<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Problem with traffic between 2 interfaces in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3179137#M1066526</link>
    <description>&lt;P&gt;let me check to run the tcpdump in windows. I'll get back to you in the minute I've got what you ask.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
    <pubDate>Fri, 01 Sep 2017 20:52:09 GMT</pubDate>
    <dc:creator>gasparmenendez</dc:creator>
    <dc:date>2017-09-01T20:52:09Z</dc:date>
    <item>
      <title>Problem with traffic between 2 interfaces, Still no solution...</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3178594#M1066515</link>
      <description>&lt;P&gt;Hi folks,&lt;/P&gt;&lt;P&gt;I'm having trouble with traffic between different subnets connected to different interfaces. In interface CARRIERS is connected a server with ip address 10.227.224.11 and in interface INSIDE_Prueba I have connected my PC with ip address 192.168.199.30. I can't ping from my PC to the server, it doesn't answer. However, I can see in my ASA's ASDM (5580 8.4(5) and Device Manager Version 7.1(1)52) the Hit counter increasing when I send ping. Here's what I configured:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE_Prueba_access_out extended permit ip 10.227.224.0 255.255.252.0 any&lt;/STRONG&gt;&amp;nbsp;(here's where the counter increases)&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list CARRIERS_access_out extended permit ip 192.168.199.0 255.255.255.0 10.227.224.0 255.255.252.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Can anybody help me please??&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:15:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3178594#M1066515</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2020-02-21T14:15:48Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with traffic between 2 interfaces</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3178597#M1066516</link>
      <description>&lt;P&gt;How many interface does your server has and what about the server´s rouintg table?&lt;/P&gt;&lt;P&gt;Looks like the server has no clue how to send the packe back.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Aug 2017 18:09:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3178597#M1066516</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2017-08-31T18:09:12Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with traffic between 2 interfaces</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3178613#M1066517</link>
      <description>&lt;P&gt;the server has only one interface, and about routing this is what is configured:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;root@cacti-carrier:/home/gaspar# ip route show&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;default via 10.227.224.3 dev eth0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;anyway, the above doesn't imply that everything is send back through 10.227.224.3 that is ip address of CARRIERS interface???&lt;/P&gt;</description>
      <pubDate>Thu, 31 Aug 2017 18:48:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3178613#M1066517</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2017-08-31T18:48:14Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with traffic between 2 interfaces</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3178667#M1066518</link>
      <description>&lt;P&gt;Should be the Firewalls IP address. But, if this server has only one interface and considering it is communication on the network, routing should be not the problem.&lt;/P&gt;&lt;P&gt;&amp;nbsp;Looks like this is a Unix like server. Can you run tcpdump -i eth0 while ping it from PC ?&lt;/P&gt;&lt;P&gt;This should be a good way to see what´s going on with the incoming packets.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Aug 2017 20:55:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3178667#M1066518</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2017-08-31T20:55:50Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with traffic between 2 interfaces</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3178694#M1066519</link>
