/m-p/1479088#M681568</guid>
      <dc:creator>ankurs2008</dc:creator>
      <dc:date>2010-05-03T23:34:01Z</dc:date>
    </item>
  </channel>
</rss>

