cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
448
Views
0
Helpful
1
Replies

Return Ping Packets blocked by Pix Firewall

kuldeep.kaur
Level 1
Level 1

Hi Guys,

I have a rule from inside interface (security 100) to ping a server on a DMZ interface (secuirty 40). But I dont have the same rule other way around (from dmz to inside). When I do a ping the return ping packet from DMZ interface is dropped by the firewall.

Any idea why? Do I really need a rule for return ping traffic as well.

Tks

1 Accepted Solution

Accepted Solutions

Nagaraja Thanthry
Cisco Employee
Cisco Employee

Hello,

What code version you are running? With ICMP packet in each direction is

treated as a separate flow. If you have not enabled ICMP inspection (or icmp

fixup) then the firewall will drop the return icmp traffic. In that case,

you need to exclusively allow return ICMP traffic through access-lists.

http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note0918

6a0080094e8a.shtml

Hope this helps.

Regards,

NT

View solution in original post

1 Reply 1

Nagaraja Thanthry
Cisco Employee
Cisco Employee

Hello,

What code version you are running? With ICMP packet in each direction is

treated as a separate flow. If you have not enabled ICMP inspection (or icmp

fixup) then the firewall will drop the return icmp traffic. In that case,

you need to exclusively allow return ICMP traffic through access-lists.

http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note0918

6a0080094e8a.shtml

Hope this helps.

Regards,

NT

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card