Interfaces will not respond to ICMP from host routing by other interfaces.
ASA自身接口地址不回应icmp ping request(从远端路由过来的主机)。
直连的设备可以ping通ASA自身接口地址。
same-security-traffic permit inter-interface
默认情况下:
高安全级别接口到低安全级别接口:ping不通 (因为ping回包没有放行)
https://community.cisco.com/t5/security-blogs/cisco-asa-and-icmp-inspection/ba-p/3773485
https://networkdirection.net/articles/firewalls/icmpinspection/
https://www.tunnelsup.com/cisco-asa-order-of-operation/
低安全级别接口到低高安全级别接口:ping不通
这样做的效果:
高安全级别接口到低安全级别接口:可以ping通
低安全级别接口到高安全级别接口:ping不通
为什么ping不通呢,因为inspect icmp使得icmp变成statuful从而可以被asa追踪-这有个条件(数据流中的第一个包需要满足安全策略的条件,低安全级别到高安全级别的流量默认是不允许的,所以ping不通),inspect 只会作用于建立起会话的数据流(流中的第2个包开始)。
ACL Evaluation
Please note that ICMP inspection does not bypass all ACLs. An ICMP packet will be allowed through the ASA without an ACL evaluation, only if it is part of an already established session. Like TCP or UDP, the first packet in the ICMP flow must still be evaluated against security policies, and allowed, in order for the flow to be established.
这样做的效果:
高安全级别接口到低安全级别接口:可以ping通
低安全级别接口到高安全级别接口:可以ping通