<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Anyconnect Configuration for Vendor Access, DNS Packets dropped udp 38 Drop-reason: (no-adjacency) No valid adjacency in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/anyconnect-configuration-for-vendor-access-dns-packets-dropped/m-p/4417597#M1081517</link>
    <description>&lt;P&gt;Sorry for my late answer.&lt;BR /&gt;I don't see any interface not a route too reach out to your dns server 192.168.98.111.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Is this dns internal or the traffic has to go over the outside interface to be reachable?&lt;/P&gt;</description>
    <pubDate>Mon, 14 Jun 2021 02:12:05 GMT</pubDate>
    <dc:creator>Francesco Molino</dc:creator>
    <dc:date>2021-06-14T02:12:05Z</dc:date>
    <item>
      <title>Anyconnect Configuration for Vendor Access, DNS Packets dropped udp 38 Drop-reason: (no-adjacency) No valid adjacency</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-configuration-for-vendor-access-dns-packets-dropped/m-p/4410390#M1081136</link>
      <description>&lt;P&gt;I am helping a client create a Vendor VPN on a 5515 ASA.&amp;nbsp; They will be limited to a single subnet but need access to one internal IP address for internal DNS.&amp;nbsp; We have the ACL's in place but DNS will not work.&amp;nbsp; I did an asp-drop packet capture and am getting:&lt;/P&gt;&lt;P&gt;1: 18:38:54.679896 192.168.211.236.60493 &amp;gt; 192.168.98.111.53: udp 38 Drop-reason: (no-adjacency) No valid adjacency&lt;/P&gt;&lt;P&gt;2: 18:38:54.855866 192.168.211.236.58715 &amp;gt; 192.168.98.111.53: udp 38 Drop-reason: (no-adjacency) No valid adjacency&lt;/P&gt;&lt;P&gt;I have done some google searches and have not found anything helpful yet.&lt;/P&gt;&lt;P&gt;192.168.211.236 = Client VPN IP&lt;/P&gt;&lt;P&gt;192.168.98.111 = Internal DNS server&lt;/P&gt;&lt;P&gt;Let me know what parts of the configuration I need to provide.&lt;/P&gt;</description>
      <pubDate>Sat, 29 May 2021 00:29:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-configuration-for-vendor-access-dns-packets-dropped/m-p/4410390#M1081136</guid>
      <dc:creator>rbreshears@isgtech.com</dc:creator>
      <dc:date>2021-05-29T00:29:48Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect Configuration for Vendor Access, DNS Packets dropped udp 38 Drop-reason: (no-adjacency) No valid adjacency</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-configuration-for-vendor-access-dns-packets-dropped/m-p/4410764#M1081162</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let's assume your interface where VPN users are coming in is named outside.&lt;/P&gt;
&lt;P&gt;Can you run the following command please:&lt;/P&gt;
&lt;P&gt;- packet-tracer input outside udp 192.168.211.236 1234 192.168.98.111 53 decrypted&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also can you share output of following commands:&lt;/P&gt;
&lt;P&gt;- sh ip&lt;/P&gt;
&lt;P&gt;- sh route&lt;/P&gt;
&lt;P&gt;- sh nat&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 31 May 2021 03:04:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-configuration-for-vendor-access-dns-packets-dropped/m-p/4410764#M1081162</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2021-05-31T03:04:25Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect Configuration for Vendor Access, DNS Packets dropped udp 38 Drop-reason: (no-adjacency) No valid adjacency</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-configuration-for-vendor-access-dns-packets-dropped/m-p/4410786#M1081163</link>
      <description>&lt;P&gt;Thank you for your response.&amp;nbsp; Here is the information you requested.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside udp 192.168.211.236 1234 192.168.98.111 53 detailed&amp;nbsp; &lt;/STRONG&gt;(no option for decrypted)&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f66482b8fb0, priority=1, domain=permit, deny=false&lt;BR /&gt;hits=118647118856, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (Vendor,outside) source static any any destination static VENDOR-VPN-USERS_POOL-192.168.211.224 VENDOR-VPN-USERS_POOL-192.168.211.224&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface Vendor&lt;BR /&gt;Untranslate 192.168.98.111/53 to 192.168.98.111/53&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-list outside_access_in extended deny ip any any&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f663ef5ef70, priority=13, domain=permit, deny=true&lt;BR /&gt;hits=52429152, user_data=0x7f6634714440, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Vendor&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show ip&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;System IP Addresses:&lt;BR /&gt;Interface Name IP address Subnet mask Method&lt;BR /&gt;GigabitEthernet0/0 outside 206.121.110.50 255.255.255.248 CONFIG&lt;BR /&gt;GigabitEthernet0/3 guest 192.168.201.1 255.255.255.0 CONFIG&lt;BR /&gt;GigabitEthernet0/4 backup 10.11.12.1 255.255.255.252 CONFIG&lt;BR /&gt;GigabitEthernet0/5 failover-link 1.1.1.1 255.255.255.0 unset&lt;BR /&gt;Management0/0 management 192.168.1.1 255.255.255.0 CONFIG&lt;BR /&gt;Redundant1.208 Vendor 192.168.208.1 255.255.252.0 manual&lt;BR /&gt;Redundant1.254 inside 192.168.99.1 255.255.255.0 CONFIG&lt;BR /&gt;Current IP Addresses:&lt;BR /&gt;Interface Name IP address Subnet mask Method&lt;BR /&gt;GigabitEthernet0/0 outside 206.121.110.50 255.255.255.248 CONFIG&lt;BR /&gt;GigabitEthernet0/3 guest 192.168.201.1 255.255.255.0 CONFIG&lt;BR /&gt;GigabitEthernet0/4 backup 10.11.12.1 255.255.255.252 CONFIG&lt;BR /&gt;GigabitEthernet0/5 failover-link 1.1.1.2 255.255.255.0 unset&lt;BR /&gt;Management0/0 management 192.168.1.1 255.255.255.0 CONFIG&lt;BR /&gt;Redundant1.208 Vendor 192.168.208.1 255.255.252.0 manual&lt;BR /&gt;Redundant1.254 inside 192.168.99.1 255.255.255.0 CONFIG&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show route&amp;nbsp; &lt;/STRONG&gt;(Omitted gateway of last resort/public IP address gateway)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;C 1.1.1.0 255.255.255.0 is directly connected, failover-link&lt;BR /&gt;L 1.1.1.2 255.255.255.255 is directly connected, failover-link&lt;BR /&gt;S 10.0.0.0 255.0.0.0 [1/0] via 192.168.99.254, inside&lt;BR /&gt;C 10.11.12.0 255.255.255.252 is directly connected, backup&lt;BR /&gt;L 10.11.12.1 255.255.255.255 is directly connected, backup&lt;BR /&gt;S 10.81.1.0 255.255.255.0 [200/0] via 192.69.81.81, outside&lt;BR /&gt;S 172.16.0.0 255.240.0.0 [1/0] via 192.168.99.254, inside&lt;BR /&gt;S 172.16.16.0 255.255.254.0 [1/0] via 192.168.99.254, outside&lt;BR /&gt;S 192.168.1.0 255.255.255.0 [1/0] via 192.168.99.254, inside&lt;BR /&gt;S 192.168.2.0 255.255.255.0 [1/0] via 192.168.99.254, inside&lt;BR /&gt;S 192.168.66.0 255.255.255.0 [1/0] via 192.168.99.254, inside&lt;BR /&gt;S 192.168.88.0 255.255.252.0 [1/0] via 192.168.99.254, inside&lt;BR /&gt;S 192.168.96.0 255.255.252.0 [1/0] via 192.168.99.254, inside&lt;BR /&gt;V 192.168.96.97 255.255.255.255 connected by VPN (advertised), outside&lt;BR /&gt;V 192.168.96.104 255.255.255.255 connected by VPN (advertised), outside&lt;/P&gt;&lt;P&gt;C 192.168.99.0 255.255.255.0 is directly connected, inside&lt;BR /&gt;L 192.168.99.1 255.255.255.255 is directly connected, inside&lt;BR /&gt;S 192.168.113.0 255.255.255.0 [200/0] via 192.69.81.81, outside&lt;BR /&gt;S 192.168.180.0 255.255.255.0 [1/0] via 192.168.99.254, inside&lt;BR /&gt;C 192.168.201.0 255.255.255.0 is directly connected, guest&lt;BR /&gt;L 192.168.201.1 255.255.255.255 is directly connected, guest&lt;BR /&gt;C 192.168.208.0 255.255.252.0 is directly connected, Vendor&lt;BR /&gt;L 192.168.208.1 255.255.255.255 is directly connected, Vendor&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Show