<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TCP Bypass not working in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4166163#M1074718</link>
    <description>&lt;P&gt;Of course do I need it on the internal and on the external firewall. But tcp bypass needs to work ion the internal at first and this is the problem&lt;/P&gt;&lt;P&gt;I'll do a paket capture tomorow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Tue, 13 Oct 2020 20:12:25 GMT</pubDate>
    <dc:creator>markus.bock</dc:creator>
    <dc:date>2020-10-13T20:12:25Z</dc:date>
    <item>
      <title>TCP Bypass not working</title>
      <link>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4164581#M1074595</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a problem with asymetric routing for a host in our network. A connection comming from www to the host is going through a third party utm appliance to the host 10.10.10.99. The default gateway is a cisco asa 10.10.10.1. In the log of the asa i can see the message&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;Deny TCP (no connection) from 10.10.10.99/3389 to 80.122.157.55/34334 flags SYN ACK on interface NET_10.10.10.0_Inside&lt;/PRE&gt;&lt;P&gt;This shows me a problem with asymmetric routing. I cannot change the routing and access from www to the host, I would like to configure TYP Bypass for this host but I don't get it to work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have configured the following policy&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;access-list tcp_bypass extended permit tcp host 10.10.10.99 any
class-map tcp_bypass
match access-list tcp_bypass
policy-map tcp_bypass_policy
class tcp_bypass
set connection advanced-options tcp-state-bypass
service-policy tcp_bypass_policy interface NET_10.10.10.0_Inside&lt;/PRE&gt;&lt;P&gt;But when I try to access the host I still get the log entries from above.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can anybody please help me to find the problem please?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 10 Oct 2020 16:00:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4164581#M1074595</guid>
      <dc:creator>markus.bock</dc:creator>
      <dc:date>2020-10-10T16:00:04Z</dc:date>
    </item>
    <item>
      <title>Re: TCP Bypass not working</title>
      <link>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4164651#M1074602</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After enabling the tcp bypass policy, are you still getting the same error?&lt;/P&gt;
&lt;P&gt;I don't know your real design but have you checked if PBR would be a better solution to forward back this traffic to the other UTM from that particular host?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 11 Oct 2020 02:29:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4164651#M1074602</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2020-10-11T02:29:58Z</dc:date>
    </item>
    <item>
      <title>Re: TCP Bypass not working</title>
      <link>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4164666#M1074603</link>
      <description>&lt;P&gt;Yes, I get the same log entry.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Good idea with PBR. I will try it&lt;/P&gt;&lt;P&gt;Thanks and kind regards&lt;/P&gt;</description>
      <pubDate>Sun, 11 Oct 2020 06:47:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4164666#M1074603</guid>
      <dc:creator>markus.bock</dc:creator>
      <dc:date>2020-10-11T06:47:47Z</dc:date>
    </item>
    <item>
      <title>Re: TCP Bypass not working</title>
      <link>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4164704#M1074604</link>
      <description>&lt;P&gt;PBR is not the solution for my problem because the ASA is out internal gateway for all networks.&lt;/P&gt;&lt;P&gt;I need the tcp-bypass working but I don't understand why it is not working&lt;/P&gt;</description>
      <pubDate>Sun, 11 Oct 2020 10:03:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4164704#M1074604</guid>
      <dc:creator>markus.bock</dc:creator>
      <dc:date>2020-10-11T10:03:08Z</dc:date>
    </item>
    <item>
      <title>Re: TCP Bypass not working</title>
      <link>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4164801#M1074605</link>
      <description>&lt;P&gt;The destination IP on the TCP bypass ACL should be the remote host, is that what you configured? Also, you would need to apply the &lt;STRONG&gt;same-security-traffic permit intra-interface&lt;/STRONG&gt; command to allow the traffic to enter and exit out of the same interface.&lt;/P&gt;&lt;P&gt;Also, please a look at this post of mine about TCP bypass on the ASA:&lt;/P&gt;&lt;P&gt;&lt;A href="https://bluenetsec.com/asa-tcp-state-bypass/" target="_blank"&gt;https://bluenetsec.com/asa-tcp-state-bypass/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 11 Oct 2020 17:48:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4164801#M1074605</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2020-10-11T17:48:02Z</dc:date>
    </item>
    <item>
      <title>Re: TCP Bypass not working</title>
      <link>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4164810#M1074608</link>
      <description>&lt;P&gt;As Destination I have configzred ANY. The source host ist 10.10.10.99 and&amp;nbsp;&lt;STRONG&gt;same-security-traffic permit intra-interface&lt;/STRONG&gt; is set.&lt;/P&gt;&lt;P&gt;As service I have configured TCP because of the dynamic ports.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 11 Oct 2020 18:37:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4164810#M1074608</guid>
      <dc:creator>markus.bock</dc:creator>
      <dc:date>2020-10-11T18:37:40Z</dc:date>
    </item>
    <item>
      <title>Re: TCP Bypass not working</title>
      <link>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4165175#M1074642</link>
      <description>&lt;P&gt;make Host initiate the traffic toward the ASA outside&amp;nbsp;&lt;BR /&gt;OR&lt;BR /&gt;make inside with different VLAN,&lt;BR /&gt;one for UTM and other for ASA&amp;nbsp;&lt;BR /&gt;and make UTM the default gateway.&lt;BR /&gt;&lt;BR /&gt;last thing ASA not support PRB&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2020 13:25:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4165175#M1074642</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2020-10-12T13:25:32Z</dc:date>
    </item>
    <item>
      <title>Re: TCP Bypass not working</title>
      <link>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4165349#M1074646</link>
      <description>&lt;P&gt;Does it solve or NOT?&lt;BR /&gt;same-security-traffic is for the traffic for same interface,&lt;BR /&gt;here the traffic is enter via OUTSIDE of UTM and exit from INSIDE of ASA.&lt;BR /&gt;I check the config can you &amp;nbsp;test the following,&lt;BR /&gt;change the real IP address with Mapped address in Extended ACL.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2020 18:14:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4165349#M1074646</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2020-10-12T18:14:21Z</dc:date>
    </item>
    <item>
      <title>Re: TCP Bypass not working</title>
      <link>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4165451#M1074655</link>
      <description>&lt;P&gt;Can you please share the topology along with the IP addresses?, I think the 10.10.10.99 should be the destination host on the ACL, not the source, but if you can share the topology I can get my head around it better.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2020 20:29:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4165451#M1074655</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2020-10-12T20:29:17Z</dc:date>
    </item>
    <item>
      <title>Re: TCP Bypass not working</title>
      <link>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4165745#M1074675</link>
      <description>&lt;P&gt;Interesting.&amp;nbsp; Have you confirmed that routing towards internet and NAT for 10.10.10.99 are in place on the ASA?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As Aref has mentioned, would be good to see a topology diagram with an explanation of expected traffic flow.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2020 08:58:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4165745#M1074675</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2020-10-13T08:58:28Z</dc:date>
    </item>
    <item>
      <title>Re: TCP Bypass not working</title>
      <link>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4165758#M1074678</link>
      <description>&lt;P&gt;Attached is the network diagram.&lt;/P&gt;&lt;P&gt;I have tested it with a server in a other vlan with the same result.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2020 09:17:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4165758#M1074678</guid>
      <dc:creator>markus.bock</dc:creator>
      <dc:date>2020-10-13T09:17:58Z</dc:date>
    </item>
    <item>
      <title>Re: TCP Bypass not working</title>
      <link>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4165774#M1074681</link>
      <description>&lt;P&gt;could you run a packet tracer on the ASA to verify we are hitting the TCP bypass configuration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2020 09:29:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4165774#M1074681</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2020-10-13T09:29:13Z</dc:date>
    </item>
    <item>
      <title>Re: TCP Bypass not working</title>
      <link>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4166029#M1074704</link>
      <description>&lt;P&gt;I think in this case you would need tcp bypass to be implemented on both the internal and external firewall.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2020 16:20:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4166029#M1074704</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2020-10-13T16:20:41Z</dc:date>
    </item>
    <item>
      <title>Re: TCP Bypass not working</title>
      <link>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4166163#M1074718</link>
      <description>&lt;P&gt;Of course do I need it on the internal and on the external firewall. But tcp bypass needs to work ion the internal at first and this is the problem&lt;/P&gt;&lt;P&gt;I'll do a paket capture tomorow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2020 20:12:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4166163#M1074718</guid>
      <dc:creator>markus.bock</dc:creator>
      <dc:date>2020-10-13T20:12:25Z</dc:date>
    </item>
    <item>
      <title>Re: TCP Bypass not working</title>
      <link>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4166336#M1074728</link>
      <description>&lt;P&gt;Try to add this on the external firewall:&lt;/P&gt;&lt;PRE&gt;access-list tcp_bypass extended permit tcp any host 10.10.10.99&lt;BR /&gt;access-list tcp_bypass extended permit tcp host 10.10.10.99 any&lt;/PRE&gt;&lt;P&gt;and this on the internal:&lt;/P&gt;&lt;PRE&gt;access-list tcp_bypass extended permit tcp host 10.10.10.99 any&lt;/PRE&gt;&lt;P&gt;As the ASA would create the state entries tied to the interfaces (unless you configure interfaces zones) the traffic leaving the external firewall out of the DMZ interface would not match the return traffic via the transfer interface, hence it would be dropped. This is why I think you need two rules on the tcp_bypass ACL.&amp;nbsp;One to match the traffic leaving its DMZ interface towards the host 10.10.10.99, and another to match the received traffic from the host 10.10.10.99 on transfer interface. However, for the internal firewall, it would only have one possibility to see the host 10.10.10.99 traffic via VLAN10 interface, therefore, we would need only rule on the internal firewall.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2020 06:41:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4166336#M1074728</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2020-10-14T06:41:15Z</dc:date>
    </item>
    <item>
      <title>Re: TCP Bypass not working</title>
      <link>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4166466#M1074734</link>
      <description>&lt;P&gt;Could you please verify if traffic is actually matching your ACL that is used for TCP bypass.&amp;nbsp; This should be visible in a packet tracer&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2020 09:25:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4166466#M1074734</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2020-10-14T09:25:34Z</dc:date>
    </item>
    <item>
      <title>Re: TCP Bypass not working</title>
      <link>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4166469#M1074735</link>
      <description>&lt;P&gt;try this&lt;/P&gt;&lt;P&gt;1-config the mapped IP not real IP in ACL extended tcp_bypass.&lt;/P&gt;&lt;P&gt;2- remove any and config outside subnet of ASA.&lt;/P&gt;&lt;P&gt;try this solution I think this is solution for your issue.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2020 14:29:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-bypass-not-working/m-p/4166469#M1074735</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2020-10-14T14:29:44Z</dc:date>
    </item>
  </channel>
</rss>

