-1

We want to block any ICMP requests that are initiated to our network from the public internet. I ran icmp deny any outside, but when I do that, it takes down our internet - nobody can load web pages. Removing it by running no icmp deny any outside fixes the problem. What am I missing here?

sa289
  • 1,318
  • 2
  • 18
  • 44

1 Answers1

3

What you're missing is: First, ICMP, at least in part, is required for proper functioning of the Internet. Second, blocking pings is completely pointless; it has no security benefits whatsoever, and can cause you trouble later on when you decide you need to be able to ping your device from outside for troubleshooting or other reasons.

If you're really determined to "block pings" directed at your ASA then you can do that by specifying the ICMP type (echo-request, which Cisco for some reason simply calls echo) you want to block.

icmp deny any echo outside
Michael Hampton
  • 244,070
  • 43
  • 506
  • 972
  • Same issue when I run that command. Could someone not reflect ping responses using a spoofed IP if we don't block it? Thanks – sa289 Mar 10 '16 at 01:15
  • 1
    Something very strange is wrong with your setup if you lost connectivity by running that. As for "reflect ping responses using a spoofed IP" it doesn't matter as the ASA [won't respond to broadcast pings by default](http://www.cisco.com/c/en/us/td/docs/security/asa/asa72/command/reference/cmd_ref/i1_72.html#wp1631466). There's nothing you need to do. Unicast pings aren't an issue since there's no way to amplify it. – Michael Hampton Mar 10 '16 at 01:17