nat&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (inside) to (outside) source static any any destination static NETWORK_OBJ_10.1.250.0_24 NETWORK_OBJ_10.1.250.0_24 no-proxy-arp route-lookup&lt;BR /&gt;translate_hits = 81, untranslate_hits = 82&lt;BR /&gt;2 (inside) to (outside) source static any any destination static REMOTE-VPN-USERS_POOL-192.168.96.0 REMOTE-VPN-USERS_POOL-192.168.96.0 no-proxy-arp route-lookup&lt;BR /&gt;translate_hits = 6082410, untranslate_hits = 6274400&lt;BR /&gt;3 (inside) to (outside) source static TF-VoIP TF-VoIP destination static ANetwork ANetwork no-proxy-arp route-lookup inactive&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;4 (inside) to (outside) source static TF-VoIP TF-VoIP destination static DM_INLINE_NETWORK_1 DM_INLINE_NETWORK_1 no-proxy-arp route-lookup&lt;BR /&gt;translate_hits = 1101357, untranslate_hits = 1306099&lt;BR /&gt;5 (inside) to (outside) source static DM_INLINE_NETWORK_2 DM_INLINE_NETWORK_2 destination static Main Main no-proxy-arp route-lookup&lt;BR /&gt;translate_hits = 2547219, untranslate_hits = 2554318&lt;BR /&gt;6 (Vendor) to (inside) source static any any unidirectional&lt;BR /&gt;translate_hits = 1129, untranslate_hits = 0&lt;BR /&gt;7 (Vendor) to (outside) source static any any destination static VENDOR-VPN-USERS_POOL-192.168.211.224 VENDOR-VPN-USERS_POOL-192.168.211.224&lt;BR /&gt;translate_hits = 3827, untranslate_hits = 3827&lt;BR /&gt;8 (Vendor) to (inside) source static any any destination static VENDOR-VPN-USERS_POOL-192.168.211.224 VENDOR-VPN-USERS_POOL-192.168.211.224 inactive&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (inside) to (outside) source static AAnalog-INT AAnalog-EXT&lt;BR /&gt;translate_hits = 460136, untranslate_hits = 3000679&lt;BR /&gt;2 (inside) to (outside) source static OBJ-FTP 12.185.235.3&lt;BR /&gt;translate_hits = 756921, untranslate_hits = 10388311&lt;BR /&gt;3 (inside) to (outside) source static OBJ-EXCHANGE 12.185.235.2&lt;BR /&gt;translate_hits = 618288, untranslate_hits = 27239552&lt;BR /&gt;4 (inside) to (outside) source static auth.domain.com 12.185.235.5&lt;BR /&gt;translate_hits = 502320, untranslate_hits = 4177732&lt;/P&gt;&lt;P&gt;Manual NAT Policies (Section 3)&lt;BR /&gt;1 (guest) to (outside) source dynamic any interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;2 (Vendor) to (outside) source dynamic any interface description Allow vendors out to the Internet&lt;BR /&gt;translate_hits = 609511, untranslate_hits = 545&lt;BR /&gt;3 (inside) to (outside) source dynamic any interface&lt;BR /&gt;translate_hits = 831589775, untranslate_hits = 44970007&lt;BR /&gt;4 (inside) to (backup) source dynamic any interface&lt;BR /&gt;translate_hits = 35, untranslate_hits = 22267&lt;/P&gt;</description>
      <pubDate>Mon, 31 May 2021 04:22:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-configuration-for-vendor-access-dns-packets-dropped/m-p/4410786#M1081163</guid>
      <dc:creator>rbreshears@isgtech.com</dc:creator>
      <dc:date>2021-05-31T04:22:25Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect Configuration for Vendor Access, DNS Packets dropped udp 38 Drop-reason: (no-adjacency) No valid adjacency</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-configuration-for-vendor-access-dns-packets-dropped/m-p/4417597#M1081517</link>
      <description>&lt;P&gt;Sorry for my late answer.&lt;BR /&gt;I don't see any interface not a route too reach out to your dns server 192.168.98.111.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Is this dns internal or the traffic has to go over the outside interface to be reachable?&lt;/P&gt;</description>
      <pubDate>Mon, 14 Jun 2021 02:12:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-configuration-for-vendor-access-dns-packets-dropped/m-p/4417597#M1081517</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2021-06-14T02:12:05Z</dc:date>
    </item>
  </channel>
</rss>

