<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ICMP Stateful in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/icmp-stateful/m-p/1471267#M708954</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Most of us knows that ICMP is not a stateful protocol, and we can make it using ICMP inspection in ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As per my understanding,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In TCP, TCP Flags are making TCP capable of stateful protocol, In UDP, src and dst port numbers playing the role to make it stateful.. But what makes ICMP to become stateful!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Manu B.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 17:56:58 GMT</pubDate>
    <dc:creator>manuadoor</dc:creator>
    <dc:date>2019-03-11T17:56:58Z</dc:date>
    <item>
      <title>ICMP Stateful</title>
      <link>https://community.cisco.com/t5/network-security/icmp-stateful/m-p/1471267#M708954</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Most of us knows that ICMP is not a stateful protocol, and we can make it using ICMP inspection in ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As per my understanding,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In TCP, TCP Flags are making TCP capable of stateful protocol, In UDP, src and dst port numbers playing the role to make it stateful.. But what makes ICMP to become stateful!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Manu B.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:56:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-stateful/m-p/1471267#M708954</guid>
      <dc:creator>manuadoor</dc:creator>
      <dc:date>2019-03-11T17:56:58Z</dc:date>
    </item>
    <item>
      <title>Re: ICMP Stateful</title>
      <link>https://community.cisco.com/t5/network-security/icmp-stateful/m-p/1471268#M708955</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The ASA builds a ICMp connection for the icmp echoes that is sees. It creates a session based on the identification/sequence number of the icmp header, it's source and destination ip addresses and its type and code. So, it knows what the icmp reply for that packet will look like and it will allow the return traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it clarifies it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Jun 2010 14:43:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/icmp-stateful/m-p/1471268#M708955</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-06-09T14:43:08Z</dc:date>
    </item>
  </channel>
</rss>

