08-27-2013 06:33 AM - edited 03-11-2019 07:31 PM
Hello everyone
Please help
I am aware that you cant ping through Cisco ASA firewall unless icmp is inspected or ACLs are created, the problem i have been having so far is that although I have ACLs configured to allow icmp, echo reply on the outside interface, I still can't ping the outside host (nor the outside interface of ASA), please see attached running-config and topology
software I am using is asdm-641.bin and ASA 5520
Thanks
Solved! Go to Solution.
08-27-2013 08:26 AM
Hi,
Did you confirm the configurations on the router in front of the ASA? Does it have a route for the network behind the ASA? The network 10.0.1.0/24?
Have you confirmed that the device behind the ASA "inside" interface has default gateway configured correctly?
I can't see anything in the ASA configurations that should prevent you from sending ICMP through it.
You could use the "packet-tracer" command to simulate an ICMP Echo and confirm that the rules are correct for it to go through the firewall.
packet-tracer input inside icmp 10.0.1.100 8 0
- Jouni
08-27-2013 06:40 AM
Hi,
Notice that you CAN NOT PING / ICMP an ASA interface behind another interface.
So users behind "inside" interface can ping the "inside" interface IP address and users behind "outside" interface can ping the "outside" interface IP address. This doesnt work for when you are trying to PING / ICMP an interface IP address behind which the host IS NOT located. In other words, you can't ping an interface IP address of ASA across another interface.
You also mentioned that you can't PING / ICMP some host behind the ASA "outside" interface? I presume you mean that some host behind "inside" interface cant PING / ICMP a host behind "outside" interface.
I notice that you dont have any NAT configurations on the ASA so that means that all traffic will go through with their original IP addresses.
So make sure the Router infront of the ASA has a route for the network that is located behind the ASA.
A route like this
ip route 10.0.1.0 255.255.255.0 192.168.1.2
Otherwise the ICMP Echo reply will never reach back to the host.
Other alternative is to configure Dynamic PAT for users behind "inside" interface with the following command
nat (inside,outside) after-auto source dynamic any interface
- Jouni
08-27-2013 06:56 AM
Hi Jouni
Thanks for your reply,
"You also mentioned that you can't PING / ICMP some host behind the ASA "outside" interface? I presume you mean that some host behind "inside" interface cant PING / ICMP a host behind "outside" interface.", That is exactly what I meant.
I can ping inside interface on ASA from vmnet2 and vice versa
I can ping outside interface on ASA from LAN and vice versa (a default route has been configured as you can see on the running-config)
does NAT have to be configured in this case for ping to take place?
I am only new to networking so I am probably asking dumb question, (pardon me if I am)
thanks
08-27-2013 07:24 AM
Hi,
Was I was thinking looking at your picture was this.
Now imagine the situation where a host 10.0.1.100 sends ICMP Echo to the remote host 172.16.1.100
Naturally if you have a Static route configured on the Router that tells the router that the network 10.0.1.0/24 is found behind the ASA then there must be some other problem.
If you were to configure Dynamic PAT translation for the hosts on the network 10.0.1.0/24 they would be translated to the IP address 192.168.1.2 of the ASA. This would essentially remove the above problem with missing route as the users would be visible with another IP address to the LAN 172.16.1.0/24 and therefore the ICMP Echo reply would find its way back to the ASA (and the host 10.0.1.100). Mainly because the router sees the network 192.168.1.0/24 as directly connected and therefore knows where to forward traffic destined to the IP 192.168.1.2 (that is used for Dynamic PAT)
Hope this makes sense
- Jouni
08-27-2013 07:44 AM
This totally makes sense, Thanks a lot Jouni
I must ve configured something wrong, the problem still stands, still cant ping through the firewall (cant ping the remote host)
i havent created any service policy for icmp inspection, would that be the cause? (but i have created ACLs for this purpose tho)
Regards
08-27-2013 08:26 AM
Hi,
Did you confirm the configurations on the router in front of the ASA? Does it have a route for the network behind the ASA? The network 10.0.1.0/24?
Have you confirmed that the device behind the ASA "inside" interface has default gateway configured correctly?
I can't see anything in the ASA configurations that should prevent you from sending ICMP through it.
You could use the "packet-tracer" command to simulate an ICMP Echo and confirm that the rules are correct for it to go through the firewall.
packet-tracer input inside icmp 10.0.1.100 8 0
- Jouni
08-28-2013 12:22 AM
Hi Jouni, sorry about the lateness in reply, I finished work at 4pm yesterday.
I have created a route on the router in front of ASA: -
ip route 10.0.1.0 255.255.255.0 192.168.1.2
the device behind the ASA inside interface has a default gateway of 192.168.1.2 (which is the outside interface ip address of the ASA)
I will give packet-tracer a try and report back later today
Thanks
08-28-2013 04:43 AM
Hi Jouni
It is working now!!!!!!!!!! Thanks so much for your help
you were absolutely right on your last post
"Have you confirmed that the device behind the ASA "inside" interface has default gateway configured correctly?"
I didnt, I got the wrong gateway address for the inside host, instead of giving it the default gateway address of the inside interface address of ASA (10.0.1.1), I gave it the outside interface address (192.168.1.2).. (as I mentioned before, I am a newbie lol)
so I entered the right default way address, created a ACL to permit icmp (didnt even bother with echo-reply) and then IT WORKED..
I double checked the default gateway address on the outside host just in case and it appeared to be the right one
No NAT configured yet
Thanks again for your help Jouni
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide