<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Marvin, Just figured out in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asdm-access-issue-on-outside-interface/m-p/2460209#M1050652</link>
    <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just figured out the issue, there were no problems in the ASA configurations. There is an ISP router where PBR is configured where web traffic is redirected to the ADSL line. Just had to add an exception in the access list to get the ASDM working. Thank you for your inputs.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 19 Mar 2014 05:17:10 GMT</pubDate>
    <dc:creator>pmahesh01</dc:creator>
    <dc:date>2014-03-19T05:17:10Z</dc:date>
    <item>
      <title>ASDM access issue on outside interface</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-issue-on-outside-interface/m-p/2460205#M1050601</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have just migrated from a PIX 6.3 to ASA 9.1(1), everything seems to work fine except for the ASDM access from the outside interface. I am able to get ASDM access from the inside interface.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Strangely I am see accepted packets in the logging, but when I telnet on the outside interface on port 443 I am unable to telnet( I am telneting &amp;nbsp;for a public IP).&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone faced similar issues.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address XX.XX.XX.145 255.255.255.248&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.105.1 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object 192.168.105.210 eq 3389&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object 192.168.105.220 eq 3389&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object 192.168.30.31 eq 502&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object 192.168.105.109 eq www&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object 192.168.105.109 eq https&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object 172.16.105.10 eq smtp&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object 172.16.105.10 eq 8000&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object XX.XX.XX.145(outside iInt IP) eq https&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in extended permit tcp object SMTPGW-DMZ any eq domain&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in extended permit tcp object SMTPGW-DMZ any eq www&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in extended permit object HTTPS object SMTPGW-DMZ any&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in extended permit tcp object SMTPGW-DMZ any eq smtp&amp;nbsp;&lt;BR /&gt;access-list DMZ_access_in extended permit ip any any&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit ip any any inactive&amp;nbsp;&lt;BR /&gt;access-list outside_cryptomap extended permit ip object-group DM_INLINE_NETWORK_3 object-group DM_INLINE_NETWORK_4&amp;nbsp;&lt;BR /&gt;access-list spiclient_splitTunnelAcl standard permit 192.168.105.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list spiclient_splitTunnelAcl standard permit 192.168.30.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit ip 192.168.105.0 255.255.255.0 172.16.105.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit ip 192.168.105.0 255.255.255.0 192.168.106.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit ip 192.168.105.0 255.255.255.0 192.168.107.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit ip 192.168.105.0 255.255.255.0 192.168.255.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit udp any any eq domain&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit tcp any any eq www&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit tcp any any eq 8080&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit tcp any any eq https&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit tcp any any eq ftp-data&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit tcp any any eq ftp&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit tcp any any eq telnet&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit tcp any any eq 1863&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit tcp any any eq 5050&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit tcp any any eq 3389&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit tcp any any eq 995&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit tcp any any eq 1227&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit udp any any eq 1227&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit ip host 192.168.105.73 any&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit ip host 192.168.105.71 any&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit udp any any eq isakmp&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit udp any eq isakmp any&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit esp any any&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit udp any any eq 4500&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit udp any eq 4500 any&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit udp any any eq ntp&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit tcp any any eq 123&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit tcp any eq 123 any&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit udp any eq ntp any&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit tcp any any eq pop3&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit ip host 192.168.105.254 any&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit tcp any any eq smtp&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit tcp any any eq 6901&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit udp any any eq 6901&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit udp any any eq 6801&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit udp any any range 2001 2120&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list ININSIDE extended permit tcp any any range 6891 6900&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit tcp any any eq 7001&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit udp any any eq 7001&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit udp any any eq discard&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit tcp any any range 5000 65535&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit udp any any range 5000 65535&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit tcp any any eq 5061&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit tcp any any eq 502&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit icmp any any&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit tcp any any eq domain&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit ip 192.168.105.0 255.255.255.0 192.168.100.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit tcp any any eq imap4&amp;nbsp;&lt;BR /&gt;access-list ININSIDE extended permit tcp any any eq 843&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static 192.168.105.0_24 192.168.105.0_24 destination static 192.168.106.0_24 192.168.106.0_24 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static 192.168.105.0_24 192.168.105.0_24 destination static 192.168.107.0_24 192.168.107.0_24 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static 192.168.105.0_24 192.168.105.0_24 destination static 172.16.105.0_24 172.16.105.0_24 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static 192.168.105.0_24 192.168.105.0_24 destination static 192.168.255.0_24 192.168.255.0_24 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static 192.168.105.0_24 192.168.105.0_24 destination static 192.168.100.0_27 192.168.100.0_27 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static 192.168.30.0_24 192.168.30.0_24 destination static 192.168.100.0_27 192.168.100.0_27 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static 192.168.50.0_24 192.168.50.0_24 destination static 192.168.100.0_27 192.168.100.0_27 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static 192.168.60.0_24 192.168.60.0_24 destination static 192.168.100.0_27 192.168.100.0_27 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static 192.168.105.0_24 192.168.105.0_24 destination static 192.168.100.192_26 192.168.100.192_26 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static DM_INLINE_NETWORK_5 DM_INLINE_NETWORK_5 destination static NETWORK_OBJ_192.168.255.0_24 NETWORK_OBJ_192.168.255.0_24 no-proxy-arp route-lookup&lt;BR /&gt;nat (DMZ,outside) source static 172.16.105.0_24 172.16.105.0_24 destination static 192.168.105.0_24 192.168.105.0_24 no-proxy-arp route-lookup&lt;BR /&gt;nat (DMZ,outside) source static 172.16.105.0_24 172.16.105.0_24 destination static 192.168.255.0_24 192.168.255.0_24 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static 192.168.105.210 interface service TCP_3389 TCP_3389&lt;BR /&gt;nat (inside,outside) source static 192.168.105.220 interface service TCP_3389 TCP_6500&lt;BR /&gt;nat (inside,outside) source static 192.168.30.31 XX.XX.XX.149 service TCP_502 TCP_502&lt;BR /&gt;nat (inside,outside) source static 192.168.105.109 SMTP_PUBLIC service HTTP HTTP&lt;BR /&gt;nat (inside,outside) source static 192.168.105.109 SMTP_PUBLIC service HTTPS HTTPS&lt;BR /&gt;nat (inside,outside) source static 192.168.105.7 SMTP_PUBLIC service TCP_3389 TCP_6501&lt;BR /&gt;nat (DMZ,outside) source static 172.16.105.10 XX.XX.XX.150 service TCP_8000 TCP_8000&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) source static 172.16.105.10 SMTP_PUBLIC service SMTP SMTP&lt;BR /&gt;nat (DMZ,outside) source dynamic SMTPGW-DMZ SMTP_PUBLIC&lt;BR /&gt;nat (inside,outside) source dynamic DIP_LAN interface&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group ININSIDE in interface inside&lt;BR /&gt;access-group DMZ_access_in in interface DMZ&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 XX.XX.XX.148 1&lt;/P&gt;&lt;P&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 management&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 13:07:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-issue-on-outside-interface/m-p/2460205#M1050601</guid>
      <dc:creator>pmahesh01</dc:creator>
      <dc:date>2020-02-21T13:07:59Z</dc:date>
    </item>
    <item>
      <title>Mahesh,Telnet, even on port</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-issue-on-outside-interface/m-p/2460206#M1050611</link>
      <description>&lt;P&gt;Mahesh,&lt;/P&gt;&lt;P&gt;Telnet, even on port 443, is not a good test because the ASA does not allow telnet protocol into the lowest security level interface.&lt;/P&gt;&lt;P&gt;Please verify your have the 3DES-AES license active ("show ver | i AES") and that you have strong ciphers enabled ("show ssl"). For the latter we look for 3DES or AES ciphers to be among the enabled ones. If they are not, then enable them with "ssl encryption aes256-sha1 aes128-sha1 3des-sha1"&lt;/P&gt;</description>
