<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CIsco ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4409183#M1081080</link>
    <description>&lt;P&gt;Like this:&lt;/P&gt;
&lt;PRE&gt;packet-tracer input &amp;lt;interface name of your inside interface&amp;gt; tcp &amp;lt;source address of any inside host&amp;gt; 1025 &amp;lt;destination address of any remote host&amp;gt; 80&lt;/PRE&gt;
&lt;P&gt;It doesn't matter if the destination host is listening on port 80 or not. Packet-tracer only creates a synthetic packet for processing into the ASA and displays the results of the packet processing.&lt;/P&gt;</description>
    <pubDate>Thu, 27 May 2021 04:41:47 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2021-05-27T04:41:47Z</dc:date>
    <item>
      <title>CIsco ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4408368#M1081042</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;site to site tunnel is up on the firewall but the packet encap is showing 0.&amp;nbsp;It looks like ASA is not sending any encrypted packet to the tunnel. Any suggestion?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 May 2021 15:41:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4408368#M1081042</guid>
      <dc:creator>Poo17</dc:creator>
      <dc:date>2021-05-25T15:41:16Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4408374#M1081043</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/987519"&gt;@Poo17&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It could potentially be the traffic is unintentially natted by an existing nat rule. Or a routing issue from the local switch.&lt;/P&gt;
&lt;P&gt;Run packet-tracer from the CLI and provide the output.&lt;/P&gt;
&lt;P&gt;Also provide your configuration and the output of "show nat detail".&lt;/P&gt;</description>
      <pubDate>Tue, 25 May 2021 15:52:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4408374#M1081043</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-05-25T15:52:41Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4408399#M1081045</link>
      <description>&lt;P&gt;Not sure what is the issue, can you show us exmaple config, if the traffic need to go to destination you need to be added in intresting traffic to allow in tunnel. this can be verified your config and ACL.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 May 2021 16:39:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4408399#M1081045</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-05-25T16:39:32Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4409155#M1081079</link>
      <description>&lt;P&gt;How to run the packet tracer command?&lt;/P&gt;</description>
      <pubDate>Thu, 27 May 2021 02:53:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4409155#M1081079</guid>
      <dc:creator>Poo17</dc:creator>
      <dc:date>2021-05-27T02:53:29Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4409183#M1081080</link>
      <description>&lt;P&gt;Like this:&lt;/P&gt;
&lt;PRE&gt;packet-tracer input &amp;lt;interface name of your inside interface&amp;gt; tcp &amp;lt;source address of any inside host&amp;gt; 1025 &amp;lt;destination address of any remote host&amp;gt; 80&lt;/PRE&gt;
&lt;P&gt;It doesn't matter if the destination host is listening on port 80 or not. Packet-tracer only creates a synthetic packet for processing into the ASA and displays the results of the packet processing.&lt;/P&gt;</description>
      <pubDate>Thu, 27 May 2021 04:41:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4409183#M1081080</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-05-27T04:41:47Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4409209#M1081084</link>
      <description>&lt;P&gt;Thank you, Marvin. This is what I got&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA# packet-tracer input inside tcp 1.1.1.1 1025 2.2.2.2 80&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 0.0.0.0 0.0.0.0 via 12.X.X.X, outside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 May 2021 06:07:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4409209#M1081084</guid>
      <dc:creator>Poo17</dc:creator>
      <dc:date>2021-05-27T06:07:36Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4409238#M1081086</link>
      <description>&lt;P&gt;Did you use a real inside and outside host address vs. the dummy "1.1.1.1" and "2.2.2.2" you indicated in your reply?&lt;/P&gt;
&lt;P&gt;If so, then you appear to have an access-list on the inside interface denying the incoming traffic.&lt;/P&gt;</description>
      <pubDate>Thu, 27 May 2021 06:45:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4409238#M1081086</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-05-27T06:45:57Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4409240#M1081087</link>
      <description>&lt;P&gt;Yes, I used the real IP address.&lt;/P&gt;</description>
      <pubDate>Thu, 27 May 2021 06:53:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4409240#M1081087</guid>
      <dc:creator>Poo17</dc:creator>
      <dc:date>2021-05-27T06:53:24Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4409355#M1081091</link>
      <description>&lt;P&gt;So check your ACL (any ACL applied to the interface with "access-group" command in the running-config or appearing in ASDM under the inside interface).&lt;/P&gt;</description>
      <pubDate>Thu, 27 May 2021 10:06:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4409355#M1081091</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-05-27T10:06:58Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4409638#M1081098</link>
      <description>&lt;P&gt;ASA# sh run | i access-group&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 May 2021 17:11:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4409638#M1081098</guid>
      <dc:creator>Poo17</dc:creator>
      <dc:date>2021-05-27T17:11:52Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4409762#M1081102</link>
      <description>&lt;P&gt;Need to check the access-list inside_access_in.&lt;/P&gt;</description>
      <pubDate>Thu, 27 May 2021 20:57:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa/m-p/4409762#M1081102</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-05-27T20:57:31Z</dc:date>
    </item>
  </channel>
</rss>

