03-26-2023 01:19 AM
Hi,
The result I am trying to achieve is blocking the ICMP traffic from 192.168.100.101 pc (inside traffic) to 192.168.101.00/24 (outside) trafic.
I've configured an ACL, but for some reason the ICMP still travel through ASA:
access-list outside line 1 extended permit icmp any any
access-list outside line 2 extended deny icmp host 192.168.100.101 192.168.101.0 255.255.255.0 echo
access-list outside line 2 extended deny icmp host 192.168.100.101 192.168.101.0 255.255.255.0 echo-reply
access-list outside line 2 extended deny icmp host 192.168.100.101 192.168.101.0 255.255.255.0 unreachable
access-group outside in interface outside
Any thoughts why ICMP is still traveling from 192.168.100.101 to 192.168.101.100?
Thanks in advance.
03-26-2023 11:20 PM - edited 03-26-2023 11:43 PM
Hi,
You applied the ACL on the wrong interface. Also, the first line allows all ICMP traffic making the rest of lines useless.
You want to apply the ACL inbound on inside. Based on your description, 192.168.100.101 belongs to inside.
BR,
Octavian
03-26-2023 11:28 PM
access-list outside line 1 extended permit icmp any any
This make all icmp allow
You need to delete this acl line and add it again with line number make it in tail of acl not in top
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide