08-04-2010 11:24 PM - edited 03-11-2019 11:21 AM
Dear all,
recently I faced a problem when we launched HP OV monitoring system. It is required to ping all enabled interfaces on ASA. "Inside" interface is monitored well but "Outside" is unavailable by ICMP and due to this alarm generated. I know that PIX's and ASA's with 7.x versions of software don't allow to do this (this is clearly noticed in documentation, here for example). But in documentation for version 8.2 (actually this version software installed now) I can't find any information regarding this question. I wonder if I missed something and such function was enabled in recent versions of software?
Cheers,
Dmitriy
Solved! Go to Solution.
08-05-2010 11:40 AM
Hi Dmitriy,
Jitendriya is correct--it is still not possible to ping a far-side interface on the ASA. This is by design and cannot be changed due to security restrictions. Here is the documentation for 8.2 that outlines this:
http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/i1.html#wp1697623
The adaptive security appliance only responds to ICMP traffic sent to the interface that traffic comes in on; you cannot send ICMP traffic through an interface to a far interface.
-Mike
08-04-2010 11:39 PM
i think its still not possible but i can confirm on that, its more of a security feature which doesnt let u ping accross the asa and dont htin kthat would change
in any case i can confirm tht
08-05-2010 11:40 AM
Hi Dmitriy,
Jitendriya is correct--it is still not possible to ping a far-side interface on the ASA. This is by design and cannot be changed due to security restrictions. Here is the documentation for 8.2 that outlines this:
http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/i1.html#wp1697623
The adaptive security appliance only responds to ICMP traffic sent to the interface that traffic comes in on; you cannot send ICMP traffic through an interface to a far interface.
-Mike
08-04-2010 11:40 PM
Hello,
Take a look here, maybe you know it:
http://www.cisco.com/en/US/docs/security/asa/asa72/command/reference/m_72.html#wp1794331
What is the feedback?
Best regards
08-04-2010 11:47 PM
That’s is only to access the interface on the other side through the vpn tunnel
The idea behind this is since you are using vpn to get in through the outside, there is no reason why I should be denying you from accessing the firewall using my inside ip because ideally vpn means internal (network that u trust) so they are like your inside
This feature is mainly introduced to manage the firewall through the vpn
This command works only for the vpn traffic and also you can configure only 1 interface as management-access
Hope this helps
08-06-2010 02:30 AM
Thanks a lot to all of you, guys. I will keep in mind that this is not possible.
Best regrads,
Dmitriy
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: