Cisco Support Community
Showing results for 
Search instead for 
Did you mean: 

Welcome to Cisco Support Community. We would love to have your feedback.

For an introduction to the new site, click here. And see here for current known issues.

New Member

ICMP Problem

I have a query for you

regarding enabling ICMP on pix.

1) At one site we have pix, we have configured site to siet VPN on

it. At present we have the command "conduit permit icmp any any",

which enables us to ping any of the internet site. But the customer

wants to block any any and in stead of that he wants to allow icmp

from his LAN ( to any of the outside destination. For

achieving this i have tried to define access-list in many ways as

follows but noe is successful. So for that i require your help. The

commands i tried are as follows.

access-list 110 permit icmp any

access-group 110 in inside

conduit permit icmp any

icmp permit echo-reply outside

icmp permit echo outside

The moment i remove the conduit permit icmp any any command and

issue any of the above command i could not ping any of the public


Herewith i am attaching the config file for your kind reference.

Looking forward to your reply, i remain.

Thanks and regards,

Sairam Bharati


INTPIX# sh run

: Saved


PIX Version 6.3(5)

interface ethernet0 auto

interface ethernet1 auto

nameif ethernet0 outside security0

nameif ethernet1 inside security100

enable password xxx fixup protocol dns maximum-length 512

fixup protocol ftp 21

fixup protocol h323 h225 1720

fixup protocol h323 ras 1718-1719

fixup protocol http 80

fixup protocol ils 389

fixup protocol pptp 1723

fixup protocol rsh 514

fixup protocol rtsp 554

fixup protocol sip 5060

fixup protocol sip udp 5060

fixup protocol skinny 2000

fixup protocol smtp 25

fixup protocol sqlnet 1521

fixup protocol tftp 69

no names

access-list 100 permit ip host

access-list 100 permit ip host

pager lines 24

logging on

logging timestamp

logging trap notifications

logging host inside

mtu outside 1500

mtu inside 1500

ip address outside 203.x.x.181

ip address inside

ip audit info action alarm

ip audit attack action alarm

pdm history enable

arp timeout 14400

global (outside) 1 interface

global (outside) 2 203.x.x.169

global (outside) 4 203.x.x.174

global (outside) 5 203.x.x.175

global (outside) 7 203.x.x.180

nat (inside) 0 access-list 100

nat (inside) 7 0 0

nat (inside) 2 0 0

nat (inside) 4 0 0

nat (inside) 5 0 0

nat (inside) 1 0 0

conduit permit icmp any any

route outside 0.0.x.x.197.202.164 1

floodguard enable

sysopt connection permit-ipsec

sysopt connection permit-pptp

crypto ipsec transform-set strong esp-3des esp-md5-hmac

crypto map 4medica 20 ipsec-isakmp

crypto map 4medica 20 match address 100

crypto map 4medica 20 set peer

crypto map 4medica 20 set transform-set strong

crypto map 4medica interface outside

isakmp enable outside

isakmp key ******** address netmask

isakmp nat-traversal 20

isakmp policy 10 authentication pre-share

isakmp policy 10 encryption 3des

isakmp policy 10 hash md5

isakmp policy 10 group 2

isakmp policy 10 lifetime 86400

telnet inside

telnet inside

telnet timeout 5

ssh inside

ssh timeout 5

console timeout 0

url-block url-mempool 1500

url-block url-size 4

terminal width 80


Re: ICMP Problem

For security purposes, avoid posting/incluidng any sensitive information such as Outside interface public IP, username/pwd, enable password and so on.


For testing purposes, try to permit 'icmp any any' to ensure ICMP is not blocked by any other issue, i.e bad routing, wrong nat and so on. If this is successful, narrow down who/which subnet can perform ping.

access-list 110 permit icmp any

access-group 110 in interface inside

The existing nat 1 and global 1 pair is sufficient to allow internal hosts start pinging to outside.

global (outside) 1 interface

nat (inside) 1 0 0

BTW, the 'icmp permit' command is to allow/deny ping to any PIX interface from the directly connected segment. As for the conduit statement, you can use ACL to replace this function. Cisco highly recommended ACL as it's more flexible and provide better control. At any time, ACL automatically preferred by PIX (high precedence).

conduit permit icmp any any ---> may remove this

Hope this helps. Pls rate all useful post(s)


New Member

Re: ICMP Problem

Dear Sir,

This does not solve my problem. I have tried putting ACL many ways. But it does not work. Now i have one question to ask. I have a pix with me. My inside port ip address is and the network connected to it is Now i want to ping any outside public Ip (for ex: The moment i am removing "conduit permit icmp any any", i am unable to ping any public IP.

I have tried with

1)conduit permit icmp any

2)access-list 110 permit icmp any

access-group 110 in interface inside

3)access-list 110 permit icmp any any

But none of them are working except conduit any any.

Any help from yor side will be appreciated by me.


Sairam Bharati



Re: ICMP Problem


In PIX 6.3(5) ICMP is *not* stateful. So if access list 100 is applied on the inside and has a 'permit icmp any any', you would need an access list on the lower security level interface allowing ICMP (ie, permit icmp any any, or, preferably, permit icmp any any eq echo-reply)

So to summarize:

on the inside interface

access-list inside_acl permit icmp any any

on the lower security level (outside?)

access-list outside_acl permit icmp any any eq echo-reply

or (less secure)

access-list outside_acl permit icmp any any

and of course the appropriate access-group statements applying the access-lists to the interface.


Please rate this message if it helps solve some or all of your issue.


Re: ICMP Problem

Jason is absolutely right. You will have to explicity allow the echo-reply on the outside interface. ICMP is not a single connection but 2 connections. One from inside to outside (Echo) and one from outside to inside ( Echo reply).