      <description>&lt;P&gt;I ran &lt;STRONG&gt;tcpdump -i eth0 | grep 192.168.199.31 &lt;/STRONG&gt;and got this:&lt;/P&gt;&lt;P&gt;root@cacti-carrier:/home/gaspar# tcpdump -i eth0 | grep 192.168.199.31&lt;BR /&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes&lt;BR /&gt;16:45:16.070042 IP 192.168.199.31 &amp;gt; 10.227.224.11: ICMP echo request, id 1, seq 172, length 40&lt;BR /&gt;16:45:16.070085 IP 10.227.224.11 &amp;gt; 192.168.199.31: ICMP echo reply, id 1, seq 172, length 40&lt;BR /&gt;16:45:20.624536 IP 192.168.199.31 &amp;gt; 10.227.224.11: ICMP echo request, id 1, seq 173, length 40&lt;BR /&gt;16:45:20.624579 IP 10.227.224.11 &amp;gt; 192.168.199.31: ICMP echo reply, id 1, seq 173, length 40&lt;BR /&gt;16:45:25.633785 IP 192.168.199.31 &amp;gt; 10.227.224.11: ICMP echo request, id 1, seq 174, length 40&lt;BR /&gt;16:45:25.633831 IP 10.227.224.11 &amp;gt; 192.168.199.31: ICMP echo reply, id 1, seq 174, length 40&lt;BR /&gt;16:45:30.632989 IP 192.168.199.31 &amp;gt; 10.227.224.11: ICMP echo request, id 1, seq 175, length 40&lt;BR /&gt;16:45:30.633035 IP 10.227.224.11 &amp;gt; 192.168.199.31: ICMP echo reply, id 1, seq 175, length 40&lt;BR /&gt;16:45:35.632806 IP 192.168.199.31 &amp;gt; 10.227.224.11: ICMP echo request, id 1, seq 176, length 40&lt;BR /&gt;16:45:35.632855 IP 10.227.224.11 &amp;gt; 192.168.199.31: ICMP echo reply, id 1, seq 176, length 40&lt;BR /&gt;16:45:40.631813 IP 192.168.199.31 &amp;gt; 10.227.224.11: ICMP echo request, id 1, seq 177, length 40&lt;BR /&gt;16:45:40.631829 IP 10.227.224.11 &amp;gt; 192.168.199.31: ICMP echo reply, id 1, seq 177, length 40&lt;BR /&gt;16:45:45.633666 IP 192.168.199.31 &amp;gt; 10.227.224.11: ICMP echo request, id 1, seq 178, length 40&lt;BR /&gt;16:45:45.633703 IP 10.227.224.11 &amp;gt; 192.168.199.31: ICMP echo reply, id 1, seq 178, length 40&lt;BR /&gt;16:45:50.626219 IP 192.168.199.31 &amp;gt; 10.227.224.11: ICMP echo request, id 1, seq 179, length 40&lt;BR /&gt;16:45:50.626264 IP 10.227.224.11 &amp;gt; 192.168.199.31: ICMP echo reply, id 1, seq 179, length 40&lt;BR /&gt;^C117 packets captured&lt;BR /&gt;120 packets received by filter&lt;BR /&gt;0 packets dropped by kernel&lt;/P&gt;&lt;P&gt;but I don't know how to read it.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Aug 2017 21:55:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3178694#M1066519</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2017-08-31T21:55:02Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with traffic between 2 interfaces</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3178701#M1066520</link>
      <description>&lt;P&gt;Nice. The Server reveives and reply the packets.&lt;/P&gt;&lt;P&gt;&amp;nbsp;Something worng with wrong with firewall rule. Sure you permited both direction?&lt;/P&gt;</description>
      <pubDate>Thu, 31 Aug 2017 22:07:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3178701#M1066520</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2017-08-31T22:07:49Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with traffic between 2 interfaces</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3178702#M1066521</link>
      <description>&lt;P&gt;here are the lines on the ASA regarding this issue:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list CARRIERS_access_in extended permit ip 10.227.224.0 255.255.252.0 any &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;access-list CARRIERS_access_out extended permit ip 192.168.199.0 255.255.255.0 10.227.224.0 255.255.252.0 &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;access-list CARRIERS_access_out extended permit ip any 10.227.224.0 255.255.252.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE_Prueba_access_out extended permit ip 10.227.224.0 255.255.252.0 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;should I have something else??&lt;/P&gt;</description>
      <pubDate>Thu, 31 Aug 2017 22:11:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3178702#M1066521</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2017-08-31T22:11:47Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with traffic between 2 interfaces</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3178703#M1066522</link>
      <description>&lt;P&gt;Try this way:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list CARRIERS_access_in extended permit ip 10.227.224.0 255.255.252.0 any&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;access-list CARRIERS_access_out extended permit ip 192.168.199.0 255.255.255.0 10.227.224.0 255.255.252.0&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;access-list CARRIERS_access_out extended permit ip any 10.227.224.0 255.255.252.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE_Prueba_access_out extended permit ip 192.168.199.0 255.255.255.0 &amp;nbsp;any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE_Prueba_access_in &amp;nbsp;extended permit ip&amp;nbsp;10.227.224.0 255.255.252.0&amp;nbsp;192.168.199.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Aug 2017 22:33:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3178703#M1066522</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2017-08-31T22:33:24Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with traffic between 2 interfaces</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3178954#M1066523</link>
      <description>&lt;P&gt;I did what you suggest but still no luck my friend....&lt;/P&gt;</description>
      <pubDate>Fri, 01 Sep 2017 14:41:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3178954#M1066523</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2017-09-01T14:41:19Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with traffic between 2 interfaces</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3179114#M1066524</link>
      <description>&lt;P&gt;Gaspar,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Try to put a capture on both direction to see.&lt;/P&gt;&lt;P&gt;&amp;nbsp;We saw that the packet is hiring the server and it is replying.&lt;/P&gt;&lt;P&gt;&amp;nbsp;The server has only one interface, so routing must not be the problema.&lt;/P&gt;&lt;P&gt;&amp;nbsp;You have the ACL correctly placed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;We need log to figure it out. If I remember, you saw hits in one direction, but we need to see capture logs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;Hit means the packet got to the interface now we need to se if it was permitted or denied from server to PC.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Sep 2017 20:11:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3179114#M1066524</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2017-09-01T20:11:21Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with traffic between 2 interfaces</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3179137#M1066526</link>
      <description>&lt;P&gt;let me check to run the tcpdump in windows. I'll get back to you in the minute I've got what you ask.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Sep 2017 20:52:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3179137#M1066526</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2017-09-01T20:52:09Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with traffic between 2 interfaces</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3179142#M1066528</link>
      <description>&lt;P&gt;Holy cr....! I didn't realize that ping in the other way works fine!! I ping the PC (192.168.199.31) from the server (10.227.224.11) and works fine!! the problem is the other way around...&lt;/P&gt;&lt;P&gt;do you still need to capture traffic???&lt;/P&gt;</description>
      <pubDate>Fri, 01 Sep 2017 21:14:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3179142#M1066528</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2017-09-01T21:14:41Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with traffic between 2 interfaces</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3179184#M1066529</link>
      <description>&lt;P&gt;That's interesting. Cause the ping from PC is also getting in to the server as we could see on tcpdump..Right?&lt;/P&gt;&lt;P&gt;Put capture both directions and lets see.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Sep 2017 23:38:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3179184#M1066529</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2017-09-01T23:38:14Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with traffic between 2 interfaces</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3179187#M1066531</link>
      <description>&lt;P&gt;.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Sep 2017 23:56:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3179187#M1066531</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2017-09-01T23:56:40Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with traffic between 2 interfaces</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3179309#M1066532</link>
      <description>&lt;P&gt;Hi Flavio,&lt;/P&gt;&lt;P&gt;is near impossible to get some working tool for tcpdump in Windows, honestly I'm about to give up on that.&lt;/P&gt;&lt;P&gt;Anyway as an additional information, I was checkinfg the server and found out it has a firewall (firewall.sh) service running. I tried to stop service but nothing changed (I can't be sure if service really stopped or not). Here's the firewall.sh file:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;#!/bin/bash&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;iptables -F&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;iptables -X&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;iptables -P INPUT DROP&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;iptables -P OUTPUT DROP&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;iptables -P FORWARD DROP&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;iptables -A INPUT -i lo -j ACCEPT&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;iptables -A OUTPUT -o lo -j ACCEPT&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;iptables -A INPUT -s 0/0 -p tcp --dport 8443 -j ACCEPT&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;iptables -A INPUT -s 0/0 -p tcp --dport 1157 -j ACCEPT&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;iptables -A INPUT -s 10.227.224.0/22 -p udp --dport 514 -j ACCEPT&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;iptables -A INPUT -s 10.227.224.0/22 -p udp --dport 161:162 -j ACCEPT&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;iptables -A INPUT -s 0/0 -p icmp --icmp-type echo-request -j ACCEPT&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;iptables -A INPUT -s 0/0 -p icmp --icmp-type echo-reply -j ACCEPT&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;iptables -A INPUT -p tcp --syn -m limit --limit 1/s --limit-burst 4 -j DROP&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;iptables -A INPUT -p tcp ! --syn -m state --state NEW -j DROP&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;iptables -A INPUT -p icmp -j DROP&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;iptables -A OUTPUT -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;maybe this would help.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 02 Sep 2017 18:26:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3179309#M1066532</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2017-09-02T18:26:42Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with traffic between 2 interfaces</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3179312#M1066534</link>
      <description>&lt;P&gt;I was refering to capture on ASA.&lt;/P&gt;&lt;P&gt;But, if you are using ASDM, you can see there as well. The idea is just see how firewall is processing packets against rules.&lt;/P&gt;&lt;P&gt;&amp;nbsp;As per tcpdump, you server is not denying icmp and, if you are ping the PC from server, PC is not denying either.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 02 Sep 2017 18:46:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3179312#M1066534</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2017-09-02T18:46:44Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with traffic between 2 interfaces</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3179314#M1066536</link>
      <description>&lt;P&gt;here's capture in the other way:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;gaspar@gaspar-Lenovo-ideapad-310-15ISK ~ $ sudo tcpdump -i enp1s0 | grep 10.227.224.8&lt;BR /&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on enp1s0, link-type EN10MB (Ethernet), capture size 262144 bytes&lt;BR /&gt;13:49:56.454958 IP 10.227.224.8 &amp;gt; 192.168.199.30: ICMP echo request, id 1, seq 1239, length 40&lt;BR /&gt;13:49:56.454976 IP 192.168.199.30 &amp;gt; 10.227.224.8: ICMP echo reply, id 1, seq 1239, length 40&lt;BR /&gt;13:49:57.487287 IP 10.227.224.8 &amp;gt; 192.168.199.30: ICMP echo request, id 1, seq 1240, length 40&lt;BR /&gt;13:49:57.487306 IP 192.168.199.30 &amp;gt; 10.227.224.8: ICMP echo reply, id 1, seq 1240, length 40&lt;BR /&gt;13:49:58.519610 IP 10.227.224.8 &amp;gt; 192.168.199.30: ICMP echo request, id 1, seq 1241, length 40&lt;BR /&gt;13:49:58.519624 IP 192.168.199.30 &amp;gt; 10.227.224.8: ICMP echo reply, id 1, seq 1241, length 40&lt;BR /&gt;13:49:59.566572 IP 10.227.224.8 &amp;gt; 192.168.199.30: ICMP echo request, id 1, seq 1242, length 40&lt;BR /&gt;13:49:59.566596 IP 192.168.199.30 &amp;gt; 10.227.224.8: ICMP echo reply, id 1, seq 1242, length 40&lt;BR /&gt;13:50:00.598874 IP 10.227.224.8 &amp;gt; 192.168.199.30: ICMP echo request, id 1, seq 1243, length 40&lt;BR /&gt;13:50:00.598911 IP 192.168.199.30 &amp;gt; 10.227.224.8: ICMP echo reply, id 1, seq 1243, length 40&lt;BR /&gt;13:50:01.632839 IP 10.227.224.8 &amp;gt; 192.168.199.30: ICMP echo request, id 1, seq 1244, length 40&lt;BR /&gt;13:50:01.632855 IP 192.168.199.30 &amp;gt; 10.227.224.8: ICMP echo reply, id 1, seq 1244, length 40&lt;BR /&gt;13:50:02.667957 IP 10.227.224.8 &amp;gt; 192.168.199.30: ICMP echo request, id 1, seq 1245, length 40&lt;BR /&gt;13:50:02.667987 IP 192.168.199.30 &amp;gt; 10.227.224.8: ICMP echo reply, id 1, seq 1245, length 40&lt;BR /&gt;13:50:03.701705 IP 10.227.224.8 &amp;gt; 192.168.199.30: ICMP echo request, id 1, seq 1246, length 40&lt;BR /&gt;13:50:03.701734 IP 192.168.199.30 &amp;gt; 10.227.224.8: ICMP echo reply, id 1, seq 1246, length 40&lt;BR /&gt;13:50:04.738270 IP 10.227.224.8 &amp;gt; 192.168.199.30: ICMP echo request, id 1, seq 1247, length 40&lt;BR /&gt;13:50:04.738287 IP 192.168.199.30 &amp;gt; 10.227.224.8: ICMP echo reply, id 1, seq 1247, length 40&lt;BR /&gt;13:50:05.770705 IP 10.227.224.8 &amp;gt; 192.168.199.30: ICMP echo request, id 1, seq 1248, length 40&lt;BR /&gt;13:50:05.770744 IP 192.168.199.30 &amp;gt; 10.227.224.8: ICMP echo reply, id 1, seq 1248, length 40&lt;BR /&gt;13:50:06.803582 IP 10.227.224.8 &amp;gt; 192.168.199.30: ICMP echo request, id 1, seq 1249, length 40&lt;BR /&gt;13:50:06.803597 IP 192.168.199.30 &amp;gt; 10.227.224.8: ICMP echo reply, id 1, seq 1249, length 40&lt;BR /&gt;13:50:07.835389 IP 10.227.224.8 &amp;gt; 192.168.199.30: ICMP echo request, id 1, seq 1250, length 40&lt;BR /&gt;13:50:07.835402 IP 192.168.199.30 &amp;gt; 10.227.224.8: ICMP echo reply, id 1, seq 1250, length 40&lt;BR /&gt;13:50:08.869768 IP 10.227.224.8 &amp;gt; 192.168.199.30: ICMP echo request, id 1, seq 1251, length 40&lt;BR /&gt;13:50:08.869800 IP 192.168.199.30 &amp;gt; 10.227.224.8: ICMP echo reply, id 1, seq 1251, length 40&lt;BR /&gt;13:50:09.904622 IP 10.227.224.8 &amp;gt; 192.168.199.30: ICMP echo request, id 1, seq 1252, length 40&lt;BR /&gt;13:50:09.904647 IP 192.168.199.30 &amp;gt; 10.227.224.8: ICMP echo reply, id 1, seq 1252, length 40&lt;BR /&gt;^C139 packets captured&lt;BR /&gt;160 packets received by filter&lt;BR /&gt;0 packets dropped by kernel&lt;BR /&gt;9 packets dropped by interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Sat, 02 Sep 2017 18:51:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3179314#M1066536</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2017-09-02T18:51:30Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with traffic between 2 interfaces</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3179321#M1066538</link>
      <description>&lt;P&gt;My las shot man.&lt;/P&gt;&lt;P&gt;&amp;nbsp;Apply this:&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;</description>
      <pubDate>Sat, 02 Sep 2017 19:17:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3179321#M1066538</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2017-09-02T19:17:55Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with traffic between 2 interfaces</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3179776#M1066539</link>
      <description>&lt;P&gt;Hi friend,&lt;/P&gt;&lt;P&gt;here's ping from 10.227.224.8 to 192.168.199.30 (ASA's ASDM):&lt;/P&gt;&lt;P&gt;6|Sep 04 2017|10:24:34|302015|192.168.199.30|50633|216.58.219.35|443|Built outbound UDP connection 1061824194 for OUTSIDE:216.58.219.35/443 (216.58.219.35/443) to INSIDE_Prueba:192.168.199.30/50633 (170.X.X.2/50633)&lt;BR /&gt;6|Sep 04 2017|10:24:34|305011|192.168.199.30|50633|170.X.X.2|50633|Built dynamic UDP translation from INSIDE_Prueba:192.168.199.30/50633 to OUTSIDE:170.X.X.2/50633&lt;BR /&gt;6|Sep 04 2017|10:24:34|302013|192.168.199.30|44288|216.58.219.35|443|Built outbound TCP connection 1061824192 for OUTSIDE:216.58.219.35/443 (216.58.219.35/443) to INSIDE_Prueba:192.168.199.30/44288 (170.X.X.2/44288)&lt;BR /&gt;6|Sep 04 2017|10:24:34|305011|192.168.199.30|44288|170.X.X.2|44288|Built dynamic TCP translation from INSIDE_Prueba:192.168.199.30/44288 to OUTSIDE:170.X.X.2/44288&lt;BR /&gt;6|Sep 04 2017|10:24:34|302016|209.244.0.3|53|192.168.199.30|54863|Teardown UDP connection 1061824150 for OUTSIDE:209.244.0.3/53 to INSIDE_Prueba:192.168.199.30/54863 duration 0:00:00 bytes 110&lt;BR /&gt;6|Sep 04 2017|10:24:34|302015|192.168.199.30|54863|209.244.0.3|53|Built outbound UDP connection 1061824150 for OUTSIDE:209.244.0.3/53 (209.244.0.3/53) to INSIDE_Prueba:192.168.199.30/54863 (170.X.X.2/54863)&lt;BR /&gt;6|Sep 04 2017|10:24:27|302013|192.168.199.30|54220|54.152.171.205|443|Built outbound TCP connection 1061818984 for OUTSIDE:54.152.171.205/443 (54.152.171.205/443) to INSIDE_Prueba:192.168.199.30/54220 (170.X.X.2/16236)&lt;BR /&gt;6|Sep 04 2017|10:24:27|305011|192.168.199.30|54220|170.X.X.2|16236|Built dynamic TCP translation from INSIDE_Prueba:192.168.199.30/54220 to OUTSIDE:170.X.X.2/16236&lt;BR /&gt;6|Sep 04 2017|10:24:27|302016|209.244.0.3|53|192.168.199.30|54863|Teardown UDP connection 1061818924 for OUTSIDE:209.244.0.3/53 to INSIDE_Prueba:192.168.199.30/54863 duration 0:00:00 bytes 376&lt;BR /&gt;6|Sep 04 2017|10:24:27|302015|192.168.199.30|54863|209.244.0.3|53|Built outbound UDP connection 1061818924 for OUTSIDE:209.244.0.3/53 (209.244.0.3/53) to INSIDE_Prueba:192.168.199.30/54863 (170.X.X.2/54863)&lt;BR /&gt;6|Sep 04 2017|10:24:27|302013|192.168.199.30|58414|35.201.97.85|443|Built outbound TCP connection 1061818687 for OUTSIDE:35.201.97.85/443 (35.201.97.85/443) to INSIDE_Prueba:192.168.199.30/58414 (170.X.X.2/58414)&lt;BR /&gt;6|Sep 04 2017|10:24:27|305011|192.168.199.30|58414|170.X.X.2|58414|Built dynamic TCP translation from INSIDE_Prueba:192.168.199.30/58414 to OUTSIDE:170.X.X.2/58414&lt;BR /&gt;6|Sep 04 2017|10:24:27|302016|209.244.0.3|53|192.168.199.30|54863|Teardown UDP connection 1061818651 for OUTSIDE:209.244.0.3/53 to INSIDE_Prueba:192.168.199.30/54863 duration 0:00:00 bytes 236&lt;/P&gt;&lt;P&gt;this ping is working fine.&lt;/P&gt;&lt;P&gt;Now the ping from 192.168.199.30 to 10.227.224.8 (ASA's ASDM):&lt;/P&gt;&lt;P&gt;4|Sep 04 2017|10:31:46|313004|||||Denied ICMP type=0, from laddr 10.227.224.8 on interface CARRIERS to 192.168.199.30: no matching session&lt;BR /&gt;6|Sep 04 2017|10:31:46|302020|10.227.224.8|0|192.168.199.30|4929|Built inbound ICMP connection for faddr 10.227.224.8/0 gaddr 192.168.199.30/4929 laddr 192.168.199.30/4929&lt;BR /&gt;6|Sep 04 2017|10:31:46|302021|10.227.224.8|0|192.168.199.30|4929|Teardown ICMP connection for faddr 10.227.224.8/0 gaddr 192.168.199.30/4929 laddr 192.168.199.30/4929&lt;BR /&gt;4|Sep 04 2017|10:31:45|313004|||||Denied ICMP type=0, from laddr 10.227.224.8 on