07-21-2022 06:21 AM
Hi all,
Need to restrict ping to my outside interface of ASA device from internet. I have tried below command but that makes my complete internet went down
icmp deny any echo-reply outside
07-21-2022 08:43 AM
Does the F.W connected direct to internet or there's router
you can create below ACL on the router
deny icmp any {your-public-IPs} {subnet} echo
permit ip any any
07-26-2022 04:07 AM
yes its directly connected to internet. regarding command you suggested i think i have also applied the same. Correct me if im wrong
07-21-2022 09:18 AM
there is control-plane ACL in ASA, you can add this deny icmp to it and it will deny any ICMP target your outside of ASA.
07-21-2022 09:18 AM - edited 07-21-2022 09:28 AM
Don't use an ACL. Instead use the command:
no icmp permit any outside
(assuming the name of the outside interface is "outside").
An ACL generally affects traffic THROUGH the box and not TO the box and, as you discovered, will add an implicit "deny any any" once applied to an interface.
While you can use the control-plane ACL option as @MHM Cisco World suggested it's not necessary for this singular purpose since ASAs have this built-in command already.
07-26-2022 05:05 AM
icmp deny any echo outside
this must be work but,
some routing using IP SLA for track the static route or use IP SLA for routing protocol redundancy,
instead of above command
do
icmp permit <ISP next hop of ASA> echo outside
try this way
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide