Book now with code EOY2025
access-list msngr permit icmp any any
sprkymrk wrote: I think if you do a show run you should see something like:access-group msngr in interface interface name That will tell you if the access list in question is in use.
pr3d4t0r wrote: From my experience allowing icmp like any any is not so good. I know that troubleshooting will be more difficult this way but it can save your network. Allow specific icmp types only and from a specific host, e.g NMS or something. I don't know how many of you happen to know backdoors that are triggered by icmp requests. After that reverse shell over 80 and gg. The above is an advanced technique that works. (believe me).
Mishra wrote: I went back to this subject today... Thinking about it a little more, I agree that you need to allow ICMP requests on the outside access list. And I think I will use my desktop as the NMS. I have a PIX 515 BTW. >_< I think I will add access-list hole permit icmp any mydesktop then add a host entry in the pix since it isn't using DNS
(config)# access-list hole permit icmp mydesktop any
tech-airman wrote: Mishra wrote: I went back to this subject today... Thinking about it a little more, I agree that you need to allow ICMP requests on the outside access list. And I think I will use my desktop as the NMS. I have a PIX 515 BTW. >_< I think I will add access-list hole permit icmp any mydesktop then add a host entry in the pix since it isn't using DNS Mishra, Disclaimer: I only know ACLs to the CCNA level. If you're wanting to troubleshoot, aka ping FROM your desktop TO destinations on the internet, then wouldn't the following be better?(config)# access-list hole permit icmp mydesktop any
Mishra wrote: tech-airman wrote: Mishra wrote: I went back to this subject today... Thinking about it a little more, I agree that you need to allow ICMP requests on the outside access list. And I think I will use my desktop as the NMS. I have a PIX 515 BTW. >_< I think I will add access-list hole permit icmp any mydesktop then add a host entry in the pix since it isn't using DNS Mishra, Disclaimer: I only know ACLs to the CCNA level. If you're wanting to troubleshoot, aka ping FROM your desktop TO destinations on the internet, then wouldn't the following be better?(config)# access-list hole permit icmp mydesktop any I'm applying the access-list on the outside interface... Which would mean that I am trying to allow ICMP requests to be allowed to come to my desktop. I already allow all traffic to go outbound. So wouldn't the source be any and the destination be my desktop?
tech-airman wrote: Mishra, Yes, it is correct that the source be any and the destination be your desktop. However, that would also permit your desktop to be detected by anyone on the internet and also open your desktop to potential DoS or DDos attacks. It will have to be your decision if the cost of security is worth the benefit of the added capability.
Mishra wrote: tech-airman wrote: Mishra, Yes, it is correct that the source be any and the destination be your desktop. However, that would also permit your desktop to be detected by anyone on the internet and also open your desktop to potential DoS or DDos attacks. It will have to be your decision if the cost of security is worth the benefit of the added capability. Thanks for the responses. Yeah I need to be able to ping things that way that I can do pingpaths and/or tracert/traceroutes in order to see what traffic is doing in my network. If someone wants to somehow find my desktop and spam it then they are welcome to. ^_^ I think the firewall may still detect these events.
sprkymrk wrote: Mishra wrote: tech-airman wrote: Mishra, Yes, it is correct that the source be any and the destination be your desktop. However, that would also permit your desktop to be detected by anyone on the internet and also open your desktop to potential DoS or DDos attacks. It will have to be your decision if the cost of security is worth the benefit of the added capability. Thanks for the responses. Yeah I need to be able to ping things that way that I can do pingpaths and/or tracert/traceroutes in order to see what traffic is doing in my network. If someone wants to somehow find my desktop and spam it then they are welcome to. ^_^ I think the firewall may still detect these events. Mishra: If you want, on the outside access list, instead of allowing ICMP, allow the specific type of ICMP such as ICMP-echo-reply. That way it will not allow all types, like the ICMP-echo-request.
glorfindal2000 wrote: sprkymrk wrote: Mishra: If you want, on the outside access list, instead of allowing ICMP, allow the specific type of ICMP such as ICMP-echo-reply. That way it will not allow all types, like the ICMP-echo-request. Just to add to the above, you'll also want to allow these icmp types back through: time-exceeded unreachable
sprkymrk wrote: Mishra: If you want, on the outside access list, instead of allowing ICMP, allow the specific type of ICMP such as ICMP-echo-reply. That way it will not allow all types, like the ICMP-echo-request.
Use code EOY2025 to receive $250 off your 2025 certification boot camp!