08-24-2020 10:40 AM - edited 08-24-2020 10:42 AM
hi everyone
A routing flow is asymmetric.
A icmp request comes in another route.
Then icmp reply goes to ASA.
ASA forwards the packets from inside to inside by static route
I've used to tcp_state_bypass feature to clear this issue.
But icmp isn't successful.
If i disable 'inspect icmp' of global policy, ping is successful
Instead, ping from inside to outside isn't successful.
I don't know how to handle this.
thank you
best regards
08-24-2020 11:18 AM
08-24-2020 09:54 PM
Hi
this is by design.
i'm going to suggest topology change.
But i want to know how i can fix it without topology change.
thank you
best regards
10-09-2020 05:43 AM
Hi all,
we have exactly the same issue.
Asymmetric routing by design.
Resolved tcp connectivity with tcp_state_bypass, but we have problem with icmp (ICMP Inspect seq num not matched).
Opened ticket with TAC and the response was to disable icmp inception and allow traffic to Access Control Policy.
Is this solution correct from security perspective, since icmp inspection is global to the FTD?
Is there another better solution?
Thank you.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide