<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: inspecting ICMP on ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/inspecting-icmp-on-asa/m-p/3745397#M8996</link>
    <description>What network are you sourcing traffic from, the inside network? Are you natting the traffic on the outside interface?&lt;BR /&gt;If you are not natting, does the other device have a route back to that network?&lt;BR /&gt;&lt;BR /&gt;Run packet-tracer and upload the output.&lt;BR /&gt;&lt;BR /&gt;E.g. - packet-tracer input inside icmp &amp;lt;src ip&amp;gt; 8 0 &amp;lt;dst ip&amp;gt;</description>
    <pubDate>Mon, 12 Nov 2018 22:43:31 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2018-11-12T22:43:31Z</dc:date>
    <item>
      <title>inspecting ICMP on ASA</title>
      <link>https://community.cisco.com/t5/network-security/inspecting-icmp-on-asa/m-p/3745343#M8991</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;
&lt;P&gt;I am in the process of setting up ASA for home lab . In the process have attempted to configure inspection of icmp traffic and was following a doucument I&amp;nbsp; got online. At a point,&amp;nbsp; &amp;nbsp;when enter&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; class-map type inspect&lt;/P&gt;
&lt;P&gt;command it does take icmp or show icmp as an option ( see attached screen capture).&lt;/P&gt;
&lt;P&gt;Please share if is there is other way of doing&amp;nbsp;achieving this or the problem ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:27:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inspecting-icmp-on-asa/m-p/3745343#M8991</guid>
      <dc:creator>mestasew1</dc:creator>
      <dc:date>2020-02-21T16:27:45Z</dc:date>
    </item>
    <item>
      <title>Re: inspecting ICMP on ASA</title>
      <link>https://community.cisco.com/t5/network-security/inspecting-icmp-on-asa/m-p/3745353#M8992</link>
      <description>Hi,&lt;BR /&gt;Try this:-&lt;BR /&gt;&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect icmp&lt;BR /&gt;&lt;BR /&gt;or "fixup protocol icmp"</description>
      <pubDate>Mon, 12 Nov 2018 21:18:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inspecting-icmp-on-asa/m-p/3745353#M8992</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-11-12T21:18:31Z</dc:date>
    </item>
    <item>
      <title>Re: inspecting ICMP on ASA</title>
      <link>https://community.cisco.com/t5/network-security/inspecting-icmp-on-asa/m-p/3745356#M8993</link>
      <description>&lt;P&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; &amp;nbsp;inspect icmp&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;regards, mk&lt;/P&gt;
&lt;P&gt;please rate if helpful or solved &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Nov 2018 21:19:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inspecting-icmp-on-asa/m-p/3745356#M8993</guid>
      <dc:creator>mkazam001</dc:creator>
      <dc:date>2018-11-12T21:19:41Z</dc:date>
    </item>
    <item>
      <title>Re: inspecting ICMP on ASA</title>
      <link>https://community.cisco.com/t5/network-security/inspecting-icmp-on-asa/m-p/3745392#M8994</link>
      <description>&lt;P&gt;Hi RJI,&lt;/P&gt;
&lt;P&gt;I thank you for your prompt response. I see now the command you provided helped to list icmp as one&amp;nbsp; of the&amp;nbsp;default inspected&amp;nbsp; protocol. but I could not still get a ping response from a device connected to the outside interface. I can get a response from the outside device when&amp;nbsp;ping&amp;nbsp; from the ASA itself but if clients connected to inside interface the ping will time out.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. The outside router is directly connected to the ASA with outside interface with the same ip address space&lt;/P&gt;
&lt;P&gt;2. My inside interface is configured with different subnet&amp;nbsp;with&amp;nbsp; dhcp enabled with gateway of the inside interface address&lt;/P&gt;
&lt;P&gt;3. The route is configured to point to forward&amp;nbsp;unknown network (0/0) traffic to&amp;nbsp; the outside router.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So do you think this is ICMP issue with firewall or another problem ?&lt;/P&gt;</description>
      <pubDate>Mon, 12 Nov 2018 22:34:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inspecting-icmp-on-asa/m-p/3745392#M8994</guid>
      <dc:creator>mestasew1</dc:creator>
      <dc:date>2018-11-12T22:34:10Z</dc:date>
    </item>
    <item>
      <title>Re: inspecting ICMP on ASA</title>
      <link>https://community.cisco.com/t5/network-security/inspecting-icmp-on-asa/m-p/3745393#M8995</link>
      <description>Thank you for your response. is there a way to verify the configuration other than pinging devices?</description>
      <pubDate>Mon, 12 Nov 2018 22:37:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inspecting-icmp-on-asa/m-p/3745393#M8995</guid>
      <dc:creator>mestasew1</dc:creator>
      <dc:date>2018-11-12T22:37:08Z</dc:date>
    </item>
    <item>
      <title>Re: inspecting ICMP on ASA</title>
      <link>https://community.cisco.com/t5/network-security/inspecting-icmp-on-asa/m-p/3745397#M8996</link>
