01-02-2018 11:30 AM - edited 02-21-2020 07:03 AM
Hello All,
I have one query on ASA while working on GNS3.
1.I am successfully able to deny the telnet traffic from inside to outside using ACL by placing it on IN direction of INSIDE interface of ASA.
2.But not able to allow ICMP from inside to outside by placing ACL on same direction as mentioned in point 1.
3.I tried applying ACL on different directions and got success only on when applying on IN direction on OUTSIDE inside interface.
4.I tried with different scenario as well.
5.With MPF, i could able to allow ICMP.
Please see below logs-
Could you please tell me why there is a difference in results in Scenerio 1 and Scenerio 2 and and what is wrong in other scenerio.
Topology-
R1>>>>INSIDE>>>>>>ASA<<<<<OUTSIDE<<<<<R2
telnet denied
ciscoasa(config)# show run | i access
access-list inside_access extended deny tcp any any eq telnet
access-group inside_access in interface INSIDE
ping working
ciscoasa(config)#sh run | i access
access-list inside_access extended permit icmp any any
access-group inside_access in interface OUTSIDE
Ping not working
ciscoasa(config)# sh run | i access
access-list inside_access extended permit icmp any any
access-group inside_access out interface INSIDE
ciscoasa(config)# sh run | i access
access-list inside_access extended permit icmp any any
access-group inside_access in interface INSIDE
ciscoasa(config)# sh run | i access
access-list inside_access extended permit icmp any any
access-group inside_access OUT interface OUTSIDE
Solved! Go to Solution.
01-05-2018 01:31 PM - edited 01-05-2018 01:36 PM
Hi V Kalsi,
Hope you are doing good.
First of all wishing you a very happy new year.
For understand ing this you need to understand the behaviour of security levels in ASA.
When you are pinging from Inside (higher security level) to outside (lower security level), traffic is allowed by default. An acl is not required on interface with High security level until there is no other "allow" rule configured.
So in your case ACL is not required on inside interface,.
Secondly, for return traffic also you dont require an ACL on outside interface.
Just remove the acl on outside interface (for icmp). and run the command "fixup protocol icmp."
It will enable the icmp inspection and all icmp return traffic will be allowed without requitring an acl.
But since ICMP inspection is not enabled on your device, hence the below config is providing you a workaround by allowing the return traffic (with help of ACL.)
ciscoasa(config)#sh run | i access
access-list inside_access extended permit icmp any any
access-group inside_access in interface OUTSIDE
Ideally the above config is only required to permit "outside traffic to inside."
Please mark this post as helpful and accept it as solution if it resolves your concern.
BR
shivdube
EX-CISCO TAC Engg
01-02-2018 02:33 PM
By default, ICMP is not inspected statefully on the ASA. That can be easily enabled with "fixup protocol icmp".
01-03-2018 10:10 AM
01-03-2018 12:07 PM
Typically, you only have one ACL per direction. Most admins configure on incoming ACL per interface and each ACL controls the traffic that is initiated on that interface. Given that you enabled the statefullness of ICMP, the inside-in-ACL controls the ping (and of course all other traffic) that is initiated from inside and sent to any other interface, the outside-in-ACL does the same for traffic initiated on the outside.
If you combine incoming and outgoing ACLs on the ASA, all ACLs in the direction of the initiating traffic has to allow it.
That means: If you have an ACL incoming on the inside interface and outgoing on the outside interface, both have to allow the traffic.
01-05-2018 01:31 PM - edited 01-05-2018 01:36 PM
Hi V Kalsi,
Hope you are doing good.
First of all wishing you a very happy new year.
For understand ing this you need to understand the behaviour of security levels in ASA.
When you are pinging from Inside (higher security level) to outside (lower security level), traffic is allowed by default. An acl is not required on interface with High security level until there is no other "allow" rule configured.
So in your case ACL is not required on inside interface,.
Secondly, for return traffic also you dont require an ACL on outside interface.
Just remove the acl on outside interface (for icmp). and run the command "fixup protocol icmp."
It will enable the icmp inspection and all icmp return traffic will be allowed without requitring an acl.
But since ICMP inspection is not enabled on your device, hence the below config is providing you a workaround by allowing the return traffic (with help of ACL.)
ciscoasa(config)#sh run | i access
access-list inside_access extended permit icmp any any
access-group inside_access in interface OUTSIDE
Ideally the above config is only required to permit "outside traffic to inside."
Please mark this post as helpful and accept it as solution if it resolves your concern.
BR
shivdube
EX-CISCO TAC Engg
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide