<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Allow outside host web access to inside host - Fails in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allow-outside-host-web-access-to-inside-host-fails/m-p/4582273#M1088801</link>
    <description>&lt;P&gt;&lt;STRONG&gt;ciscoasa(config)# packet-tracer input outside tcp 68.78.249.19 1234 x.x.x.x 80&amp;nbsp;&lt;FONT color="#FF0000"&gt;detail&lt;/FONT&gt;&amp;nbsp;&amp;lt;- this give you&amp;nbsp;which ACL drop the traffic&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 30 Mar 2022 22:07:34 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2022-03-30T22:07:34Z</dc:date>
    <item>
      <title>Allow outside host web access to inside host - Fails</title>
      <link>https://community.cisco.com/t5/network-security/allow-outside-host-web-access-to-inside-host-fails/m-p/4582187#M1088791</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am trying to allow web access to an inside host but for some reason it is getting blocked. Packet-tracer hits the implicit rule (deny all) and drops the call. It seems the ACL rule is not being used. Not sure what I may be missing.&lt;/P&gt;&lt;P&gt;This is what I did:&lt;/P&gt;&lt;P&gt;object network obj_192.168.1.223&lt;BR /&gt;host 192.168.1.223&lt;BR /&gt;nat (inside,outside) static interface service tcp http http&lt;BR /&gt;access-list inbound permit tcp any object obj_192.168.1.223 eq http&lt;/P&gt;&lt;P&gt;Thanks for the help!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Troubleshooting info:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;ciscoasa(config)# packet-tracer input inside tcp 68.78.249.19 1234 192.168.1.223 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 192.168.1.223 using egress ifc inside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;ciscoasa(config)#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;ciscoasa(config)# sh access-list&lt;/STRONG&gt;&lt;BR /&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096)&lt;BR /&gt;alert-interval 300&lt;BR /&gt;access-list inbound; 1 elements; name hash: 0x793e9c88&lt;BR /&gt;access-list inbound line 1 extended permit tcp any object obj_192.168.1.223 eq www (hitcnt=0) 0x0d33139f&lt;BR /&gt;access-list inbound line 1 extended permit tcp any host 192.168.1.223 eq www (hitcnt=0) 0x0d33139f&lt;BR /&gt;&lt;STRONG&gt;ciscoasa(config)# sh nat&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (inside) to (outside) source static obj_192.168.1.223 interface service tcp www www&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;2 (inside) to (outside) source dynamic obj_192.168.1.0 interface dns&lt;BR /&gt;translate_hits = 1422, untranslate_hits = 21&lt;/P&gt;&lt;P&gt;Manual NAT Policies (Section 3)&lt;BR /&gt;1 (management) to (outside) source dynamic any interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;ciscoasa(config)#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 19:00:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-outside-host-web-access-to-inside-host-fails/m-p/4582187#M1088791</guid>
      <dc:creator>rmunoz10</dc:creator>
      <dc:date>2022-03-30T19:00:26Z</dc:date>
    </item>
    <item>
      <title>Re: Allow outside host web access to inside host - Fails</title>
      <link>https://community.cisco.com/t5/network-security/allow-outside-host-web-access-to-inside-host-fails/m-p/4582203#M1088793</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1327188"&gt;@rmunoz10&lt;/a&gt;&amp;nbsp;your packet-tracer is incorrect, you are simulating traffic from outside to inside. So you need to specify the interface as "outside" not inside. Also use the public ip address as the destination not the real/private ip.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 19:46:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-outside-host-web-access-to-inside-host-fails/m-p/4582203#M1088793</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-03-30T19:46:29Z</dc:date>
    </item>
    <item>
      <title>Re: Allow outside host web access to inside host - Fails</title>
      <link>https://community.cisco.com/t5/network-security/allow-outside-host-web-access-to-inside-host-fails/m-p/4582232#M1088795</link>
      <description>&lt;P&gt;This object NAT so check&amp;nbsp;&lt;/P&gt;&lt;P&gt;show NAT all,&lt;/P&gt;&lt;P&gt;see if there is any NAT above it prevent the nat from outside to your inside host server.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 20:37:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-outside-host-web-access-to-inside-host-fails/m-p/4582232#M1088795</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-03-30T20:37:26Z</dc:date>
    </item>
    <item>
      <title>Re: Allow outside host web access to inside host - Fails</title>