interface CARRIERS to 192.168.199.30: no matching session&lt;BR /&gt;6|Sep 04 2017|10:31:45|302020|10.227.224.8|0|192.168.199.30|4929|Built inbound ICMP connection for faddr 10.227.224.8/0 gaddr 192.168.199.30/4929 laddr 192.168.199.30/4929&lt;BR /&gt;6|Sep 04 2017|10:31:45|302021|10.227.224.8|0|192.168.199.30|4929|Teardown ICMP connection for faddr 10.227.224.8/0 gaddr 192.168.199.30/4929 laddr 192.168.199.30/4929&lt;BR /&gt;4|Sep 04 2017|10:31:44|313004|||||Denied ICMP type=0, from laddr 10.227.224.8 on interface CARRIERS to 192.168.199.30: no matching session&lt;BR /&gt;6|Sep 04 2017|10:31:44|302020|10.227.224.8|0|192.168.199.30|4929|Built inbound ICMP connection for faddr 10.227.224.8/0 gaddr 192.168.199.30/4929 laddr 192.168.199.30/4929&lt;BR /&gt;6|Sep 04 2017|10:31:44|302021|10.227.224.8|0|192.168.199.30|4929|Teardown ICMP connection for faddr 10.227.224.8/0 gaddr 192.168.199.30/4929 laddr 192.168.199.30/4929&lt;BR /&gt;4|Sep 04 2017|10:31:43|313004|||||Denied ICMP type=0, from laddr 10.227.224.8 on interface CARRIERS to 192.168.199.30: no matching session&lt;BR /&gt;6|Sep 04 2017|10:31:43|302020|10.227.224.8|0|192.168.199.30|4929|Built inbound ICMP connection for faddr 10.227.224.8/0 gaddr 192.168.199.30/4929 laddr 192.168.199.30/4929&lt;BR /&gt;6|Sep 04 2017|10:31:43|302021|10.227.224.8|0|192.168.199.30|4929|Teardown ICMP connection for faddr 10.227.224.8/0 gaddr 192.168.199.30/4929 laddr 192.168.199.30/4929&lt;BR /&gt;4|Sep 04 2017|10:31:42|313004|||||Denied ICMP type=0, from laddr 10.227.224.8 on interface CARRIERS to 192.168.199.30: no matching session&lt;BR /&gt;6|Sep 04 2017|10:31:42|302020|10.227.224.8|0|192.168.199.30|4929|Built inbound ICMP connection for faddr 10.227.224.8/0 gaddr 192.168.199.30/4929 laddr 192.168.199.30/4929&lt;BR /&gt;6|Sep 04 2017|10:31:42|302021|10.227.224.8|0|192.168.199.30|4929|Teardown ICMP connection for faddr 10.227.224.8/0 gaddr 192.168.199.30/4929 laddr 192.168.199.30/4929&lt;BR /&gt;4|Sep 04 2017|10:31:41|313004|||||Denied ICMP type=0, from laddr 10.227.224.8 on interface CARRIERS to 192.168.199.30: no matching session&lt;BR /&gt;6|Sep 04 2017|10:31:41|302020|10.227.224.8|0|192.168.199.30|4929|Built inbound ICMP connection for faddr 10.227.224.8/0 gaddr 192.168.199.30/4929 laddr 192.168.199.30/4929&lt;BR /&gt;6|Sep 04 2017|10:31:41|302021|10.227.224.8|0|192.168.199.30|4929|Teardown ICMP connection for faddr 10.227.224.8/0 gaddr 192.168.199.30/4929 laddr 192.168.199.30/4929&lt;BR /&gt;4|Sep 04 2017|10:31:40|313004|||||Denied ICMP type=0, from laddr 10.227.224.8 on interface CARRIERS to 192.168.199.30: no matching session&lt;BR /&gt;6|Sep 04 2017|10:31:40|302020|10.227.224.8|0|192.168.199.30|4929|Built inbound ICMP connection for faddr 10.227.224.8/0 gaddr 192.168.199.30/4929 laddr 192.168.199.30/4929&lt;/P&gt;&lt;P&gt;maybe that helps...???&lt;/P&gt;&lt;P&gt;anyway regarding what you suggest about same-security-traffic I don't see the point since all my interfaces have different security levels, but I try it anyway.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Sep 2017 15:31:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3179776#M1066539</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2017-09-04T15:31:06Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with traffic between 2 interfaces</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3179808#M1066540</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Denied&lt;/STRONG&gt; ICMP type=0, from laddr 10.227.224.8 on interface CARRIERS to 192.168.199.30: no matching session&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;Try to allow ICMP on the rules.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Which kind of access do you intend to perform? &amp;nbsp;For TCP/UDP must be working...&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Sep 2017 18:18:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-traffic-between-2-interfaces-still-no-solution/m-p/3179808#M1066540</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2017-09-04T18:18:05Z</dc:date>
    </item>
  </channel>
</rss>

