<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX ICMP problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-icmp-problem/m-p/188316#M712016</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks a lot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you suggested, I have removed option "drop" from info sigs, but left it on attack sigs.&lt;/P&gt;&lt;P&gt;This allowed ICMPs.  Then I created ACLs to deny ICMPs, except for specific stations.  Everything is OK, except the minor detail, which I can live with.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can not deny ICMPs from inside to their default gateway (E1 on Pix)  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the part that regards to ACLs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Ping_in permit icmp host X.X.X.149 any&lt;/P&gt;&lt;P&gt;access-list Ping_in deny icmp any any&lt;/P&gt;&lt;P&gt;access-list Ping_in deny ip any any&lt;/P&gt;&lt;P&gt;access-list Ping_out permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list Ping_out deny icmp any any&lt;/P&gt;&lt;P&gt;access-list Ping_out permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip audit name out-info info action alarm&lt;/P&gt;&lt;P&gt;ip audit name out-attack attack action alarm drop&lt;/P&gt;&lt;P&gt;ip audit interface inside out-info&lt;/P&gt;&lt;P&gt;ip audit interface inside out-attack&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group Ping_in in interface outside&lt;/P&gt;&lt;P&gt;access-group Ping_out in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyhow, thanks for all the help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 27 Aug 2003 21:45:29 GMT</pubDate>
    <dc:creator>spalislam</dc:creator>
    <dc:date>2003-08-27T21:45:29Z</dc:date>
    <item>
      <title>PIX ICMP problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-icmp-problem/m-p/188311#M711832</link>
      <description>&lt;P&gt;Once I turn on ip audit name XXX infor and ip audit name action with drop option, I can't ping my firewall, or devices behind it any more.  That is fine.  However, I created an ACL to allow these ICMPs to go through, but they get dropped regardless of ACL.  ICMP packets go through only when I remove "drop" option from ip audit command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any suggestions?  Help?&lt;/P&gt;&lt;P&gt;I would like to be able to ping several devices behind the firewall and not to turn of "drop" option of ip audit name XXX action and info.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.1(4)&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password xxxxx encrypted&lt;/P&gt;&lt;P&gt;passwd xxxxxxxencrypted&lt;/P&gt;&lt;P&gt;hostname TE-TEST&lt;/P&gt;&lt;P&gt;domain-name weber.edu&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol h323 1720&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list Ping_in permit icmp host X.X.8.210 any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging console notifications&lt;/P&gt;&lt;P&gt;&amp;lt;--- More ---&amp;gt;&lt;/P&gt;&lt;P&gt;            &lt;/P&gt;&lt;P&gt;logging monitor notifications&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging history notifications&lt;/P&gt;&lt;P&gt;interface ethernet0 100full&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside X.X.8.178 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address inside 192.168.8.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;failover timeout 0:00:00&lt;/P&gt;&lt;P&gt;failover poll 15&lt;/P&gt;&lt;P&gt;failover ip address outside 0.0.0.0&lt;/P&gt;&lt;P&gt;failover ip address inside 0.0.0.0&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 X.X.8.20-X.X.8.175&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) X.X.8.171 192.168.8.171 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-group Ping_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 X.X.8.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;no sysopt route dnat&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SP&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:57:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-icmp-problem/m-p/188311#M711832</guid>
      <dc:creator>spalislam</dc:creator>
      <dc:date>2020-02-21T06:57:15Z</dc:date>
    </item>
    <item>
      <title>Re: PIX ICMP problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-icmp-problem/m-p/188312#M711879</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is that your IP audit commands "trump" the ACL that you created.  In IOS, we do have the ability to add an ACL to certain sigs so they are detected from/to certain hosts and ignored from/to others.  However, the PIX does not offer this level of granularity.  Your best bet is going to be disabling the signatures you do not want the PIX detecting by using the following command - 'ip audit signature signature_number disable'.  Or you can set the informational alarms to an action of alarm only (no real need generally to drop these packets).  However, the config above is not complete so I don't know if you are running into a problem here as well.  Take a look here for some info on the various 'ip audit' commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway, hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2003 21:15:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-icmp-problem/m-p/188312#M711879</guid>
