ICMP pinging.

Heya fellas,

I just noticed this last night after playing and configuring my PIX 501 for like 3 weeks. My problem is my LAN can not ping outside world. I can ping inside from outisde, but not vice versa. I did managed to get it to ping outside, but only if I added a specfic lines in my config, if by doing that my other service will not run(ftp,port 8080,3389,etc). Im going paste my config here, so you guru's can take a look whats really wrong with it. If I put these line back everything work, but we cannot ping outside of the LAN.

"access-group inbound in interface outside"( cannot ping outside, but all my serivces will run)

NOW THIS.

"199pix(config)# no access-group 103 in interface outside" "access-list 103 permit icmp any any echo-reply" (with this 2 lines, my LAN can PING outside, but none of my ftp,mail,web will run)

------- SNIP ------------- PIX Version 6.3(5)

interface ethernet0 auto

interface ethernet1 100full

nameif ethernet0 outside security0

nameif ethernet1 inside security100

enable password xxxxxxxxx

passwd xxxxx

hostname 199pix

domain-name katapole

fixup protocol dns maximum-length 512

fixup protocol ftp 21

fixup protocol h323 h225 1720

fixup protocol h323 ras 1718-1719

fixup protocol http 80

fixup protocol ils 389

fixup protocol rsh 514

fixup protocol rtsp 554

fixup protocol sip 5060

fixup protocol sip udp 5060

fixup protocol skinny 2000

fixup protocol smtp 25

fixup protocol sqlnet 1521

fixup protocol tftp 69

names

name 192.168.1.13 Elfa

access-list 103 permit icmp any any echo-reply

access-list inbound permit tcp any interface outside eq 8080

access-list inbound permit tcp any interface outside eq smtp

access-list inbound permit tcp any interface outside eq 3389

access-list inbound permit tcp any interface outside eq ftp

pager lines 24

mtu outside 1500

mtu inside 1500

ip address outside pppoe setroute

ip address inside 192.168.1.1 255.255.255.0

ip audit info action alarm

ip audit attack action alarm

pdm location 192.168.1.2 255.255.255.255 inside

pdm location 192.168.1.0 255.255.255.255 outside

pdm location Elfa 255.255.255.255 inside

pdm location 192.168.1.17 255.255.255.255 inside

pdm logging informational 100

pdm history enable

arp timeout 14400

global (outside) 1 interface

nat (inside) 1 0.0.0.0 0.0.0.0 0 0

static (inside,outside) tcp interface 3389 192.168.1.2 3389 netmask

255.255.255.255 0 0

static (inside,outside) tcp interface 8080 192.168.1.2 8080 netmask

255.255.255.255 0 0

static (inside,outside) tcp interface smtp 192.168.1.2 smtp netmask

255.255.255.255 0 0

static (outside,inside) tcp 192.168.1.2 smtp 192.168.1.0 smtp netmask

255.255.255.255 0 0

static (inside,outside) tcp interface ftp Elfa ftp netmask 255.255.255.255 0

0

access-group inbound in interface outside

timeout xlate 0:05:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225

1:00:00

timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00

timeout sip-disconnect 0:02:00 sip-invite 0:03:00

timeout uauth 0:05:00 absolute

aaa-server TACACS+ protocol tacacs+

aaa-server TACACS+ max-failed-attempts 3

aaa-server TACACS+ deadtime 10

aaa-server RADIUS protocol radius

aaa-server RADIUS max-failed-attempts 3

aaa-server RADIUS deadtime 10

aaa-server LOCAL protocol local

aaa authentication telnet console LOCAL

http server enable

http 192.168.1.0 255.255.255.0 inside

no snmp-server location

no snmp-server contact

snmp-server community public

no snmp-server enable traps

floodguard enable

telnet 192.168.1.0 255.255.255.0 inside

telnet timeout 45

ssh timeout 5

console timeout 0

vpdn group pppoe_group request dialout pppoe

vpdn group pppoe_group localname ikendo

vpdn group pppoe_group ppp authentication pap

vpdn username username password *********

dhcpd lease 3600

dhcpd ping_timeout 750199pix(config)# access-list 100 permit icmp any any echo-reply

199pix(config)# access-group 100 in interface outside

199pix(config)# no access-list 102 permit icmp any any

199pix(config)# no access-list 103 permit ip any any

199pix(config)# no access-group 103 in interface outside

access-list 100 permit icmp any any echo-reply

dhcpd auto_config outside

username admin password 1ZXpWLcm3C.25OQ/ encrypted privilege 15

terminal width 80

Cryptochecksum:xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

Reply to
news
Loading thread data ...

add the global command "icmp permit any inside" Also add: access-list inbound permit icmp any any echo-reply access-list inbound permit icmp any any time-exceeded

Reply to
Brian V

Do I need to remove my old access-list, before I add these 3 lines in?

Reply to
kennylee88

Does this look right to you guys?

global (outside) 1 interface access-list inbound permit icmp any any echo-reply access-list inbound permit icmp any any time-exceeded

Reply to
kennylee88

You do not need to remove the old acl. The new will just add to the bottom of it. Not sure how or why you changed the inside ICMP command to a NAT statement. You should be adding 3 lines to your config. The first line allows ping from inside, the second line allows the ping reply to come back in, the third line allows you to do trace routes from inside to an outside IP.

conf t icmp permit any inside access-list inbound permit icmp any any echo-reply access-list inbound permit icmp any any time-exceeded exit wr mem

Reply to
Brian V

Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.