<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Request help on a PIX 515E - will not ping from CLI to outsi in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/request-help-on-a-pix-515e-will-not-ping-from-cli-to-outside/m-p/1347692#M814813</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kevin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There's no built-in fixup protocol for ICMP. The firewall allows the outbound traffic for icmp but drops the return traffic. To be able to do a ping from inside hosts to outside, you need to add a line on your acl that will permit icmp to pass thru.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Incoming SMTP traffic to frog&lt;BR /&gt;access-list outside_access_in permit tcp any gt 1023 host frog eq smtp&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit icmp any any ---&amp;gt; try to add this line&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;** Note ** I assume that you want to send icmp traffic from inside to outside for connectivity testing only. I suggest that&amp;nbsp; you remove the "permit icmp any any" once you're done with your testing for best practice.&lt;BR /&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 22 Dec 2009 05:08:53 GMT</pubDate>
    <dc:creator>wotishalang</dc:creator>
    <dc:date>2009-12-22T05:08:53Z</dc:date>
    <item>
      <title>Request help on a PIX 515E - will not ping from CLI to outside</title>
      <link>https://community.cisco.com/t5/network-security/request-help-on-a-pix-515e-will-not-ping-from-cli-to-outside/m-p/1347689#M814773</link>
      <description>&lt;P&gt;Hi:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to learn about the Cisco security products such as the PIX and ASA products so when the security staff speak to me about things they need to accomplish, I do not come across as a complete fool. To become a bit more "aware", I decided to set up a tiny lab and see what a PIX can really accomplish and to learn more about what the staff is trying to do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Having configured it both with the command line and also with an attempt using the web interface, I am still unable to pass traffic from the inside to the outside. I am sure it is something really stupid. I did buy the Cisco book (Cisco Secure PIX firewalls - very useful) and tried to use some of the examples in this book.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Attached is my configuration. I have removed the sensitive data of the test and the external public network. The PIX sits behind an edge router which has public IP on both sides.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas would be great. I am sure it is a simple issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kevin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.3(3)&lt;BR /&gt;interface ethernet0 100full&lt;BR /&gt;interface ethernet1 100full&lt;BR /&gt;interface ethernet2 100full&lt;BR /&gt;nameif ethernet0 outside security0&lt;BR /&gt;nameif ethernet1 inside security100&lt;BR /&gt;nameif ethernet2 dmz security50&lt;BR /&gt;hostname gateway&lt;BR /&gt;domain-name example.com&lt;BR /&gt;fixup protocol dns maximum-length 512&lt;BR /&gt;fixup protocol ftp 21&lt;BR /&gt;fixup protocol h323 h225 1720&lt;BR /&gt;fixup protocol h323 ras 1718-1719&lt;BR /&gt;fixup protocol http 80&lt;BR /&gt;fixup protocol http 8080&lt;BR /&gt;fixup protocol mgcp 2424&lt;BR /&gt;fixup protocol mgcp 2727&lt;BR /&gt;no fixup protocol rsh 514&lt;BR /&gt;fixup protocol rtsp 554&lt;BR /&gt;fixup protocol sip 5060&lt;BR /&gt;fixup protocol sip udp 5060&lt;BR /&gt;fixup protocol skinny 2000&lt;BR /&gt;fixup protocol smtp 25&lt;BR /&gt;no fixup protocol sqlnet 1521&lt;BR /&gt;fixup protocol tftp 69&lt;BR /&gt;names&lt;BR /&gt;name 192.168.0.126 frog&lt;BR /&gt;access-list outside_access_in remark Incoming SMTP traffic to frog&lt;BR /&gt;access-list outside_access_in permit tcp any gt 1023 host frog eq smtp&lt;BR /&gt;pager lines 150&lt;BR /&gt;logging on&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging trap informational&lt;BR /&gt;logging history warnings&lt;BR /&gt;logging host inside natalie&lt;BR /&gt;icmp permit 111.111.111.0 255.255.255.0 echo outside&lt;BR /&gt;icmp permit 192.168.0.0 255.255.255.0 echo inside&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;ip address outside 111.111.111.10 255.255.255.0&lt;BR /&gt;ip address inside 192.168.0.254 255.255.255.0&lt;BR /&gt;ip address dmz 172.16.3.1 255.255.255.0&lt;BR /&gt;ip audit name outside info action alarm&lt;BR /&gt;ip audit interface outside outside&lt;BR /&gt;ip audit info action alarm&lt;BR /&gt;ip audit attack action alarm&lt;BR /&gt;pdm logging debugging 100&lt;BR /&gt;pdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 111.111.111.8-111.111.111.9 netmask 255.255.255.0&lt;BR /&gt;nat (inside) 1 192.168.0.0 255.255.255.0 0 0&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 111.1.111.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;BR /&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;aaa-server TACACS+ protocol tacacs+&lt;BR /&gt;aaa-server RADIUS protocol radius&lt;BR /&gt;aaa-server LOCAL protocol local&lt;BR /&gt;http server enable&lt;BR /&gt;http 111.111.111.0 255.255.255.0 outside&lt;BR /&gt;http 192.168.0.0 255.255.0.0 inside&lt;BR /&gt;snmp-server enable traps&lt;BR /&gt;floodguard enable&lt;BR /&gt;sysopt connection tcpmss 1500&lt;BR /&gt;telnet 192.168.0.0 255.255.255.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;url-block url-mempool 2&lt;BR /&gt;url-block url-size 2&lt;BR /&gt;terminal width 100&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:51:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/request-help-on-a-pix-515e-will-not-ping-from-cli-to-outside/m-p/1347689#M814773</guid>
      <dc:creator>kgreene2</dc:creator>
      <dc:date>2019-03-11T16:51:06Z</dc:date>