      <pubDate>Mon, 17 Mar 2014 18:13:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-issue-on-outside-interface/m-p/2460206#M1050611</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-03-17T18:13:16Z</dc:date>
    </item>
    <item>
      <title>Hello Marvin, Thanks for the</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-issue-on-outside-interface/m-p/2460207#M1050631</link>
      <description>&lt;P&gt;Hello Marvin,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the reply. I have verified the above and all required parametres areto be enabled.&lt;/P&gt;&lt;P&gt;SPI-FW# sho version | i AES&lt;BR /&gt;Encryption-3DES-AES &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Enabled &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;SPI-FW# sh ssl&lt;BR /&gt;SPI-FW# sh ssl&lt;BR /&gt;Accept connections using SSLv2, SSLv3 or TLSv1 and negotiate to SSLv3 or TLSv1&lt;BR /&gt;Start connections using SSLv3 and negotiate to SSLv3 or TLSv1&lt;BR /&gt;Enabled cipher order: 3des-sha1 aes128-sha1&lt;BR /&gt;Disabled ciphers: des-sha1 rc4-md5 rc4-sha1 aes256-sha1 dhe-aes128-sha1 dhe-aes256-sha1 null-sha1&lt;BR /&gt;No SSL trust-points configured&lt;BR /&gt;Certificate authentication is not enabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Below are some captures logs i have collected.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;1: 08:50:47.525683(My Public) XX.XX.48.154.64514 &amp;gt;(ASA outside int) AA.BB.CC.145.443: S 1504497065:1504497065(0) win 8192 &amp;lt;mss 1452,nop,wscale 2,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp;2: 08:50:47.525897 &amp;nbsp; &amp;nbsp; &amp;nbsp; AA.BB.CC.145.443 &amp;gt; XX.XX.48.154.64514: S 3288262520:3288262520(0) ack 1504497066 win 32768 &amp;lt;mss 1452&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp;3: 08:50:47.531756 &amp;nbsp; &amp;nbsp; &amp;nbsp; XX.XX.48.154.64514 &amp;gt; AA.BB.CC.145.443: R 1504497066:1504497066(0) win 0&lt;BR /&gt;&amp;nbsp; &amp;nbsp;4: 08:50:50.521350 &amp;nbsp; &amp;nbsp; &amp;nbsp; XX.XX.48.154.64514 &amp;gt; AA.BB.CC.145.443: S 1504497065:1504497065(0) win 8192 &amp;lt;mss 1452,nop,wscale 2,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp;5: 08:50:50.521503 &amp;nbsp; &amp;nbsp; &amp;nbsp; AA.BB.CC.145.443 &amp;gt; XX.XX.48.154.64514: S 4268904558:4268904558(0) ack 1504497066 win 32768 &amp;lt;mss 1452&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp;6: 08:50:50.527377 &amp;nbsp; &amp;nbsp; &amp;nbsp; XX.XX.48.154.64514 &amp;gt; AA.BB.CC.145.443: R 1504497066:1504497066(0) win 0&lt;BR /&gt;&amp;nbsp; &amp;nbsp;7: 08:50:56.521671 &amp;nbsp; &amp;nbsp; &amp;nbsp; XX.XX.48.154.64514 &amp;gt; AA.BB.CC.145.443: S 1504497065:1504497065(0) win 8192 &amp;lt;mss 1452,nop,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp;8: 08:50:56.521793 &amp;nbsp; &amp;nbsp; &amp;nbsp; AA.BB.CC.145.443 &amp;gt; XX.XX.48.154.64514: S 4276582576:4276582576(0) ack 1504497066 win 32768 &amp;lt;mss 1452&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp;9: 08:50:56.527423 &amp;nbsp; &amp;nbsp; &amp;nbsp; XX.XX.48.154.64514 &amp;gt; AA.BB.CC.145.443: R 1504497066:1504497066(0) win 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I see RESET being send immediatly after a SYS ACK. Not sure why this is happening, could there be some issue with my NAT which is causing this&amp;nbsp;behaviour.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Mar 2014 05:20:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-issue-on-outside-interface/m-p/2460207#M1050631</guid>
      <dc:creator>pmahesh01</dc:creator>
      <dc:date>2014-03-18T05:20:37Z</dc:date>
    </item>
    <item>
      <title>Mahesh,What address is SMTP</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-issue-on-outside-interface/m-p/2460208#M1050642</link>
      <description>&lt;P&gt;Mahesh,&lt;/P&gt;&lt;P&gt;What address is SMTP_PUBLIC using? Hopefully not the outside interface.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Mar 2014 14:47:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-issue-on-outside-interface/m-p/2460208#M1050642</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-03-18T14:47:09Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin, Just figured out</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-issue-on-outside-interface/m-p/2460209#M1050652</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just figured out the issue, there were no problems in the ASA configurations. There is an ISP router where PBR is configured where web traffic is redirected to the ADSL line. Just had to add an exception in the access list to get the ASDM working. Thank you for your inputs.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Mar 2014 05:17:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-issue-on-outside-interface/m-p/2460209#M1050652</guid>
      <dc:creator>pmahesh01</dc:creator>
      <dc:date>2014-03-19T05:17:10Z</dc:date>
    </item>
    <item>
      <title>Thanks for letting us know</title>
      <link>https://community.cisco.com/t5/network-security/asdm-access-issue-on-outside-interface/m-p/2460210#M1050667</link>
      <description>&lt;P&gt;Thanks for letting us know the resolution.&lt;/P&gt;&lt;P&gt;Not receiving the traffic will definitely cause communication to fail to establish. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Mar 2014 13:18:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-access-issue-on-outside-interface/m-p/2460210#M1050667</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-03-19T13:18:53Z</dc:date>
    </item>
  </channel>
</rss>

