Maybe that command has changed on the ASA, try 'show running' instead. It will list the entire config and there should be an entry for the access-group in there.
Sorry, I'm fairly new to this within the last year, so bear with me.
The only group settings in the show run are the following:
tunnel-group (where each peer is listed)
isakmp policy 1 group 2
isakmp policy 2 group 2
isakmp policy 3 group 1
group-lock none
group-policy DfltGrpPolicy attributes (bunch listed under that indented)
That's it.
I might not have a outside ACL group setup. Can I just enter what you have above, or does it need a group name?
Yes you will create a group when you enter the command i listed above. In my example, the group is called outside_in but youcan call it whatever you prefer.
access-list outside-acl extended permit icmp any any echo-reply
access-list outside-acl extended permit icmp any any time-exceeded
access-list outside-acl extended permit icmp any any unreachable
access-group outside-acl in interface outside.
I did this but then he told me there was a problem:
Please issue the following command:
show sysopt
It appears that you don’t have the following enabled:
sysopt connection permit-ipsec
This command bypasses ACLs for IPSec traffic. In fact please delete the command: “access-group outside-acl in interface Outside” until this is done. Otherwise, new tunnels will be unable to form.
Make an object group (looks nicer than so many ACL lines)
object-group icmp-type icmp_messages
description ICMP group type to include PING responses
icmp-object echo-reply
icmp-object unreachable
icmp-object time-exceeded
fixup protocol icmp error (allows NATing of icmp error messages)
Supergrrover's post should work for you. Is this traffic coming through a tunnel? On the Pix and ASAs applying a access-list to an interface does not kill ipsec connections for that interface. They are implied allows if enabled unlike routers.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.