      <link>https://community.cisco.com/t5/network-security/allow-outside-host-web-access-to-inside-host-fails/m-p/4582258#M1088800</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;Thanks! packet-tracer went much further this time but still blocked access. Please see results below. Anything else I'm missing? Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ciscoasa(config)# packet-tracer input outside tcp 68.78.249.19 1234 x.x.x.x 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network obj_192.168.1.223&lt;BR /&gt;nat (inside,outside) static interface service tcp www www&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate x.x.x.x/80 to 192.168.1.223/80&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;- I don't have sh NAT all. But here is the result of sh nat.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ciscoasa(config)# sh nat&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (inside) to (outside) source static obj_192.168.1.223 interface service tcp www www&lt;BR /&gt;translate_hits = 0, untranslate_hits = 36&lt;BR /&gt;2 (inside) to (outside) source dynamic obj_192.168.1.0 interface dns&lt;BR /&gt;translate_hits = 8132, untranslate_hits = 126&lt;/P&gt;&lt;P&gt;Manual NAT Policies (Section 3)&lt;BR /&gt;1 (management) to (outside) source dynamic any interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;ciscoasa(config)#&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 21:34:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-outside-host-web-access-to-inside-host-fails/m-p/4582258#M1088800</guid>
      <dc:creator>rmunoz10</dc:creator>
      <dc:date>2022-03-30T21:34:35Z</dc:date>
    </item>
    <item>
      <title>Re: Allow outside host web access to inside host - Fails</title>
      <link>https://community.cisco.com/t5/network-security/allow-outside-host-web-access-to-inside-host-fails/m-p/4582273#M1088801</link>
      <description>&lt;P&gt;&lt;STRONG&gt;ciscoasa(config)# packet-tracer input outside tcp 68.78.249.19 1234 x.x.x.x 80&amp;nbsp;&lt;FONT color="#FF0000"&gt;detail&lt;/FONT&gt;&amp;nbsp;&amp;lt;- this give you&amp;nbsp;which ACL drop the traffic&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 22:07:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-outside-host-web-access-to-inside-host-fails/m-p/4582273#M1088801</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-03-30T22:07:34Z</dc:date>
    </item>
    <item>
      <title>Re: Allow outside host web access to inside host - Fails</title>
      <link>https://community.cisco.com/t5/network-security/allow-outside-host-web-access-to-inside-host-fails/m-p/4582307#M1088803</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The rule is 'Implicit Rule'. So it seems my ACL is not being used?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# sh run access-list&lt;BR /&gt;access-list inbound extended permit tcp any object obj_192.168.1.223 eq www&lt;BR /&gt;ciscoasa(config)#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;&lt;FONT color="#FF6600"&gt;Implicit Rule&lt;/FONT&gt;&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f2d1d404330, priority=0, domain=permit, deny=true&lt;BR /&gt;hits=4381, user_data=0xa, cs_id=0x0, use_real_addr, flags=0x1000, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 22:55:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-outside-host-web-access-to-inside-host-fails/m-p/4582307#M1088803</guid>
      <dc:creator>rmunoz10</dc:creator>
      <dc:date>2022-03-30T22:55:39Z</dc:date>
    </item>
    <item>
      <title>Re: Allow outside host web access to inside host - Fails</title>
      <link>https://community.cisco.com/t5/network-security/allow-outside-host-web-access-to-inside-host-fails/m-p/4582315#M1088804</link>
      <description>&lt;P&gt;add to NAT route-lookup.&amp;nbsp;&lt;BR /&gt;the NAT may route the traffic to wrong Interface&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 23:38:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-outside-host-web-access-to-inside-host-fails/m-p/4582315#M1088804</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-03-30T23:38:02Z</dc:date>
    </item>
    <item>
      <title>Re: Allow outside host web access to inside host - Fails</title>
      <link>https://community.cisco.com/t5/network-security/allow-outside-host-web-access-to-inside-host-fails/m-p/4582796#M1088811</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1327188"&gt;@rmunoz10&lt;/a&gt; do you actually have that access-list configured inbound on the outside interface? Example:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;access-group inbound in interface outside&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2022 06:59:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-outside-host-web-access-to-inside-host-fails/m-p/4582796#M1088811</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-03-31T06:59:49Z</dc:date>
    </item>
    <item>
      <title>Re: Allow outside host web access to inside host - Fails</title>
      <link>https://community.cisco.com/t5/network-security/allow-outside-host-web-access-to-inside-host-fails/m-p/4583025#M1088822</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;I had missed that.&lt;/P&gt;&lt;PRE&gt;access-group inbound in interface outside&lt;/PRE&gt;&lt;P&gt;Thank you for pointing me in the right direction.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2022 12:46:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-outside-host-web-access-to-inside-host-fails/m-p/4583025#M1088822</guid>
      <dc:creator>rmunoz10</dc:creator>
      <dc:date>2022-03-31T12:46:54Z</dc:date>
    </item>
  </channel>
</rss>

