<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Inbound TPC connnection denied - despite access list rules in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/inbound-tpc-connnection-denied-despite-access-list-rules/m-p/3757892#M1048614</link>
    <description>&lt;P&gt;do you have this cmd?&lt;/P&gt;&lt;P&gt;access-group outside_in in interface outside&lt;/P&gt;&lt;P&gt;regards, mk&lt;/P&gt;</description>
    <pubDate>Tue, 04 Dec 2018 23:27:56 GMT</pubDate>
    <dc:creator>mkazam001</dc:creator>
    <dc:date>2018-12-04T23:27:56Z</dc:date>
    <item>
      <title>Inbound TPC connnection denied - despite access list rules</title>
      <link>https://community.cisco.com/t5/network-security/inbound-tpc-connnection-denied-despite-access-list-rules/m-p/3757010#M1048562</link>
      <description>&lt;P&gt;So I'm working on moving our citrix enviroment to our new building. However once changing all the ip's and updating the access list rules, it wasn't working. Doing the sh logging command, I see the following blocking the citrix traffic on port 8080:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;Inbound TPC connnection denied from 72.9.2.126/55263 to 72.9.2.127/8080 flags SYN on interface outside&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyone know why this is caused? I'm pretty sure my access-list is allowing port 8080 traffic, as you can see from my config.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;&lt;BR /&gt;&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; description To cable modem&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; description IIS SERVER - THIS is the 72.9.2.126 server&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; description xx&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; description xx&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt; description [This is the 72.9.2.127 server]&lt;BR /&gt; switchport access vlan 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt; description xx&lt;BR /&gt; switchport access vlan 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt; description xx&lt;BR /&gt; switchport access vlan 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt; switchport access vlan 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; bridge-group 1&lt;BR /&gt; security-level 0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan10&lt;BR /&gt; nameif inside&lt;BR /&gt; bridge-group 1&lt;BR /&gt; security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface BVI1&lt;BR /&gt; ip address 72.9.2.128 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name setb.ad.dmz&lt;BR /&gt;object-group network inside_host&lt;BR /&gt; network-object host 208.90.140.23&lt;BR /&gt; network-object host 208.90.140.35&lt;BR /&gt; network-object host 208.90.140.29&lt;BR /&gt; network-object host 208.90.140.163&lt;BR /&gt; network-object host 208.90.140.28&lt;BR /&gt; network-object host 208.90.140.175&lt;BR /&gt; network-object host 208.90.140.27&lt;BR /&gt; network-object host 208.90.140.161&lt;BR /&gt; network-object host 72.9.2.123&lt;BR /&gt; network-object host 72.9.2.120&lt;BR /&gt; network-object host 72.9.2.121&lt;BR /&gt; network-object host 72.9.2.125&lt;BR /&gt; network-object host 72.9.2.126&lt;BR /&gt; network-object host 72.9.2.127&lt;BR /&gt; network-object host 72.9.2.133&lt;BR /&gt; network-object host 72.9.2.134&lt;BR /&gt;access-list inside_access_in extended permit ip any any&lt;BR /&gt;access-list outside_access_in extended permit ip any any&lt;BR /&gt;access-list outside_in extended permit tcp host 72.9.2.125 any eq 8080&lt;BR /&gt;access-list outside_in extended permit tcp host 72.9.2.126 any eq 8080&lt;BR /&gt;access-list outside_in extended permit tcp host 72.9.2.125 object-group inside_host eq 8080&lt;BR /&gt;access-list outside_in extended permit tcp host 72.9.2.126 object-group inside_host eq 8080&lt;BR /&gt;access-list outside_in extended permit tcp object-group inside_host object-group inside_host eq 8080&lt;BR /&gt;access-list outside_in extended permit tcp any host 72.9.2.126 eq www&lt;BR /&gt;access-list outside_in extended permit tcp any host 72.9.2.126 eq https&lt;BR /&gt;access-list outside_in extended permit tcp any host 72.9.2.125 eq https&lt;BR /&gt;access-list outside_in extended permit tcp any host 72.9.2.126 eq 1434&lt;BR /&gt;access-list outside_in extended permit tcp host 72.9.2.126 host 72.9.2.133 eq 1434 inactive&lt;BR /&gt;access-list outside_in extended permit tcp host 72.9.2.126 host 72.9.2.133 eq 1433 inactive&lt;BR /&gt;access-list outside_in extended permit udp host 72.9.2.125 object-group inside_host eq 1434&lt;BR /&gt;access-list outside_in extended permit tcp host 72.9.2.125 object-group inside_host eq 1434&lt;BR /&gt;access-list outside_in extended permit udp host 72.9.2.125 object-group inside_host eq 1433&lt;BR /&gt;access-list outside_in extended permit tcp host 72.9.2.125 object-group inside_host eq 1433&lt;BR /&gt;access-list outside_in extended permit udp host 72.9.2.126 object-group inside_host eq 1434&lt;BR /&gt;access-list