<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Inbound TCP connection denied - ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-asa/m-p/4540264#M1086811</link>
    <description>&lt;P&gt;Will do. Setting it up now.&lt;/P&gt;</description>
    <pubDate>Thu, 27 Jan 2022 12:53:24 GMT</pubDate>
    <dc:creator>edhunterr</dc:creator>
    <dc:date>2022-01-27T12:53:24Z</dc:date>
    <item>
      <title>Inbound TCP connection denied - ASA</title>
      <link>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-asa/m-p/4540101#M1086800</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm getting these messages on my ASA and I am trying to understand why.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;%ASA-2-106001: Inbound TCP connection denied from x.x.x.75/443 to 172.24.2.35/64941 flags SYN ACK on interface internet&lt;BR /&gt;%ASA-2-106001: Inbound TCP connection denied from x.x.x.75/443 to 172.24.2.35/64953 flags SYN ACK on interface internet&lt;BR /&gt;&amp;nbsp;%ASA-2-106001: Inbound TCP connection denied from x.x.x.75/443 to 172.24.1.41/23887 flags ACK on interface internet&lt;BR /&gt;&amp;nbsp;%ASA-2-106001: Inbound TCP connection denied from x.x.x.75/443 to 172.24.1.41/23887 flags ACK on interface internet&lt;BR /&gt;&amp;nbsp;%ASA-2-106001: Inbound TCP connection denied from x.x.x.75/443 to 172.24.1.41/23887 flags FIN ACK on interface internet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Heres an overview of the network plus some more info that might help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The user has a webrtc client for voice running, the public IP (x.x.x.75) is the Voice service provider's server/PBX. Access to the platform is fine, voice is also ok and port 443 is tested and it is open.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ASA INBOUND TCP DENY.jpg" style="width: 706px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/142352i3D9E5F9B6F7FBCC3/image-dimensions/706x492?v=v2" width="706" height="492" role="button" title="ASA INBOUND TCP DENY.jpg" alt="ASA INBOUND TCP DENY.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;(disregard the /30 in the image)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also did a capture and i get this (y.y.y.y is my public IP. I guess logging shows the internal nated IP but capture shows the actual public)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;x.x.x.x.75.443 &amp;gt; y.y.y.y.64492: S 2894374938:2894374938(0) ack 2890855200 win 64240 &amp;lt;mss 1460,nop,nop,sackOK,nop,wscale 7&amp;gt; Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;These are my acls&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network VV&lt;BR /&gt;subnet x.x.x.64 255.255.255.224&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object-group service SERVICE&lt;BR /&gt;service-object icmp&lt;BR /&gt;service-object tcp destination eq https&lt;BR /&gt;service-object udp&lt;BR /&gt;service-object tcp source eq https&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list GRE extended permit gre host 172.24.0.234 host Z.Z.Z.Z&lt;BR /&gt;access-list GRE extended permit gre host 172.24.0.234 host Z.Z.Z.Z&lt;BR /&gt;access-list INET_IN extended permit object-group SERVICE object VV interface internet&lt;BR /&gt;access-list INET_IN extended permit object-group SERVICE interface internet object VV&lt;BR /&gt;access-list INET_IN extended permit tcp object VV interface internet&lt;BR /&gt;access-list INET_IN extended permit tcp interface internet object VV&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I still do not understand why I get denies on inbound traffic. The webrtc client initiates the connection with dest port 443, i do not understand the inbound displayed in the log messages though.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any advice?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jan 2022 09:08:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-asa/m-p/4540101#M1086800</guid>
      <dc:creator>edhunterr</dc:creator>
      <dc:date>2022-01-27T09:08:17Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound TCP connection denied - ASA</title>
      <link>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-asa/m-p/4540157#M1086802</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1285757"&gt;@edhunterr&lt;/a&gt; please run packet-tracer from the CLI and provide the output. E.g.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;packet-tracer input &amp;lt;inside-interface-name&amp;gt; tcp 172.24.1.41 3000 x.x.x.75 443&lt;/PRE&gt;
&lt;P&gt;What is the 2951 gateway router doing?&lt;/P&gt;
&lt;P&gt;What nat configuration on the ASA do you have for the object "VV"? Any relevance to the traffic flow?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jan 2022 10:16:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-asa/m-p/4540157#M1086802</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-01-27T10:16:01Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound TCP connection denied - ASA</title>
      <link>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-asa/m-p/4540236#M1086807</link>
      <description>&lt;P&gt;ASA2# packet-tracer input transit0 tcp 172.24.1.41 3000 x.x.x.75 443&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 0.0.0.0 0.0.0.0 internet&lt;BR /&gt;&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (transit0,internet) after-auto source dynamic SUBNET_1_INTRANET interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 172.24.1.41/3000 to y.y.y.y/3000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (transit0,internet) after-auto source dynamic SUBNET_1_INTRANET interface&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 65909180, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: transit0&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: internet&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The gateway is doing failover with sla and track for ISP, default routes to 2 ASAs (including this one) and then some other sla with track for failover of voice traffic. It is also in an OSPF area for the internal networks.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I dont have NATing for the specific public subnet but why would i need it since its my user that is initiating the traffic?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Btw, VV is the public subnet for this service. The one i get the Inbound TCP denies (x.x.x.75).&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jan 2022 12:40:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-asa/m-p/4540236#M1086807</guid>
      <dc:creator>edhunterr</dc:creator>
      <dc:date>2022-01-27T12:40:09Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound TCP connection denied - ASA</title>
      <link>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-asa/m-p/4540248#M1086808</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1285757"&gt;@edhunterr&lt;/a&gt; run a packet capture on the inside interface of the ASA and capture the initial packet from the client 172.24.1.41 to the server .75. post the output.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is the SLA/tracking/routing working as expected?&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jan 2022 12:44:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-asa/m-p/4540248#M1086808</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-01-27T12:44:41Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound TCP connection denied - ASA</title>
      <link>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-asa/m-p/4540249#M1086809</link>
      <description>&lt;P&gt;How do i undo Accept as Solution, i clicked on it by mistake &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think it does. I can only see traffic on this ASA for the specific subnets and thats exactly what i wanted.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jan 2022 12:46:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-asa/m-p/4540249#M1086809</guid>
      <dc:creator>edhunterr</dc:creator>
      <dc:date>2022-01-27T12:46:17Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound TCP connection denied - ASA</title>
      <link>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-asa/m-p/4540261#M1086810</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1285757"&gt;@edhunterr&lt;/a&gt; no idea, not sure it is possible.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The ASA might have the correct routes, I was referring to the gateway router, as that is the device that is routing to the different ISPs from the client's perspective, right?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As the packet-tracer output confirmed, the traffic from inside to outside should work...but it is only simulating the traffic. Please provide the packet capture output.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jan 2022 12:52:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-asa/m-p/4540261#M1086810</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-01-27T12:52:02Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound TCP connection denied - ASA</title>
      <link>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-asa/m-p/4540264#M1086811</link>
      <description>&lt;P&gt;Will do. Setting it up now.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jan 2022 12:53:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-asa/m-p/4540264#M1086811</guid>
      <dc:creator>edhunterr</dc:creator>
      <dc:date>2022-01-27T12:53:24Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound TCP connection denied - ASA</title>
      <link>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-asa/m-p/4540267#M1086812</link>
      <description>&lt;P&gt;ASA2# show capture capin&lt;/P&gt;&lt;P&gt;79 packets captured&lt;/P&gt;&lt;P&gt;1: 10:49:12.964076 172.24.1.41.1062 &amp;gt; x.x.x.75.443: . 879109727:879111107(1380) ack 3825543599 win 1024&lt;BR /&gt;2: 10:49:12.964107 172.24.1.41.1062 &amp;gt; x.x.x.75.443: P 879111107:879111411(304) ack 3825543599 win 1024&lt;BR /&gt;3: 10:49:13.043378 x.x.x.75.443 &amp;gt; 172.24.1.41.1062: . ack 879111411 win 501&lt;BR /&gt;4: 10:49:13.208393 x.x.x.75.443 &amp;gt; 172.24.1.41.1062: P 3825543599:3825544518(919) ack 879111411 win 501&lt;BR /&gt;5: 10:49:13.215366 172.24.1.41.1062 &amp;gt; x.x.x.75.443: P 879111411:879112745(1334) ack 3825544518 win 1020&lt;BR /&gt;6: 10:49:13.301559 x.x.x.75.443 &amp;gt; 172.24.1.41.1062: P 3825544518:3825545369(851) ack 879112745 win 501&lt;BR /&gt;7: 10:49:13.307418 172.24.1.41.1062 &amp;gt; x.x.x.75.443: . 879112745:879114125(1380) ack 3825545369 win 1024&lt;BR /&gt;8: 10:49:13.307448 172.24.1.41.1062 &amp;gt; x.x.x.75.443: P 879114125:879114139(14) ack 3825545369 win 1024&lt;BR /&gt;9: 10:49:13.383113 x.x.x.75.443 &amp;gt; 172.24.1.41.1062: . ack 879114139 win 501&lt;BR /&gt;10: 10:49:13.398783 x.x.x.75.443 &amp;gt; 172.24.1.41.1062: . 3825545369:3825546749(1380) ack 879114139 win 501&lt;BR /&gt;11: 10:49:13.399011 x.x.x.75.443 &amp;gt; 172.24.1.41.1062: . 3825546749:3825548129(1380) ack 879114139 win 501&lt;BR /&gt;12: 10:49:13.399027 x.x.x.75.443 &amp;gt; 172.24.1.41.1062: P 3825548129:3825548516(387) ack 879114139 win 501&lt;BR /&gt;13: 10:49:13.400202 172.24.1.41.1062 &amp;gt; x.x.x.75.443: . ack 3825548516 win 1024&lt;BR /&gt;14: 10:49:13.539232 172.24.1.41.1101 &amp;gt; x.x.x.75.443: S 3853373032:3853373032(0) win 64240 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;15: 10:49:13.546831 172.24.1.41.1062 &amp;gt; x.x.x.75.443: P 879114139:879115391(1252) ack 3825548516 win 1024&lt;BR /&gt;16: 10:49:13.606719 172.24.1.41.1071 &amp;gt; x.x.x.75.443: P 766786198:766787538(1340) ack 30693156 win 1024&lt;BR /&gt;17: 10:49:13.611464 x.x.x.75.443 &amp;gt; 172.24.1.41.1101: S 2174757093:2174757093(0) ack 3853373033 win 64240 &amp;lt;mss 1380,nop,nop,sackOK,nop,wscale 7&amp;gt;&lt;BR /&gt;18: 10:49:13.616682 172.24.1.41.1101 &amp;gt; x.x.x.75.443: . ack 2174757094 win 1024&lt;BR /&gt;19: 10:49:13.632734 x.x.x.75.443 &amp;gt; 172.24.1.41.1062: P 3825548516:3825549349(833) ack 879115391 win 501&lt;BR /&gt;20: 10:49:13.653011 172.24.1.41.1101 &amp;gt; x.x.x.75.443: P 3853373033:3853373550(517) ack 2174757094 win 1024&lt;BR /&gt;21: 10:49:13.686716 x.x.x.75.443 &amp;gt; 172.24.1.41.1071: . 30693156:30694536(1380) ack 766787538 win 501&lt;BR /&gt;22: 10:49:13.687876 x.x.x.75.443 &amp;gt; 172.24.1.41.1071: P 30694536:30694661(125) ack 766787538 win 501&lt;BR /&gt;23: 10:49:13.691462 172.24.1.41.1071 &amp;gt; x.x.x.75.443: . ack 30694661 win 1024&lt;BR /&gt;24: 10:49:13.693643 172.24.1.41.1062 &amp;gt; x.x.x.75.443: . ack 3825549349 win 1020&lt;BR /&gt;25: 10:49:13.715386 172.24.1.41.1071 &amp;gt; x.x.x.75.443: P 766787538:766788794(1256) ack 30694661 win 1024&lt;BR /&gt;26: 10:49:13.715966 172.24.1.41.1062 &amp;gt; x.x.x.75.443: P 879115391:879116649(1258) ack 3825549349 win 1020&lt;BR /&gt;27: 10:49:13.716424 172.24.1.41.1070 &amp;gt; x.x.x.75.443: P 3173514276:3173515534(1258) ack 2860233050 win 1024&lt;BR /&gt;28: 10:49:13.717721 172.24.1.41.1061 &amp;gt; x.x.x.75.443: P 431239375:431240636(1261) ack 1539786872 win 1024&lt;BR /&gt;29: 10:49:13.720086 172.24.1.41.1069 &amp;gt; x.x.x.75.443: P 2852113681:2852114945(1264) ack 3183726635 win 1024&lt;BR /&gt;30: 10:49:13.721611 172.24.1.41.1068 &amp;gt; x.x.x.75.443: P 2783458801:2783460061(1260) ack 3335005028 win 1019&lt;BR /&gt;31: 10:49:13.723198 x.x.x.75.443 &amp;gt; 172.24.1.41.1101: . ack 3853373550 win 501&lt;BR /&gt;32: 10:49:13.724388 x.x.x.75.443 &amp;gt; 172.24.1.41.1101: . 2174757094:2174758474(1380) ack 3853373550 win 501&lt;BR /&gt;33: 10:49:13.724449 x.x.x.75.443 &amp;gt; 172.24.1.41.1101: . 2174758474:2174759854(1380) ack 3853373550 win 501&lt;BR /&gt;34: 10:49:13.724648 x.x.x.75.443 &amp;gt; 172.24.1.41.1101: P 2174759854:2174760992(1138) ack 3853373550 win 501&lt;BR /&gt;35: 10:49:13.725868 172.24.1.41.1101 &amp;gt; x.x.x.75.443: . ack 2174760992 win 1024&lt;BR /&gt;36: 10:49:13.728752 172.24.1.41.1101 &amp;gt; x.x.x.75.443: P 3853373550:3853373676(126) ack 2174760992 win 1024&lt;BR /&gt;37: 10:49:13.794773 x.x.x.75.443 &amp;gt; 172.24.1.41.1071: P 30694661:30695493(832) ack 766788794 win 501&lt;BR /&gt;38: 10:49:13.798329 x.x.x.75.443 &amp;gt; 172.24.1.41.1101: P 2174760992:2174761250(258) ack 3853373676 win 501&lt;BR /&gt;39: 10:49:13.799259 172.24.1.41.1071 &amp;gt; x.x.x.75.443: P 766788794:766790051(1257) ack 30695493 win 1020&lt;BR /&gt;40: 10:49:13.803547 x.x.x.75.443 &amp;gt; 172.24.1.41.1069: P 3183726635:3183727416(781) ack 2852114945 win 501&lt;BR /&gt;41: 10:49:13.806904 x.x.x.75.443 &amp;gt; 172.24.1.41.1061: . 1539786872:1539788252(1380) ack 431240636 win 501&lt;BR /&gt;42: 10:49:13.807819 x.x.x.75.443 &amp;gt; 172.24.1.41.1061: P 1539788252:1539788929(677) ack 431240636 win 501&lt;BR /&gt;43: 10:49:13.807865 x.x.x.75.443 &amp;gt; 172.24.1.41.1062: P 3825549349:3825550164(815) ack 879116649 win 501&lt;BR /&gt;44: 10:49:13.808353 172.24.1.41.1061 &amp;gt; x.x.x.75.443: . ack 1539788929 win 1024&lt;BR /&gt;45: 10:49:13.809024 x.x.x.75.443 &amp;gt; 172.24.1.41.1070: . 2860233050:2860234430(1380) ack 3173515534 win 501&lt;BR /&gt;46: 10:49:13.809208 x.x.x.75.443 &amp;gt; 172.24.1.41.1070: P 2860234430:2860234769(339) ack 3173515534 win 501&lt;BR /&gt;47: 10:49:13.811084 172.24.1.41.1070 &amp;gt; x.x.x.75.443: . ack 2860234769 win 1024&lt;BR /&gt;48: 10:49:13.811283 172.24.1.41.1069 &amp;gt; x.x.x.75.443: P 2852114945:2852116207(1262) ack 3183727416 win 1021&lt;BR /&gt;49: 10:49:13.811420 172.24.1.41.1101 &amp;gt; x.x.x.75.443: P 3853373676:3853374840(1164) ack 2174761250 win 1023&lt;BR /&gt;50: 10:49:13.814746 x.x.x.75.443 &amp;gt; 172.24.1.41.1068: P 3335005028:3335005886(858) ack 2783460061 win 501&lt;BR /&gt;51: 10:49:13.833254 172.24.1.41.1068 &amp;gt; x.x.x.75.443: P 2783460061:2783461342(1281) ack 3335005886 win 1024&lt;BR /&gt;52: 10:49:13.849489 172.24.1.41.1062 &amp;gt; x.x.x.75.443: . ack 3825550164 win 1024&lt;BR /&gt;53: 10:49:13.882888 x.x.x.75.443 &amp;gt; 172.24.1.41.1101: P 2174761250:2174761548(298) ack 3853374840 win 501&lt;BR /&gt;54: 10:49:13.886276 x.x.x.75.443 &amp;gt; 172.24.1.41.1101: P 2174761548:2174761597(49) ack 3853374840 win 501&lt;BR /&gt;55: 10:49:13.887679 172.24.1.41.1101 &amp;gt; x.x.x.75.443: . ack 2174761597 win 1021&lt;BR /&gt;56: 10:49:13.890868 172.24.1.41.1101 &amp;gt; x.x.x.75.443: P 3853374840:3853374959(119) ack 2174761597 win 1021&lt;BR /&gt;57: 10:49:13.890899 172.24.1.41.1101 &amp;gt; x.x.x.75.443: P 3853374959:3853375222(263) ack 2174761597 win 1021&lt;BR /&gt;58: 10:49:13.893050 x.x.x.75.443 &amp;gt; 172.24.1.41.1069: P 3183727416:3183728089(673) ack 2852116207 win 501&lt;BR /&gt;59: 10:49:13.895125 172.24.1.41.1117 &amp;gt; x.x.x.75.443: S 1839183153:1839183153(0) win 64240 &amp;lt;mss 1460,nop,wscale 8,nop,nop,sackOK&amp;gt;&lt;BR /&gt;60: 10:49:13.912245 172.24.1.41.1069 &amp;gt; x.x.x.75.443: P 2852116207:2852117544(1337) ack 3183728089 win 1024&lt;BR /&gt;61: 10:49:13.912352 x.x.x.75.443 &amp;gt; 172.24.1.41.1071: . ack 766790051 win 501&lt;BR /&gt;62: 10:49:13.925000 172.24.1.41.1070 &amp;gt; x.x.x.75.443: P 3173515534:3173516797(1263) ack 2860234769 win 1024&lt;BR /&gt;63: 10:49:13.925946 x.x.x.75.443 &amp;gt; 172.24.1.41.1068: . 3335005886:3335007266(1380) ack 2783461342 win 501&lt;BR /&gt;64: 10:49:13.925962 x.x.x.75.443 &amp;gt; 172.24.1.41.1068: . 3335007266:3335008646(1380) ack 2783461342 win 501&lt;BR /&gt;65: 10:49:13.926023 x.x.x.75.443 &amp;gt; 172.24.1.41.1068: . 3335008646:3335010026(1380) ack 2783461342 win 501&lt;BR /&gt;66: 10:49:13.926099 172.24.1.41.1062 &amp;gt; x.x.x.75.443: P 879116649:879117908(1259) ack 3825550164 win 1024&lt;BR /&gt;67: 10:49:13.926221 x.x.x.75.443 &amp;gt; 172.24.1.41.1068: . 3335010026:3335011406(1380) ack 2783461342 win 501&lt;BR /&gt;68: 10:49:13.926389 x.x.x.75.443 &amp;gt; 172.24.1.41.1068: P 3335011406:3335012405(999) ack 2783461342 win 501&lt;BR /&gt;69: 10:49:13.926572 x.x.x.75.443 &amp;gt; 172.24.1.41.1071: . 30695493:30696873(1380) ack 766790051 win 501&lt;BR /&gt;70: 10:49:13.926618 x.x.x.75.443 &amp;gt; 172.24.1.41.1071: . 30696873:30698253(1380) ack 766790051 win 501&lt;BR /&gt;71: 10:49:13.926816 x.x.x.75.443 &amp;gt; 172.24.1.41.1071: . 30698253:30699633(1380) ack 766790051 win 501&lt;BR /&gt;72: 10:49:13.926862 x.x.x.75.443 &amp;gt; 172.24.1.41.1071: . 30699633:30701013(1380) ack 766790051 win 501&lt;BR /&gt;73: 10:49:13.926908 172.24.1.41.1061 &amp;gt; x.x.x.75.443: P 431240636:431241901(1265) ack 1539788929 win 1024&lt;BR /&gt;74: 10:49:13.927076 x.x.x.75.443 &amp;gt; 172.24.1.41.1071: . 30701013:30702393(1380) ack 766790051 win 501&lt;BR /&gt;75: 10:49:13.927167 x.x.x.75.443 &amp;gt; 172.24.1.41.1071: . 30702393:30703773(1380) ack 766790051 win 501&lt;BR /&gt;76: 10:49:13.927289 x.x.x.75.443 &amp;gt; 172.24.1.41.1071: . 30703773:30705153(1380) ack 766790051 win 501&lt;BR /&gt;77: 10:49:13.927396 x.x.x.75.443 &amp;gt; 172.24.1.41.1071: . 30705153:30706533(1380) ack 766790051 win 501&lt;BR /&gt;78: 10:49:13.927564 x.x.x.75.443 &amp;gt; 172.24.1.41.1071: . 30706533:30707913(1380) ack 766790051 win 501&lt;BR /&gt;79: 10:49:13.927686 x.x.x.75.443 &amp;gt; 172.24.1.41.1071: P 30707913:30708766(853) ack 766790051 win 501&lt;BR /&gt;79 packets shown&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I dont see a deny in the logs though. Maybe i havent caught it?&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jan 2022 12:59:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-asa/m-p/4540267#M1086812</guid>
      <dc:creator>edhunterr</dc:creator>
      <dc:date>2022-01-27T12:59:29Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound TCP connection denied - ASA</title>
      <link>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-asa/m-p/4540278#M1086814</link>
      <description>&lt;P&gt;305: 10:58:47.007613 172.24.1.41.1101 &amp;gt; x.x.x.75.443: . ack 2174836780 win 1020&lt;BR /&gt;306: 10:58:47.317442 x.x.x.75.443 &amp;gt; 172.24.1.41.1117: P 1272852096:1272852163(67) ack 1839192868 win 501&lt;BR /&gt;307: 10:58:47.367855 172.24.1.41.1117 &amp;gt; x.x.x.75.443: . ack 1272852163 win 1021&lt;BR /&gt;308: 10:58:47.593780 172.24.1.41.1117 &amp;gt; x.x.x.75.443: P 1839192868:1839193054(186) ack 1272852163 win 1021&lt;BR /&gt;309: 10:58:47.665645 x.x.x.75.443 &amp;gt; 172.24.1.41.1117: . ack 1839193054 win 501&lt;BR /&gt;310: 10:58:49.965007 x.x.x.75.443 &amp;gt; 172.24.1.41.1101: P 2174836780:2174836847(67) ack 3853380035 win 501&lt;BR /&gt;311: 10:58:50.009520 172.24.1.41.1101 &amp;gt; x.x.x.75.443: . ack 2174836847 win 1019&lt;BR /&gt;312: 10:58:50.318022 x.x.x.75.443 &amp;gt; 172.24.1.41.1117: P 1272852163:1272852230(67) ack 1839193054 win 501&lt;BR /&gt;313: 10:58:50.368099 172.24.1.41.1117 &amp;gt; x.x.x.75.443: . ack 1272852230 win 1021&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;%ASA-2-106001: Inbound TCP connection denied from x.x.x.75/443 to 172.24.0.66/17267 flags RST on interface internet&lt;BR /&gt;%ASA-2-106001: Inbound TCP connection denied from x.x.x.75/443 to 172.24.0.66/17267 flags RST on interface internet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Edit: Sorry this is a different IP, i only added capture for 1.41. I dont see any TCP DENY for that yet.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jan 2022 13:35:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-asa/m-p/4540278#M1086814</guid>
      <dc:creator>edhunterr</dc:creator>
      <dc:date>2022-01-27T13:35:42Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound TCP connection denied - ASA</title>
      <link>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-asa/m-p/4540302#M1086817</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1285757"&gt;@edhunterr&lt;/a&gt; so it looks like you have bi-directional communication, as you can see the return traffic from the server in the packet capture. This was capturing on the inside interface right?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Those debug syslog error relates to another connection 172.24.0.66 not the client you are capturing for. So are the syslog messages only intermittent?&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jan 2022 13:34:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-asa/m-p/4540302#M1086817</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-01-27T13:34:53Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound TCP connection denied - ASA</title>
      <link>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-asa/m-p/4540304#M1086818</link>
      <description>&lt;P&gt;Yes it was captured on transit0 which is the interface connected to my gateway. So if i do have bi-directional communication, what are the denies i get?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And yes, they are indeed intermittent.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jan 2022 13:43:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-tcp-connection-denied-asa/m-p/4540304#M1086818</guid>
      <dc:creator>edhunterr</dc:creator>
      <dc:date>2022-01-27T13:43:07Z</dc:date>
    </item>
  </channel>
</rss>

