08-21-2014 03:44 AM - edited 03-11-2019 09:39 PM
Why can't the inside interface with a higher security level on ASA 5545 ping the DMZ interface with a lower security level. No NAT is configured. I expect by default, i should be able to ping a lower security level from an higher security level interface on the ASA.
Solved! Go to Solution.
08-21-2014 05:31 AM
What are you trying exactly? Ping a system on the lower security-level or the lower security-level ASA-interface? The later is not supported on the ASA. Then test it with a ping to a system in the DMZ.
08-21-2014 04:30 AM
If there is no ACL applied to the higher interface that denies the traffic, then the higher security-system can ping the system on the lower level. But with the ASA-defaults, ICMP is not stateful and the replies are dropped. To make it staeful you have to extend your default policy-map:
policy-map global_policy
class inspection_default
inspect icmp
08-21-2014 04:57 AM
Hello Karsten,
Thanks for the reply, have included the command, but still cannot ping the lower interface.
08-21-2014 05:31 AM
What are you trying exactly? Ping a system on the lower security-level or the lower security-level ASA-interface? The later is not supported on the ASA. Then test it with a ping to a system in the DMZ.
08-21-2014 05:43 AM
Hello Karsten,
Thanks a lot. I was pinging the lower security level on the ASA-interface. I can ping a system in the DMZ now.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide