<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dynamic Access list on ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dynamic-access-list-on-asa/m-p/3216890#M1047244</link>
    <description>&lt;P&gt;Hi Mikael&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for your reply.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is no dynamic access policy or filter configured on both firewalls unless there is a default one.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regarding SSH. I am trying to SSH to the remote firewall from the behind the headoffice firewall But I am bypassing the VPN tunnel for SSH connection. I can see the packets reaches at the remote firewall but return traffic is directed to the VPN tunnel which causes SSH connection failure.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let me know if you need more information regarding SSH.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Ibrahim&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 15 Nov 2017 09:58:58 GMT</pubDate>
    <dc:creator>mibrahim</dc:creator>
    <dc:date>2017-11-15T09:58:58Z</dc:date>
    <item>
      <title>Dynamic Access list on ASA</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-access-list-on-asa/m-p/3216342#M1047214</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;
&lt;P&gt;I have got an ASA on the main site connected to few ASAs on the remote site through VPN. On remote site ASAs there are dynamic ACLs created which cannot be seen in the configuration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But when I issue the command "show access-list" then they can be seen. Don't know why they have been created. It shows like as below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#800000"&gt;&lt;STRONG&gt;&lt;EM&gt;access-list AO_temp_vpn.hosted10; 1 elements; name hash: 0xa6a80175 (dynamic)&lt;/EM&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#800000"&gt;&lt;STRONG&gt;&lt;EM&gt;access-list AO_temp_vpn.hosted10 line 1 extended permit ip host 10.222.1.9 host 172.16.1.217 (hitcnt=20183) 0x3ced7956 &lt;/EM&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is no ACL created with the name &lt;EM&gt;&lt;FONT color="#800000"&gt;AO_temp_vpn.hosted10&lt;/FONT&gt;&lt;/EM&gt;. However the IP addresses shown in the ACL are the endpoints of the VPN. On one of the remote site ASA, I am trying to SSH the outside interface but I am unable to connect and everytime I try to connect I see the hitcount on the above ACL.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does anyone know why the ACL was automatically created? Secondly why SSH traffic is hitting the ACL when it is not matching the interested VPN traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The ASAs are running code&amp;nbsp;8.6(1)12&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks in Advance&lt;/P&gt;
&lt;P&gt;Ibrahim&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:45:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-access-list-on-asa/m-p/3216342#M1047214</guid>
      <dc:creator>mibrahim</dc:creator>
      <dc:date>2020-02-21T14:45:02Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Access list on ASA</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-access-list-on-asa/m-p/3216528#M1047226</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;Sounds like your are using DAP or Filter on the head-end device.&lt;BR /&gt;So when the remote "client" connects to the vpn it will download a dynamic acl to the remove client.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/99103-pix-asa-vpn-filter.html#anc6" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/99103-pix-asa-vpn-filter.html#anc6&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;For SSH question I have no idea, you need to give more information.&lt;BR /&gt;&lt;BR /&gt;br, Micke&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2017 19:40:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-access-list-on-asa/m-p/3216528#M1047226</guid>
      <dc:creator>mikael.lahtela</dc:creator>
      <dc:date>2017-11-14T19:40:51Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Access list on ASA</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-access-list-on-asa/m-p/3216890#M1047244</link>
      <description>&lt;P&gt;Hi Mikael&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for your reply.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is no dynamic access policy or filter configured on both firewalls unless there is a default one.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regarding SSH. I am trying to SSH to the remote firewall from the behind the headoffice firewall But I am bypassing the VPN tunnel for SSH connection. I can see the packets reaches at the remote firewall but return traffic is directed to the VPN tunnel which causes SSH connection failure.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let me know if you need more information regarding SSH.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Ibrahim&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Nov 2017 09:58:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-access-list-on-asa/m-p/3216890#M1047244</guid>
      <dc:creator>mibrahim</dc:creator>
      <dc:date>2017-11-15T09:58:58Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Access list on ASA</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-access-list-on-asa/m-p/3306086#M1047271</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The problem has been fixed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The VPN tunnels were configured using Answer-Only option in Crypto Map on the remote site firewalls.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The dynamic ACL was also related to the Answer-Only option and for some reason the return traffic for SSH connection was hitting that ACL.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The problem was resolved by removing and Answer-Only option and putting it back in the Crypto Map.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The tunnel is now up with Answer-only option and I am also able to SSH to the outside interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Muhammad Ibrahim&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jan 2018 14:54:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-access-list-on-asa/m-p/3306086#M1047271</guid>
      <dc:creator>mibrahim</dc:creator>
      <dc:date>2018-01-04T14:54:59Z</dc:date>
    </item>
  </channel>
</rss>

