<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA ACL Blocking in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-acl-blocking/m-p/4475894#M1084056</link>
    <description>&lt;P&gt;Probably you are running packet tracer incorrectly as you do see it getting blocked in the syslogs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We can help but I will need more details in terms of IPs and interfaces, or the packet tracer output, you can chose to put fake IPs as long as you can correlate them back and forth while we try to figure this out.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Chakshu&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Do rate helpful posts !&lt;/EM&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 28 Sep 2021 19:09:22 GMT</pubDate>
    <dc:creator>Chakshu Piplani</dc:creator>
    <dc:date>2021-09-28T19:09:22Z</dc:date>
    <item>
      <title>ASA ACL Blocking</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-blocking/m-p/4475632#M1084044</link>
      <description>&lt;P&gt;Hi Cisco Community,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am hoping someone can help me out.&amp;nbsp; Myself and another Engineer have run multiple tests on the ASA and have come up empty.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have an ACL that allows traffic between two servers on two different networks.&amp;nbsp; When we attempt to pass traffic between the two the ASA shows deny by access group "Access Group X" in the live log file.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Packet tracer done on the ASA CLI shows allow. Either this is a bug or an issue with the configuration, I cant seem to spot it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When we look at the ACL rules it does not show any blocks between the two but allowed.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;E&lt;/P&gt;</description>
      <pubDate>Tue, 28 Sep 2021 13:56:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-blocking/m-p/4475632#M1084044</guid>
      <dc:creator>EngineeringAir</dc:creator>
      <dc:date>2021-09-28T13:56:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ACL Blocking</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-blocking/m-p/4475894#M1084056</link>
      <description>&lt;P&gt;Probably you are running packet tracer incorrectly as you do see it getting blocked in the syslogs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We can help but I will need more details in terms of IPs and interfaces, or the packet tracer output, you can chose to put fake IPs as long as you can correlate them back and forth while we try to figure this out.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Chakshu&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Do rate helpful posts !&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Sep 2021 19:09:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-blocking/m-p/4475894#M1084056</guid>
      <dc:creator>Chakshu Piplani</dc:creator>
      <dc:date>2021-09-28T19:09:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ACL Blocking</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-blocking/m-p/4475909#M1084058</link>
      <description>&lt;P&gt;Is it that traffic is passing successfully but you are seeing drop logs or is the traffic actually being dropped / not allowed?&amp;nbsp; Could you post the actual log you are seeing (screenshot).&amp;nbsp; Post the full output of your packet-tracer including the command you are running.&lt;/P&gt;
&lt;P&gt;Also, a full running configuration (change any public IPs and remove usernames and passwords.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Sep 2021 19:40:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-blocking/m-p/4475909#M1084058</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2021-09-28T19:40:30Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ACL Blocking</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-blocking/m-p/4477680#M1084100</link>
      <description>&lt;P&gt;Hi Shakshu,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please forgive me if I miss anything.&amp;nbsp; Thank you for your help.&amp;nbsp; Please see below a description of the interfaces and the Packet tracer I am running. If you have any suggestions to try, please let me know.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Interface Inside 10.10.10.1&lt;/P&gt;&lt;P&gt;Interface Server_DMZ 84.1.1.1&lt;/P&gt;&lt;P&gt;ACL&lt;BR /&gt;- Inside Interafce&lt;BR /&gt;- Allow Source 10.10.10.1 Destination 84.1.1.1&lt;BR /&gt;- Allow Source 84.1.1.1 Destination 10.10.10.1&lt;/P&gt;&lt;P&gt;ACL&lt;BR /&gt;Server_DMZ&lt;BR /&gt;- Allow Source 10.10.10.1 Destination 84.1.1.1&lt;BR /&gt;- Allow Source 84.1.1.1 Destination 10.10.10.1&lt;/P&gt;&lt;P&gt;NAT Rules&lt;BR /&gt;Inside Interface&lt;BR /&gt;- Original Packet Source 84.1.1.1 Destination 10.10.10.1 Translated Packet Source 10.20.20.1 Destination Original&lt;/P&gt;&lt;P&gt;Server_DMZ Interface&lt;BR /&gt;- Original Packet Source 10.10.10.1 Destination 10.20.20.1 Translated Packet Source Original Destination 84.1.1.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;pri/act/Firewall01# packet-tracer input Server_DMZ icmp 10.10.10.1 8 0 84.1.1.1 detailed&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7ff67a220ab0, priority=1, domain=permit, deny=false&lt;BR /&gt;hits=3179191418, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;input_ifc=Server_DMZ, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (Server_DMZ,Inside) source static SWPE.10.10.10.1 SWPE.10.10.10.1 destination static Netmon.84.1.1.1 Netmon.84.1.1.1 no-proxy-arp&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface Inside&lt;BR /&gt;Untranslate 84.1.1.1/0 to 84.1.1.1/0&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group Server_DMZ_access_in in interface Server_DMZ&lt;BR /&gt;access-list Server_DMZ_access_in extended permit object-group ICMP_ALL any any&lt;BR /&gt;object-group service ICMP_ALL&lt;BR /&gt;service-object icmp echo&lt;BR /&gt;service-object icmp echo-reply&lt;BR /&gt;service-object icmp information-reply&lt;BR /&gt;service-object icmp information-request&lt;BR /&gt;service-object icmp traceroute&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7ff6843ead10, priority=13, domain=permit, deny=false&lt;BR /&gt;hits=3480, user_data=0x7ff683f62cc0, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=8, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Server_DMZ, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (Server_DMZ,Inside) source static SWPE.10.10.10.1 SWPE.10.10.10.1 destination static Netmon.84.1.1.1 Netmon.84.1.1.1 no-proxy-arp&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 10.10.10.1/0 to 10.10.10.1/0&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7ff692a096d0, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=0, user_data=0x7ff690e626d0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=10.10.10.1, mask=255.255.255.255, port=0, tag=any&lt;BR /&gt;dst ip/id=84.1.1.1, mask=255.255.255.255, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Server_DMZ, output_ifc=Inside&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7ff675f108a0, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=157548756, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7ff67a269f00, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=21032813, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Server_DMZ, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect icmp&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7ff679feb740, priority=70, domain=inspect-icmp, deny=false&lt;BR /&gt;hits=27418, user_data=0x7ff6811a10b0, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Server_DMZ, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7ff67a269320, priority=66, domain=inspect-icmp-error, deny=false&lt;BR /&gt;hits=27503, user_data=0x7ff677e15ee0, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Server_DMZ, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (Inside,Server_DMZ) source static Netmon.84.1.1.1 netmon.nat.10.20.20.1 destination static SWPE.10.10.10.1 SWPE.10.10.10.1&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0x7ff68dd52a90, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;hits=160, user_data=0x7ff690ef3e90, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=10.10.10.1, mask=255.255.255.255, port=0, tag=any&lt;BR /&gt;dst ip/id=84.1.1.1, mask=255.255.255.255, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Server_DMZ, output_ifc=Inside&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0x7ff679ff3090, priority=0, domain=user-statistics, deny=false&lt;BR /&gt;hits=137093061, user_data=0x7ff67a22cce0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=Inside&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x7ff675f108a0, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=157548758, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x7ff677fba9f0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=141092909, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 13&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;out id=0x7ff679ffd530, priority=0, domain=user-statistics, deny=false&lt;BR /&gt;hits=20904776, user_data=0x7ff67a22cce0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=Server_DMZ&lt;/P&gt;&lt;P&gt;Phase: 14&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 146242950, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Phase: 15&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 84.1.1.1using egress ifc Inside&lt;/P&gt;&lt;P&gt;Phase: 16&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: next-hop and adjacency&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;adjacency Active&lt;BR /&gt;next-hop mac address 000c.29a9.a8e7 hits 12 reference 56&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: Server_DMZ&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Thu, 30 Sep 2021 12:26:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-blocking/m-p/4477680#M1084100</guid>
      <dc:creator>EngineeringAir</dc:creator>
      <dc:date>2021-09-30T12:26:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ACL Blocking</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-blocking/m-p/4477682#M1084101</link>
      <description>&lt;P&gt;Hi Marius,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I replied with the output of the packet tracer.&amp;nbsp; I will upload the full running configuration once I sanitize it.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;E&lt;/P&gt;</description>
      <pubDate>Thu, 30 Sep 2021 12:25:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-blocking/m-p/4477682#M1084101</guid>
      <dc:creator>EngineeringAir</dc:creator>
      <dc:date>2021-09-30T12:25:03Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ACL Blocking</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-blocking/m-p/4477713#M1084110</link>
      <description>&lt;P&gt;"packet-tracer input Server_DMZ icmp 10.10.10.1 8 0 84.1.1.1 detailed"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Shouldn't you be running "packet-tracer input Inside icmp 10.10.10.1 8 0 84.1.1.1 detailed" instead?&lt;/P&gt;
&lt;P&gt;You need to have the source interface mentioned while running the packet tracer.&lt;/P&gt;
&lt;P&gt;Syntax:&lt;/P&gt;
&lt;PRE&gt;packet-tracer input $source-interface $traffic-type $src_address $src_proto $src_proto_options $dest_address&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Chakshu&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Do rate helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Sep 2021 13:01:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-blocking/m-p/4477713#M1084110</guid>
      <dc:creator>Chakshu Piplani</dc:creator>
      <dc:date>2021-09-30T13:01:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ACL Blocking</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-blocking/m-p/4477718#M1084112</link>
      <description>&lt;P&gt;Hi Chakshu,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the updated packet tracer.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;pri/act/Firewall01# packet-tracer input Inside icmp 84.1.1.1 8 0 10.10.10.1detailed&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (Inside,Server_DMZ) source static Netmon.84.1.1.1 netmon.nat.10.215.24.253 destination static SWPE.10.10.10.1 SWPE.10.10.10.1&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface Server_DMZ&lt;BR /&gt;Untranslate 10.10.10.1/0 to 10.10.10.1/0&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group Inside_access_in in interface Inside&lt;BR /&gt;access-list Inside_access_in remark Solarwinds access to City Solarwinds&lt;BR /&gt;access-list Inside_access_in extended permit ip object Netmon.84.1.1.1 object-group DM_INLINE_NETWORK_17&lt;BR /&gt;object-group network DM_INLINE_NETWORK_17&lt;BR /&gt;network-object object SWPE.10.10.10.1&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7ff67b921300, priority=13, domain=permit, deny=false&lt;BR /&gt;hits=13725, user_data=0x7ff66976be40, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=84.1.1.1, mask=255.255.255.255, port=0, tag=any&lt;BR /&gt;dst ip/id=10.10.10.1, mask=255.255.255.255, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (Inside,Server_DMZ) source static Netmon.84.1.1.1 netmon.nat.10.20.20.1 destination static SWPE.10.10.10.1 SWPE.10.10.10.1&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 84.1.1.1/0 to 10.215.24.253/0&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7ff68fd15660, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=4143, user_data=0x7ff690ef3e90, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=84.1.1.1, mask=255.255.255.255, port=0, tag=any&lt;BR /&gt;dst ip/id=10.10.10.1, mask=255.255.255.255, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Inside, output_ifc=Server_DMZ&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7ff675f108a0, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=163031172, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7ff677fba9f0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=144998048, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect icmp&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7ff679fb6690, priority=70, domain=inspect-icmp, deny=false&lt;BR /&gt;hits=44285613, user_data=0x7ff6811a10b0, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7ff677fb9f30, priority=66, domain=inspect-icmp-error, deny=false&lt;BR /&gt;hits=47845073, user_data=0x7ff677a24f00, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7ff684495020, priority=13, domain=ipsec-tunnel-flow, deny=true&lt;BR /&gt;hits=127565923, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (Inside,Server_DMZ) source static Netmon.84.1.1.1 netmon.nat.10.20.20.1 destination static SWPE.10.10.10.1 SWPE.10.10.10.1&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0x7ff69353b260, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;hits=4144, user_data=0x7ff68ca6fce0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=84.1.1.1, mask=255.255.255.255, port=0, tag=any&lt;BR /&gt;dst ip/id=10.10.10.1, mask=255.255.255.255, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Inside, output_ifc=Server_DMZ&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0x7ff679ffd530, priority=0, domain=user-statistics, deny=false&lt;BR /&gt;hits=21586066, user_data=0x7ff67a22cce0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=Server_DMZ&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x7ff675f108a0, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=163031174, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x7ff67a269f00, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=21716516, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Server_DMZ, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 13&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;out id=0x7ff679ff3090, priority=0, domain=user-statistics, deny=false&lt;BR /&gt;hits=140998137, user_data=0x7ff67a22cce0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=Inside&lt;/P&gt;&lt;P&gt;Phase: 14&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 150244888, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Phase: 15&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 10.215.24.3 using egress ifc Server_DMZ&lt;/P&gt;&lt;P&gt;Phase: 16&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: next-hop and adjacency&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;adjacency Active&lt;BR /&gt;next-hop mac address b40c.25ef.0014 hits 1004 reference 54&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: Inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Server_DMZ&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;pri/act/Firewall01#&lt;/P&gt;</description>
      <pubDate>Thu, 30 Sep 2021 13:12:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-blocking/m-p/4477718#M1084112</guid>
      <dc:creator>EngineeringAir</dc:creator>
      <dc:date>2021-09-30T13:12:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ACL Blocking</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-blocking/m-p/4477727#M1084113</link>
      <description>&lt;P&gt;You have ran:&lt;/P&gt;
&lt;P&gt;packet-tracer input Inside icmp 84.1.1.1 8 0 10.10.10.1 detailed&lt;/P&gt;
&lt;P&gt;I want the output of&lt;/P&gt;
&lt;P&gt;packet-tracer input Inside icmp 10.10.10.1 8 0 84.1.1.1 detailed&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Sep 2021 13:33:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-blocking/m-p/4477727#M1084113</guid>
      <dc:creator>Chakshu Piplani</dc:creator>
      <dc:date>2021-09-30T13:33:09Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ACL Blocking</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-blocking/m-p/4477736#M1084115</link>
      <description>&lt;P&gt;Hi Chakshu,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the updated packet-tracer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Firewall01# packet-tracer input Inside icmp 10.10.10.1 8 0 84.1.1.1 detailed&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 84.1.1.1 using egress ifc Inside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group Inside_access_in in interface Inside&lt;BR /&gt;access-list Inside_access_in extended permit ip object SWPE.10.10.10.1 object Netmon.84.1.1.1&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7ff6855b40f0, priority=13, domain=permit, deny=false&lt;BR /&gt;hits=0, user_data=0x7ff68502f580, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=10.10.10.1, mask=255.255.255.255, port=0, tag=any&lt;BR /&gt;dst ip/id=84.1.1.1, mask=255.255.255.255, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7ff675f108a0, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=163123750, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7ff677fba9f0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=145069087, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect icmp&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7ff679fb6690, priority=70, domain=inspect-icmp, deny=false&lt;BR /&gt;hits=44310731, user_data=0x7ff6811a10b0, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7ff677fb9f30, priority=66, domain=inspect-icmp-error, deny=false&lt;BR /&gt;hits=47870595, user_data=0x7ff677a24f00, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7ff684495020, priority=13, domain=ipsec-tunnel-flow, deny=true&lt;BR /&gt;hits=127633002, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0x7ff679ff3090, priority=0, domain=user-statistics, deny=false&lt;BR /&gt;hits=141070737, user_data=0x7ff67a22cce0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=Inside&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x7ff675f108a0, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=163123752, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x7ff677fba9f0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=145069089, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;out id=0x7ff679ff3090, priority=0, domain=user-statistics, deny=false&lt;BR /&gt;hits=141070738, user_data=0x7ff67a22cce0, cs_id=0x0, reverse, flags=0x0,protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=Inside&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 150319849, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Phase: 13&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 84.1.1.1 using egress ifc Inside&lt;/P&gt;&lt;P&gt;Phase: 14&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: next-hop and adjacency&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;adjacency Active&lt;BR /&gt;next-hop mac address 000c.29a9.a8e7 hits 102 reference 24&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: Inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Thu, 30 Sep 2021 13:47:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-blocking/m-p/4477736#M1084115</guid>
      <dc:creator>EngineeringAir</dc:creator>
      <dc:date>2021-09-30T13:47:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ACL Blocking</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-blocking/m-p/4477737#M1084116</link>
