<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA error &amp;quot;Deny TCP (no connection)&amp;quot; in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-error-quot-deny-tcp-no-connection-quot/m-p/4053243#M1068316</link>
    <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, here are all three captures. Hope it's not too difficult to read them.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is the capture from;&lt;/P&gt;&lt;P&gt;Point of egress - outside2&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The source in packet capture is webclient, destination is webserver&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="asa egress.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/70015iFEE02FBCF0763657/image-size/large?v=v2&amp;amp;px=999" role="button" title="asa egress.jpg" alt="asa egress.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;This is a capture from;&lt;/P&gt;&lt;P&gt;Point of ingress - Inside interface&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The source in packet capture is webclient, destination is webserver private IP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="asa ingress.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/70014iFDC72A5C19FADBF9/image-size/large?v=v2&amp;amp;px=999" role="button" title="asa ingress.jpg" alt="asa ingress.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and this is a capture from the webclient. It is over the internet and not local.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The source in packet capture is webclient private IP, destination is webserver public IP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="webclient.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/70016iD93DAD0893301EB6/image-size/large?v=v2&amp;amp;px=999" role="button" title="webclient.jpg" alt="webclient.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As suspected, it is not receiving the tcp syn ack. Would you know of any reason why?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Would turning the stateful feature off help?&lt;/P&gt;</description>
    <pubDate>Fri, 27 Mar 2020 00:35:18 GMT</pubDate>
    <dc:creator>mikekaleny</dc:creator>
    <dc:date>2020-03-27T00:35:18Z</dc:date>
    <item>
      <title>ASA error "Deny TCP (no connection)"</title>
      <link>https://community.cisco.com/t5/network-security/asa-error-quot-deny-tcp-no-connection-quot/m-p/4051170#M1068119</link>
      <description>&lt;P&gt;Good morning all,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;First of all I hope everyone is staying healthy during these crazy times.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've been trying to solve this issue for over 3 days but just can't seem to wrap my brain around it. I have a webserver with an internal IP address of 192.168.2.100. It's configured to use a 1 to 1 static nat however I cannot load the webpage when I browse to it's public IP. The error I see in the ASDM log is below.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Deny TCP (no connection) from X.X.X.X to X.X.X.X flags ACK on interface outside2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm really bad at working with ASA so ANY help on this would be greatly appreciated. My show run is below&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.2.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address X.X.X.X - (not in use)&lt;BR /&gt;!&lt;BR /&gt;interface Vlan12&lt;BR /&gt;description Optimum&lt;BR /&gt;nameif outside2&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 1.1.1.1 - (IP changed, in use)&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;object network NET-OBJ-LOCAL-NETWORK&lt;BR /&gt;subnet 192.168.2.0 255.255.255.0&lt;BR /&gt;object network obj_any&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network websrv_ext&lt;BR /&gt;host 1.1.1.2 (IP changed)&lt;BR /&gt;object network websrv_int&lt;BR /&gt;host 192.168.2.100&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt;network-object object websrv_ext&lt;BR /&gt;network-object object websrv_int&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;network-object object websrv_ext&lt;BR /&gt;network-object object websrv_int&lt;BR /&gt;access-list 101 extended permit icmp any4 any4 echo-reply&lt;BR /&gt;access-list 101 extended permit tcp any object websrv_int eq https&lt;BR /&gt;access-list 101 extended permit tcp any object websrv_int eq www&lt;BR /&gt;access-list 102 extended permit ip any any&lt;BR /&gt;access-list 102 extended permit icmp any4 any4 echo-reply&lt;BR /&gt;access-list 102 extended permit tcp any object websrv_ext eq www&lt;BR /&gt;access-list 102 extended permit tcp any object websrv_ext eq https&lt;BR /&gt;access-list outside2_access_in extended permit ip any4 any4&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu outside2 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;nat (inside,outside2) dynamic interface&lt;BR /&gt;object network websrv_int&lt;BR /&gt;nat (inside,outside2) static websrv_ext&lt;BR /&gt;access-group 102 out interface inside&lt;BR /&gt;access-group 101 in interface outside2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!!&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2020 13:05:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-error-quot-deny-tcp-no-connection-quot/m-p/4051170#M1068119</guid>
      <dc:creator>mikekaleny</dc:creator>
      <dc:date>2020-03-24T13:05:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA error "Deny TCP (no connection)"</title>
      <link>https://community.cisco.com/t5/network-security/asa-error-quot-deny-tcp-no-connection-quot/m-p/4051252#M1068127</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; 1. Are you sure that the SYN, SYN-ACK and ACK go through the ASA? This could be due to some asymmetric routing, like the ASA does not see the SYN-ACK, so it drops the ACK.&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; 2. Can you simulate the session with "packet-tracer input outside2 tcp x.x.x.x 20000 1.1.1.2 80 detailed"? What is the result?&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; 3. Can you perform a packet capture on the ASA for the respective traffic flow, on both the inside and outside2 interfaces? &lt;A title="See here" href="https://community.cisco.com/t5/security-documents/asa-using-packet-capture-to-troubleshoot-asa-firewall/ta-p/3129889" target="_self"&gt;See here&lt;/A&gt; a guide for doing it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2020 14:12:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-error-quot-deny-tcp-no-connection-quot/m-p/4051252#M1068127</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-03-24T14:12:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA error "Deny TCP (no connection)"</title>
      <link>https://community.cisco.com/t5/network-security/asa-error-quot-deny-tcp-no-connection-quot/m-p/4051260#M1068129</link>
      <description>&lt;P&gt;Hi, thank you for your response. Here is the packet-tracer result. I will have to work on getting the packet capture.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa# packet-tracer input outside2 tcp 8.8.8.8 20000 1.1.1.2 80 detail&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network websrv_int&lt;BR /&gt;nat (inside,outside2) static websrv_ext&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate 1.1.1.2/80 to 192.168.2.100/80&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group 101 in interface outside2&lt;BR /&gt;access-list 101 extended permit tcp any object websrv_int eq www&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xcbc4d4b8, priority=13, domain=permit, deny=false&lt;BR /&gt;hits=755, user_data=0xca0792f0, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=192.168.2.100, mask=255.255.255.255, port=80, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=outside2, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xcb996108, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=661252, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0xcc0d09f0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=364075, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=outside2, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group 102 out interface inside&lt;BR /&gt;access-list 102 extended permit ip any any&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0xcc0f0130, priority=13, domain=permit, deny=false&lt;BR /&gt;hits=144080, user_data=0xca079700, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=inside&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network websrv_int&lt;BR /&gt;nat (inside,outside2) static websrv_ext&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0xcc9a4da8, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;hits=817, user_data=0xcb8eeaa0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=192.168.2.100, mask=255.255.255.255, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=outside2, output_ifc=inside&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0xcb996108, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=661254, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0xcc07a260, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=333998, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 340817, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside2&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2020 14:16:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-error-quot-deny-tcp-no-connection-quot/m-p/4051260#M1068129</guid>
      <dc:creator>mikekaleny</dc:creator>
      <dc:date>2020-03-24T14:16:28Z</dc:date>
    </item>
    <item>
      <title>Re: ASA error "Deny TCP (no connection)"</title>
      <link>https://community.cisco.com/t5/network-security/asa-error-quot-deny-tcp-no-connection-quot/m-p/4051289#M1068133</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; From the ASA perspective, all seems to be good. You sure there is no asymmetric routing somehow? Perform the packet captures, to see if SYN, SYN-ACK, ACK reach the ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2020 14:52:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-error-quot-deny-tcp-no-connection-quot/m-p/4051289#M1068133</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-03-24T14:52:09Z</dc:date>
    </item>
    <item>
      <title>Re: ASA error "Deny TCP (no connection)"</title>
      <link>https://community.cisco.com/t5/network-security/asa-error-quot-deny-tcp-no-connection-quot/m-p/4051410#M1068148</link>
      <description>&lt;P&gt;Is your route to your host (the one from which your are browsing) out the outside interface or outside2?&lt;/P&gt;
&lt;P&gt;If it is on outside (perhaps as the default route) then it won't work due asymmetric routing as &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/295226"&gt;@Cristian Matei&lt;/a&gt; mentioned. Return traffic must use the same interface as it originally arrived on.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2020 17:08:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-error-quot-deny-tcp-no-connection-quot/m-p/4051410#M1068148</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-03-24T17:08:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA error "Deny TCP (no connection)"</title>
      <link>https://community.cisco.com/t5/network-security/asa-error-quot-deny-tcp-no-connection-quot/m-p/4051747#M1068172</link>
      <description>&lt;P&gt;Interface is disabled. The ASA is currently using outside2. I'm not sure why there would be asymmetric routing as there is only one inside and one outside interface.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Something I noticed in the log - when I have the destination IP set as 192.168.2.100, I can see the tcp connections built and teardown.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2020 01:48:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-error-quot-deny-tcp-no-connection-quot/m-p/4051747#M1068172</guid>
      <dc:creator>mikekaleny</dc:creator>
      <dc:date>2020-03-25T01:48:38Z</dc:date>
    </item>
    <item>
      <title>Re: ASA error "Deny TCP (no connection)"</title>
      <link>https://community.cisco.com/t5/network-security/asa-error-quot-deny-tcp-no-connection-quot/m-p/4051967#M1068197</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; You have not described the layer 3 architecture, so maybe the response from the client, somehow does not go through the ASA. Otherwise perform the packet captures on both inside and outside for the respective flow, additionally perform a packet capture of type "asp-drop all" and match on ip traffic between those two hosts.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2020 11:25:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-error-quot-deny-tcp-no-connection-quot/m-p/4051967#M1068197</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-03-25T11:25:27Z</dc:date>
    </item>
    <item>
      <title>Re: ASA error "Deny TCP (no connection)"</title>
      <link>https://community.cisco.com/t5/network-security/asa-error-quot-deny-tcp-no-connection-quot/m-p/4052404#M1068237</link>
      <description>&lt;P&gt;Thank you for your response. I'm not well versed in packet captures but I did see TCP Retransmissions. Just to be certain, am I setting up the packet capture the correct way?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Point of ingress - Inside interface&amp;nbsp;&lt;/P&gt;&lt;P&gt;Source Host - webserv (192.168.2.100)&lt;/P&gt;&lt;P&gt;Destination Host - Public IP of client trying to load webpage&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Point of egress - outside2&amp;nbsp;&lt;/P&gt;&lt;P&gt;Source Host - Webserv Public IP&amp;nbsp;&lt;/P&gt;&lt;P&gt;Destination Host - Public IP of client trying to load webpage&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Layer 3 architecture is simple in my network. The ASA acts as the Gateway for the inside traffic (192.168.2.0/24 subnet). There is a default route sending all traffic to the ISP equipment connecting via outside2 interface.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2020 19:52:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-error-quot-deny-tcp-no-connection-quot/m-p/4052404#M1068237</guid>
      <dc:creator>mikekaleny</dc:creator>
      <dc:date>2020-03-25T19:52:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA error "Deny TCP (no connection)"</title>
      <link>https://community.cisco.com/t5/network-security/asa-error-quot-deny-tcp-no-connection-quot/m-p/4052411#M1068239</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; That is correct.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2020 20:02:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-error-quot-deny-tcp-no-connection-quot/m-p/4052411#M1068239</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-03-25T20:02:10Z</dc:date>
    </item>
    <item>
      <title>Re: ASA error "Deny TCP (no connection)"</title>
      <link>https://community.cisco.com/t5/network-security/asa-error-quot-deny-tcp-no-connection-quot/m-p/4052568#M1068244</link>
      <description>&lt;P&gt;On the outside interface I see the [SYN] from the web-client to the public IP of the web-server. Then on the inside interface I see that [SYN] going to the private IP of the web-server (192.168.2.100).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The private IP of the web-server then sends the [SYN, ACK] out the inside interface to the web-client. The [SYN, ACK] is visible on the outside interface with the public IP of the web-server going to the web-client. The process then repeats. There is no [ACK] anywhere.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Really confused as to what's happening. Is the SYN, ACK never making it to the web-client or is the ACK never making it to the webserver? What would you recommend the next step be in troubleshooting this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Mar 2020 01:55:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-error-quot-deny-tcp-no-connection-quot/m-p/4052568#M1068244</guid>
      <dc:creator>mikekaleny</dc:creator>
      <dc:date>2020-03-26T01:55:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASA error "Deny TCP (no connection)"</title>
      <link>https://community.cisco.com/t5/network-security/asa-error-quot-deny-tcp-no-connection-quot/m-p/4053217#M1068313</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Can you perform a packet capture via wireshark on the web-client, and post it?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Mar 2020 21:11:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-error-quot-deny-tcp-no-connection-quot/m-p/4053217#M1068313</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-03-26T21:11:28Z</dc:date>
    </item>
    <item>
      <title>Re: ASA error "Deny TCP (no connection)"</title>
      <link>https://community.cisco.com/t5/network-security/asa-error-quot-deny-tcp-no-connection-quot/m-p/4053243#M1068316</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, here are all three captures. Hope it's not too difficult to read them.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is the capture from;&lt;/P&gt;&lt;P&gt;Point of egress - outside2&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The source in packet capture is webclient, destination is webserver&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="asa egress.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/70015iFEE02FBCF0763657/image-size/large?v=v2&amp;amp;px=999" role="button" title="asa egress.jpg" alt="asa egress.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;This is a capture from;&lt;/P&gt;&lt;P&gt;Point of ingress - Inside interface&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The source in packet capture is webclient, destination is webserver private IP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="asa ingress.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/70014iFDC72A5C19FADBF9/image-size/large?v=v2&amp;amp;px=999" role="button" title="asa ingress.jpg" alt="asa ingress.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and this is a capture from the webclient. It is over the internet and not local.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The source in packet capture is webclient private IP, destination is webserver public IP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="webclient.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/70016iD93DAD0893301EB6/image-size/large?v=v2&amp;amp;px=999" role="button" title="webclient.jpg" alt="webclient.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As suspected, it is not receiving the tcp syn ack. Would you know of any reason why?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Would turning the stateful feature off help?&lt;/P&gt;</description>
      <pubDate>Fri, 27 Mar 2020 00:35:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-error-quot-deny-tcp-no-connection-quot/m-p/4053243#M1068316</guid>
      <dc:creator>mikekaleny</dc:creator>
      <dc:date>2020-03-27T00:35:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASA error "Deny TCP (no connection)"</title>
      <link>https://community.cisco.com/t5/network-security/asa-error-quot-deny-tcp-no-connection-quot/m-p/4053471#M1068321</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; Though based on the packet capture, the SYN-ACK leaves the ASA, i would upgrade the ASA to 9.8(4)17 or 9.12(3).9. Reload and see if it's fixed. If still not, try using "sysopt connection tcpmss 1360" for example.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Mar 2020 09:03:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-error-quot-deny-tcp-no-connection-quot/m-p/4053471#M1068321</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-03-27T09:03:01Z</dc:date>
    </item>
    <item>
      <title>Re: ASA error "Deny TCP (no connection)"</title>
      <link>https://community.cisco.com/t5/network-security/asa-error-quot-deny-tcp-no-connection-quot/m-p/4053596#M1068327</link>
      <description>&lt;P&gt;It is an ASA 5505 and I only see 9.1.7 available. I will try that and let you know. Thank you very much for your assistance thus far.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Mar 2020 12:29:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-error-quot-deny-tcp-no-connection-quot/m-p/4053596#M1068327</guid>
      <dc:creator>mikekaleny</dc:creator>
      <dc:date>2020-03-27T12:29:17Z</dc:date>
    </item>
  </channel>
</rss>