      <description>What network are you sourcing traffic from, the inside network? Are you natting the traffic on the outside interface?&lt;BR /&gt;If you are not natting, does the other device have a route back to that network?&lt;BR /&gt;&lt;BR /&gt;Run packet-tracer and upload the output.&lt;BR /&gt;&lt;BR /&gt;E.g. - packet-tracer input inside icmp &amp;lt;src ip&amp;gt; 8 0 &amp;lt;dst ip&amp;gt;</description>
      <pubDate>Mon, 12 Nov 2018 22:43:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inspecting-icmp-on-asa/m-p/3745397#M8996</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-11-12T22:43:31Z</dc:date>
    </item>
    <item>
      <title>Re: inspecting ICMP on ASA</title>
      <link>https://community.cisco.com/t5/network-security/inspecting-icmp-on-asa/m-p/3745466#M8997</link>
      <description>&lt;P&gt;Check 1: On ASA, make sure you have ACL on Outside interface permitting ICMP from router towards inside.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check 2: reverse route to inside network on router, if NAT is not configured on the ASA.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;or Configure NAT/PAT for inside network on ASA.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check 3: After above Check 1 &amp;amp; 2. run ping and do packet capture on outside interface of ASA and inside interface of router.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if above&amp;nbsp;doesn't&amp;nbsp;resolve, can you past ASA and router config and packet capture of Outside interface ASA and Inside interface of Router?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Nov 2018 03:43:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inspecting-icmp-on-asa/m-p/3745466#M8997</guid>
      <dc:creator>k.nandakumar</dc:creator>
      <dc:date>2018-11-13T03:43:13Z</dc:date>
    </item>
    <item>
      <title>Re: inspecting ICMP on ASA</title>
      <link>https://community.cisco.com/t5/network-security/inspecting-icmp-on-asa/m-p/3746040#M8998</link>
      <description>Mk,&lt;BR /&gt;&lt;BR /&gt;I thank you for your suggestion.&lt;BR /&gt;&lt;BR /&gt;1 . there is no any ACL applied .  the idea is to use the icmp inspection rule with out an acl.&lt;BR /&gt;2. NAT is not used and configured.&lt;BR /&gt;&lt;BR /&gt;let me try a couple of suggested settings and will share results.</description>
      <pubDate>Tue, 13 Nov 2018 18:53:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inspecting-icmp-on-asa/m-p/3746040#M8998</guid>
      <dc:creator>mestasew1</dc:creator>
      <dc:date>2018-11-13T18:53:33Z</dc:date>
    </item>
    <item>
      <title>Re: inspecting ICMP on ASA</title>
      <link>https://community.cisco.com/t5/network-security/inspecting-icmp-on-asa/m-p/3746060#M8999</link>
      <description>RJI,&lt;BR /&gt;Yes,I am sourcing the traffic from inside network. attempting to reach network connected on the outside interface of the Firewall . this outside network segment is assigned  with private IP address. I am not using NAT at this point . However this device is a gateway for my internet. &lt;BR /&gt;It can be considered that the firewall is between two local area networks.&lt;BR /&gt;I will share the results of the packet tracer .</description>
      <pubDate>Tue, 13 Nov 2018 19:17:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inspecting-icmp-on-asa/m-p/3746060#M8999</guid>
      <dc:creator>mestasew1</dc:creator>
      <dc:date>2018-11-13T19:17:56Z</dc:date>
    </item>
    <item>
      <title>Re: inspecting ICMP on ASA</title>
      <link>https://community.cisco.com/t5/network-security/inspecting-icmp-on-asa/m-p/3747073#M9000</link>
      <description>please see the results of the packet tracer. Can we say something from this ? I donot say any drop&lt;BR /&gt;XXXX# packet-tracer input inside icmp 192.168.7.68 8 0 192.168.0.253&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 192.168.0.253 using egress ifc outside:conisp1&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;  inspect icmp&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Phase: 8&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 78, packet dispatched to next module&lt;BR /&gt;Result:&lt;BR /&gt;output-interface: conisp1&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;BR /&gt;</description>
      <pubDate>Thu, 15 Nov 2018 02:57:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inspecting-icmp-on-asa/m-p/3747073#M9000</guid>
      <dc:creator>mestasew1</dc:creator>
      <dc:date>2018-11-15T02:57:41Z</dc:date>
    </item>
    <item>
      <title>Re: inspecting ICMP on ASA</title>
      <link>https://community.cisco.com/t5/network-security/inspecting-icmp-on-asa/m-p/3747394#M9001</link>
      <description>&lt;P&gt;Running a packet capture on Router would show if it receives packet or not.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Nov 2018 14:15:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inspecting-icmp-on-asa/m-p/3747394#M9001</guid>
      <dc:creator>k.nandakumar</dc:creator>
      <dc:date>2018-11-15T14:15:54Z</dc:date>
    </item>
  </channel>
</rss>