outside_in extended permit tcp host 72.9.2.126 object-group inside_host eq 1434&lt;BR /&gt;access-list outside_in extended permit udp host 72.9.2.126 object-group inside_host eq 1433&lt;BR /&gt;access-list outside_in extended permit tcp host 72.9.2.126 object-group inside_host eq 1433&lt;BR /&gt;access-list outside_in extended permit tcp host 72.9.2.126 72.9.2.0 255.255.255.0 eq 135&lt;BR /&gt;access-list outside_in extended permit tcp host 72.9.2.126 host 72.9.2.123 eq ldap&lt;BR /&gt;access-list outside_in extended permit tcp host 72.9.2.126 host 72.9.2.123 eq 88 log&lt;BR /&gt;access-list outside_in extended permit udp host 72.9.2.126 host 72.9.2.123 eq 88&lt;BR /&gt;access-list outside_in extended permit udp host 72.9.2.126 host 72.9.2.123 eq domain&lt;BR /&gt;access-list outside_in extended permit udp host 72.9.2.126 host 72.9.2.123 eq 389&lt;BR /&gt;access-list outside_in extended permit ip host 72.9.2.126 host 72.9.2.123 log&lt;BR /&gt;access-list outside_in extended permit tcp host 72.9.2.126 host 72.9.2.127 eq 8080&lt;BR /&gt;access-list outside_in extended permit tcp host 72.9.2.126 host 72.9.2.123 eq 8080&lt;BR /&gt;access-list outside_in extended permit tcp host 72.9.2.126 host 72.9.2.121 eq 8080&lt;BR /&gt;access-list outside_in extended permit tcp host 72.9.2.126 host 72.9.2.127 eq citrix-ica&lt;BR /&gt;access-list outside_in extended permit tcp host 72.9.2.126 host 72.9.2.133 eq citrix-ica&lt;BR /&gt;access-list outside_in extended permit tcp host 72.9.2.126 host 72.9.2.121 eq citrix-ica&lt;BR /&gt;access-list outside_in extended deny ip any any log&lt;BR /&gt;access-list outside_out extended permit icmp object-group inside_host any&lt;BR /&gt;access-list outside_out extended permit tcp object-group inside_host any&lt;BR /&gt;access-list outside_out extended permit udp object-group inside_host any&lt;BR /&gt;access-list outside_out extended permit tcp host 72.9.2.126 any eq www inactive&lt;BR /&gt;access-list outside_out extended permit tcp host 72.9.2.126 any eq https inactive&lt;BR /&gt;access-list outside_out extended permit tcp host 72.9.2.126 host 72.9.2.127 eq 8080 inactive&lt;BR /&gt;access-list outside_out extended deny ip any any log&lt;BR /&gt;access-list inside_in extended permit udp object-group inside_host any eq domain&lt;BR /&gt;access-list inside_in extended permit tcp object-group inside_host host 72.9.2.126 eq 501&lt;BR /&gt;access-list inside_in extended permit tcp object-group inside_host any eq ftp&lt;BR /&gt;access-list inside_in extended permit tcp object-group inside_host any eq www&lt;BR /&gt;access-list inside_in extended permit tcp object-group inside_host any eq https&lt;BR /&gt;access-list inside_in extended permit udp host 72.9.2.23 any eq domain inactive&lt;BR /&gt;access-list inside_in extended permit tcp host 72.9.2.127 host 72.9.2.125 eq 9669&lt;BR /&gt;access-list inside_in extended deny ip any any log&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:32:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-tpc-connnection-denied-despite-access-list-rules/m-p/3757010#M1048562</guid>
      <dc:creator>hrmcardle0</dc:creator>
      <dc:date>2020-02-21T16:32:05Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound TPC connnection denied - despite access list rules</title>
      <link>https://community.cisco.com/t5/network-security/inbound-tpc-connnection-denied-despite-access-list-rules/m-p/3757890#M1048594</link>
      <description>&lt;P&gt;i see the entry, its specifically allowed here&lt;/P&gt;&lt;PRE&gt;access-list outside_in extended permit tcp host 72.9.2.126 host 72.9.2.127 eq 8080&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;but it will hit this entry first where ALL traffic is allowed anyway&lt;/P&gt;&lt;PRE&gt;access-list outside_access_in extended permit ip any any&lt;/PRE&gt;&lt;P&gt;i've never setup asa in transparent mode so not familiar with this type of config&lt;/P&gt;&lt;P&gt;do you not need to apply the acl to the outside interface ass it has security-level 0 &amp;amp; inside is 100?&lt;/P&gt;&lt;P&gt;regards, mk&lt;/P&gt;</description>
      <pubDate>Tue, 04 Dec 2018 23:24:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-tpc-connnection-denied-despite-access-list-rules/m-p/3757890#M1048594</guid>
      <dc:creator>mkazam001</dc:creator>
      <dc:date>2018-12-04T23:24:21Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound TPC connnection denied - despite access list rules</title>
      <link>https://community.cisco.com/t5/network-security/inbound-tpc-connnection-denied-despite-access-list-rules/m-p/3757892#M1048614</link>
      <description>&lt;P&gt;do you have this cmd?&lt;/P&gt;&lt;P&gt;access-group outside_in in interface outside&lt;/P&gt;&lt;P&gt;regards, mk&lt;/P&gt;</description>
      <pubDate>Tue, 04 Dec 2018 23:27:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-tpc-connnection-denied-despite-access-list-rules/m-p/3757892#M1048614</guid>
      <dc:creator>mkazam001</dc:creator>
      <dc:date>2018-12-04T23:27:56Z</dc:date>
    </item>
  </channel>
</rss>

