<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ping &amp; tracerout through firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ping-tracerout-through-firewall/m-p/1049181#M878752</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I just ran a packet capture, results:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RESULTS - The packet is dropped&lt;/P&gt;&lt;P&gt;Info : (rpf violated) Reverse-path verify failed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried to remove the following but still unable to ping:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface Outside&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface Inside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 16 Dec 2008 16:46:48 GMT</pubDate>
    <dc:creator>ronshuster</dc:creator>
    <dc:date>2008-12-16T16:46:48Z</dc:date>
    <item>
      <title>ping &amp; tracerout through firewall</title>
      <link>https://community.cisco.com/t5/network-security/ping-tracerout-through-firewall/m-p/1049178#M878749</link>
      <description>&lt;P&gt;I am trying to get a few workstations to ping and traceroute to the Internet via an ASA5520.  I have a permit ip any any for all incoming traffic hitting the inside interface and still unable to ping\traceroute the Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any idea?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:26:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-tracerout-through-firewall/m-p/1049178#M878749</guid>
      <dc:creator>ronshuster</dc:creator>
      <dc:date>2019-03-11T14:26:39Z</dc:date>
    </item>
    <item>
      <title>Re: ping &amp; tracerout through firewall</title>
      <link>https://community.cisco.com/t5/network-security/ping-tracerout-through-firewall/m-p/1049179#M878750</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Roni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is hard to say what is wrong without the configuration. Have you already configured the NAT, ACL, etc and also you mention few clients, does this mean the other workstations are working. I hope the below URL helps:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Arul&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*Pls rate if it helps*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Dec 2008 16:15:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-tracerout-through-firewall/m-p/1049179#M878750</guid>
      <dc:creator>ajagadee</dc:creator>
      <dc:date>2008-12-16T16:15:53Z</dc:date>
    </item>
    <item>
      <title>Re: ping &amp; tracerout through firewall</title>
      <link>https://community.cisco.com/t5/network-security/ping-tracerout-through-firewall/m-p/1049180#M878751</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Our internet access works perfectly ok from a NAT &amp;amp; PAT &amp;amp; ACL stand point... only thing is that we cannot ping &amp;amp; traceroute to the Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a permit ip any any on all traffic incoming the INSIDE interface.  Is that sufficient or do I need to apply the following as well:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any any source-quench &lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any any unreachable  &lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any any time-exceeded&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Dec 2008 16:23:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-tracerout-through-firewall/m-p/1049180#M878751</guid>
      <dc:creator>ronshuster</dc:creator>
      <dc:date>2008-12-16T16:23:39Z</dc:date>
    </item>
    <item>
      <title>Re: ping &amp; tracerout through firewall</title>
      <link>https://community.cisco.com/t5/network-security/ping-tracerout-through-firewall/m-p/1049181#M878752</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I just ran a packet capture, results:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RESULTS - The packet is dropped&lt;/P&gt;&lt;P&gt;Info : (rpf violated) Reverse-path verify failed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried to remove the following but still unable to ping:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface Outside&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface Inside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Dec 2008 16:46:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-tracerout-through-firewall/m-p/1049181#M878752</guid>
      <dc:creator>ronshuster</dc:creator>
      <dc:date>2008-12-16T16:46:48Z</dc:date>
    </item>
    <item>
      <title>Re: ping &amp; tracerout through firewall</title>
      <link>https://community.cisco.com/t5/network-security/ping-tracerout-through-firewall/m-p/1049182#M878753</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you're using the asa, you also need to configure the ICMP inspection using the icmp permit command set;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g. &lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;icmp permit echo-reply outside&lt;/P&gt;&lt;P&gt;icmp permit unreachable outside&lt;/P&gt;&lt;P&gt;icmp permit traceroute outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P-J Nefkens&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Dec 2008 21:08:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-tracerout-through-firewall/m-p/1049182#M878753</guid>
      <dc:creator>nefkensp</dc:creator>
      <dc:date>2008-12-16T21:08:27Z</dc:date>
    </item>
    <item>
      <title>Re: ping &amp; tracerout through firewall</title>
      <link>https://community.cisco.com/t5/network-security/ping-tracerout-through-firewall/m-p/1049183#M878754</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above lines need to be applied on the outside interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any any source-quench&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any any unreachable&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any any time-exceeded &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group 101 in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OR&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The other option is to enable inspection:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;    policy-map global_policy&lt;/P&gt;&lt;P&gt;        class inspection_default&lt;/P&gt;&lt;P&gt;         inspect icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please refer the below URL for details:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094e8a.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Arul&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*Pls rate if it helps*&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Dec 2008 22:23:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ping-tracerout-through-firewall/m-p/1049183#M878754</guid>
      <dc:creator>ajagadee</dc:creator>
      <dc:date>2008-12-16T22:23:44Z</dc:date>
    </item>
  </channel>
</rss>