    </item>
    <item>
      <title>Re: Request help on a PIX 515E - will not ping from CLI to outsi</title>
      <link>https://community.cisco.com/t5/network-security/request-help-on-a-pix-515e-will-not-ping-from-cli-to-outside/m-p/1347690#M814780</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What traffic is failing?&lt;/P&gt;&lt;P&gt;You say unable to ping from CLI to outside. You tried to ping 111.1.111.1 from the firewall and that didn't work?&lt;/P&gt;&lt;P&gt;You may want to remove this line for now until you get done testing so, ICMP is not restricted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;icmp permit 111.111.111.0 255.255.255.0 echo outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat/route/permission look good.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Add the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fixup protocol icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For other broken traffic pls. check the logs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh logg | i x.x.x.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where x.x.x.x is the ip address of a test host on the inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Dec 2009 03:54:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/request-help-on-a-pix-515e-will-not-ping-from-cli-to-outside/m-p/1347690#M814780</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2009-12-22T03:54:32Z</dc:date>
    </item>
    <item>
      <title>Re: Request help on a PIX 515E - will not ping from CLI to outsi</title>
      <link>https://community.cisco.com/t5/network-security/request-help-on-a-pix-515e-will-not-ping-from-cli-to-outside/m-p/1347691#M814796</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did the changes you suggested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The log entries are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;gateway# show logging | grep 111.111.111.1&lt;BR /&gt;400010: IDS:2000 ICMP echo reply from 111.111.111.1 to 111.111.111.10 on interface outside&lt;BR /&gt;313001: Denied ICMP type=0, code=0 from 111.111.111.1 on interface 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So it looks like there is some rule that is not allowing echo-replys back to the inside user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also tried this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;gateway# clear xlate&lt;BR /&gt;gateway# ping 111.111.111.1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 111.111.111.1 NO response received -- 1000ms&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 111.111.111.1 NO response received -- 1000ms&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 111.111.111.1 NO response received -- 1000ms&lt;BR /&gt;gateway#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kevin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Dec 2009 04:14:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/request-help-on-a-pix-515e-will-not-ping-from-cli-to-outside/m-p/1347691#M814796</guid>
      <dc:creator>kgreene2</dc:creator>
      <dc:date>2009-12-22T04:14:54Z</dc:date>
    </item>
    <item>
      <title>Re: Request help on a PIX 515E - will not ping from CLI to outsi</title>
      <link>https://community.cisco.com/t5/network-security/request-help-on-a-pix-515e-will-not-ping-from-cli-to-outside/m-p/1347692#M814813</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kevin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There's no built-in fixup protocol for ICMP. The firewall allows the outbound traffic for icmp but drops the return traffic. To be able to do a ping from inside hosts to outside, you need to add a line on your acl that will permit icmp to pass thru.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Incoming SMTP traffic to frog&lt;BR /&gt;access-list outside_access_in permit tcp any gt 1023 host frog eq smtp&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit icmp any any ---&amp;gt; try to add this line&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;** Note ** I assume that you want to send icmp traffic from inside to outside for connectivity testing only. I suggest that&amp;nbsp; you remove the "permit icmp any any" once you're done with your testing for best practice.&lt;BR /&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Dec 2009 05:08:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/request-help-on-a-pix-515e-will-not-ping-from-cli-to-outside/m-p/1347692#M814813</guid>
      <dc:creator>wotishalang</dc:creator>
      <dc:date>2009-12-22T05:08:53Z</dc:date>
    </item>
    <item>
      <title>Re: Request help on a PIX 515E - will not ping from CLI to outsi</title>
      <link>https://community.cisco.com/t5/network-security/request-help-on-a-pix-515e-will-not-ping-from-cli-to-outside/m-p/1347693#M814855</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Notice the syslogs say IDS...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try to remove these lines.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip audit name outside info action alarm&lt;BR /&gt;ip audit interface outside outside&lt;BR /&gt;ip audit info action alarm&lt;BR /&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, the ACL that you apply on the outside interface to permit replies is only for "THROUGH" the box traffic only when you ping from an inside host. You mentioned you are ping-ing from the firewall CLI so, that is "TO" and "FROM" the box traffic. ACL applied on the interface will not have any effect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Dec 2009 12:54:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/request-help-on-a-pix-515e-will-not-ping-from-cli-to-outside/m-p/1347693#M814855</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2009-12-22T12:54:37Z</dc:date>
    </item>
  </channel>
</rss>