      <description>&lt;P&gt;Hi Marius,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the Output of Run, I have removed any unnecessary configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Interface Server_DMZ 10.10.10.1&lt;/P&gt;&lt;P&gt;Interface Inside 84.1.1.1&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;description Inside&lt;BR /&gt;nameif Inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 84.1.1.212 255.0.0.0 standby 86.1.1.213&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;description Server_DMZ&lt;BR /&gt;nameif Server_DMZ&lt;BR /&gt;security-level 99&lt;BR /&gt;ip address 10.10.10.212 255.255.252.0 standby 10.10.10.213&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;object network Netmon.84.1.1.1&lt;BR /&gt;host 84.1.1.1&lt;BR /&gt;description Server&lt;BR /&gt;!&lt;BR /&gt;object network -SWPE.10.10.10.1&lt;BR /&gt;host 10.10.10.1&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;network-object object Netmon.84.1.1.1&lt;BR /&gt;!&lt;BR /&gt;network-object object Netmon.84.1.1.1&lt;BR /&gt;!&lt;BR /&gt;object-group network SERVERS&lt;BR /&gt;network-object object -SWPE.10.10.10.1&lt;BR /&gt;!&lt;BR /&gt;object-group network DM_INLINE_NETWORK_17&lt;BR /&gt;network-object object -SWPE.10.10.10.1&lt;BR /&gt;!&lt;BR /&gt;object-group network DM_INLINE_NETWORK_18&lt;BR /&gt;network-object object -SWPE.10.10.10.1&lt;BR /&gt;!&lt;BR /&gt;object-group network DM_INLINE_NETWORK_20&lt;BR /&gt;network-object object -SWPE.10.10.10.1&lt;BR /&gt;!&lt;BR /&gt;access-list Inside_access_in extended permit ip object Netmon.84.1.1.1 object-group DM_INLINE_NETWORK_17&lt;BR /&gt;!&lt;BR /&gt;access-list Inside_access_in extended permit ip object -SWPE.10.10.10.1 object Netmon.84.1.1.1&lt;BR /&gt;!&lt;BR /&gt;access-list Server_DMZ_access_in extended permit object 17777 object -SWPE.10.10.10.1 object-group DM_INLINE_NETWORK_1&lt;BR /&gt;!&lt;BR /&gt;access-list Server_DMZ_access_in extended permit object-group ICMP_ALL any any&lt;BR /&gt;access-list Server_DMZ_access_in extended permit object 17777 object Netmon.84.1.1.1 object -SWPE.10.10.10.1&lt;BR /&gt;!&lt;BR /&gt;nat (Inside,Server_DMZ) source static Netmon.84.1.1.1 Netmon.nat.10.20.20.1 destination static -SWPE.10.10.10.1 -SWPE.10.10.10.1&lt;BR /&gt;!&lt;BR /&gt;nat (Inside,Server_DMZ) source static Netmon.84.1.1.1 Netmon.nat.10.20.20.1 destination static DM_INLINE_NETWORK_18 DM_INLINE_NETWORK_18 no-proxy-arp inactive&lt;BR /&gt;!&lt;BR /&gt;nat (Server_DMZ,Inside) source static -SWPE.10.10.10.1 -SWPE.10.10.10.1 destination static Netmon.84.1.1.1 Netmon.84.1.1.1 no-proxy-arp&lt;BR /&gt;!&lt;BR /&gt;access-group Inside_access_in in interface Inside&lt;BR /&gt;!&lt;BR /&gt;access-group Server_DMZ_access_in in interface Server_DMZ&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;route Server_DMZ 10.10.10.1 255.255.255.255 10.215.24.1 1&lt;BR /&gt;!&lt;BR /&gt;http 84.1.1.1 255.255.255.255 Inside&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;telnet 84.1.1.1 255.255.255.255 Inside&lt;BR /&gt;!&lt;BR /&gt;ssh 84.1.1.1 255.255.255.255 Inside&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your help,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;E&lt;/P&gt;</description>
      <pubDate>Thu, 30 Sep 2021 13:51:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-blocking/m-p/4477737#M1084116</guid>
      <dc:creator>EngineeringAir</dc:creator>
      <dc:date>2021-09-30T13:51:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ACL Blocking</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-blocking/m-p/4477877#M1084128</link>
      <description>&lt;P&gt;Are&lt;/P&gt;
&lt;P&gt;Interface Inside 10.10.10.1&lt;/P&gt;
&lt;P&gt;Interface Server_DMZ 84.1.1.1&lt;/P&gt;
&lt;P&gt;the interface IPs? Because you are actually supposed to put the src and dst IPs as packet tracer will then show "through" the box trace output.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One more thing I would check would be routing as packet ingressed from inside is going towards inside, which should not be the case as per your requirement.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Sep 2021 18:00:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-blocking/m-p/4477877#M1084128</guid>
      <dc:creator>Chakshu Piplani</dc:creator>
      <dc:date>2021-09-30T18:00:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ACL Blocking</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-blocking/m-p/4477941#M1084134</link>
      <description>&lt;P&gt;Hi Chakshu,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Those are not the interfaces, they are just the two endpoints.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a specific route you would like me to look at?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Static Routes we have should route between the two networks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;E&lt;/P&gt;</description>
      <pubDate>Thu, 30 Sep 2021 19:31:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-blocking/m-p/4477941#M1084134</guid>
      <dc:creator>EngineeringAir</dc:creator>
      <dc:date>2021-09-30T19:31:00Z</dc:date>
    </item>
  </channel>
</rss>