      <dc:creator>scoclayton</dc:creator>
      <dc:date>2003-08-26T21:15:19Z</dc:date>
    </item>
    <item>
      <title>Re: PIX ICMP problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-icmp-problem/m-p/188313#M711917</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This time, with the link.  Sorry!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/cmdref/gl.htm#1101884" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/cmdref/gl.htm#1101884&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2003 21:20:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-icmp-problem/m-p/188313#M711917</guid>
      <dc:creator>scoclayton</dc:creator>
      <dc:date>2003-08-26T21:20:32Z</dc:date>
    </item>
    <item>
      <title>Re: PIX ICMP problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-icmp-problem/m-p/188314#M711945</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the info.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have read in PIX manual that I can assign ACL to that specific signature and filter out ACL traffic before it gets to the signature.  However, how do I know which signature number is used for ICMP ECHO, and ICMP Reply?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2003 21:49:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-icmp-problem/m-p/188314#M711945</guid>
      <dc:creator>spalislam</dc:creator>
      <dc:date>2003-08-26T21:49:18Z</dc:date>
    </item>
    <item>
      <title>Re: PIX ICMP problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-icmp-problem/m-p/188315#M711982</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Actually, you cannot apply an ACL to the audit command.  This is a feature in IOS IDS but not in PIX IDS.  Your only option to streamline the signatures is to either have them turned on or off.  As for indentifying the exact sigs you are hitting, you would probably need to setup a syslog server to be absolutely sure which sigs were causing the packet drop.  In your case however, I would say that you are probably seeing sig ID 2000.  Take a look at the following link for a complete list of all of the sigs that the PIX looks for - &lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/63syslog/pixemsgs.htm#1138590" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/63syslog/pixemsgs.htm#1138590&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note that a lot of the ICMP sigs are "Informational" which means that you can enable the action on your "Informational" sigs (alarm) to be less than the actions on your "Attack" sigs (alarm, drop, and reset).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Aug 2003 01:38:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-icmp-problem/m-p/188315#M711982</guid>
      <dc:creator>scoclayton</dc:creator>
      <dc:date>2003-08-27T01:38:30Z</dc:date>
    </item>
    <item>
      <title>Re: PIX ICMP problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-icmp-problem/m-p/188316#M712016</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks a lot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you suggested, I have removed option "drop" from info sigs, but left it on attack sigs.&lt;/P&gt;&lt;P&gt;This allowed ICMPs.  Then I created ACLs to deny ICMPs, except for specific stations.  Everything is OK, except the minor detail, which I can live with.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can not deny ICMPs from inside to their default gateway (E1 on Pix)  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the part that regards to ACLs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Ping_in permit icmp host X.X.X.149 any&lt;/P&gt;&lt;P&gt;access-list Ping_in deny icmp any any&lt;/P&gt;&lt;P&gt;access-list Ping_in deny ip any any&lt;/P&gt;&lt;P&gt;access-list Ping_out permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list Ping_out deny icmp any any&lt;/P&gt;&lt;P&gt;access-list Ping_out permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip audit name out-info info action alarm&lt;/P&gt;&lt;P&gt;ip audit name out-attack attack action alarm drop&lt;/P&gt;&lt;P&gt;ip audit interface inside out-info&lt;/P&gt;&lt;P&gt;ip audit interface inside out-attack&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group Ping_in in interface outside&lt;/P&gt;&lt;P&gt;access-group Ping_out in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyhow, thanks for all the help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Aug 2003 21:45:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-icmp-problem/m-p/188316#M712016</guid>
      <dc:creator>spalislam</dc:creator>
      <dc:date>2003-08-27T21:45:29Z</dc:date>
    </item>
  </channel>
</rss>

