<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: UDP 3343 not allowed across interfaces on ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/udp-3343-not-allowed-across-interfaces-on-asa/m-p/4737751#M1095897</link>
    <description>&lt;P&gt;in this case there is many point the packet can drop on it,&amp;nbsp;&lt;BR /&gt;but we want to mini our search,&amp;nbsp;&lt;BR /&gt;you can use capture in ASA to find if the packet is receive and send to server through ASA FW.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (76).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/170813i0C0EDA10A6E31728/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (76).png" alt="Screenshot (76).png" /&gt;&lt;/span&gt;&lt;BR /&gt;I run lab show you how you can use capture in ASA FW&amp;nbsp;&lt;BR /&gt;I have two interface IN and DMZ.&lt;BR /&gt;&lt;BR /&gt;please note that you must use NO capture ......... after finish because this capture take large CPU/memory resource.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 13 Dec 2022 10:33:22 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2022-12-13T10:33:22Z</dc:date>
    <item>
      <title>UDP 3343 not allowed across interfaces on ASA</title>
      <link>https://community.cisco.com/t5/network-security/udp-3343-not-allowed-across-interfaces-on-asa/m-p/4737295#M1095850</link>
      <description>&lt;P&gt;Hello Everyone,&lt;/P&gt;&lt;P&gt;We are trying to get a SQL cluster node to communicate on UDP 3343 from a host attached to our "DMZ" interface, to a host on our Inside interface. Packet tracer is saying the packet is dropped due to an ACL, but ive cleaned up our ACLs to allow IP any any. Could someone take a look? PT results and ASA config below.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Jesse&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Result of the command: "packet-tracer input inside udp 172.30.43.223 3344 192.168.10.225 3344"&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 192.168.254.57 using egress ifc inside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;: Serial Number: JAD23240PX7&lt;BR /&gt;: Hardware: ASA5508, 8192 MB RAM, CPU Atom C2000 series 2000 MHz, 1 CPU (8 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.8(2)&lt;BR /&gt;!&lt;BR /&gt;hostname Dover-ASA&lt;BR /&gt;domain-name companyglobal.com&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;description Windstream&lt;BR /&gt;nameif mpls&lt;BR /&gt;security-level 90&lt;BR /&gt;ip address 192.168.252.14 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;description Windstream_internet&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address x.x.x.x 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;description LINK SW01:G1/0/20&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.254.58 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;nameif company_Verizon&lt;BR /&gt;security-level 2&lt;BR /&gt;ip address x.x.x.75 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;description Interface for the Dover DMZ&lt;BR /&gt;nameif DMZ&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.30.43.21 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;domain-name companyglobal.com&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;object network CGI-DMZ&lt;BR /&gt;subnet 172.20.43.0 255.255.255.0&lt;BR /&gt;object network CGI-Network&lt;BR /&gt;subnet 192.168.0.0 255.255.0.0&lt;BR /&gt;object network Office-Dover&lt;BR /&gt;subnet 192.168.8.0 255.255.252.0&lt;BR /&gt;description as supernet&lt;BR /&gt;object network DCIS&lt;BR /&gt;host 167.21.84.227&lt;BR /&gt;object network Internal_RFC1918-10&lt;BR /&gt;subnet 10.0.0.0 255.0.0.0&lt;BR /&gt;object network Internal_RFC1918-172.16&lt;BR /&gt;subnet 172.16.0.0 255.24.0.0&lt;BR /&gt;object network Internal_RFC1918-192.168&lt;BR /&gt;subnet 192.168.0.0 255.255.0.0&lt;BR /&gt;object network Server_RDGWA-Dov&lt;BR /&gt;host 192.168.10.208&lt;BR /&gt;object network Server_RDGWA-Dov-Outside&lt;BR /&gt;host 173.221.200.203&lt;BR /&gt;object network DCIS-Test&lt;BR /&gt;host 167.21.128.83&lt;BR /&gt;object network UTIL-SAC&lt;BR /&gt;host 192.168.50.239&lt;BR /&gt;description Test File Transfer bypassing SFR&lt;BR /&gt;object network FILE01-DOV&lt;BR /&gt;host 192.168.10.240&lt;BR /&gt;description Test File Transfer bypassing SFR&lt;BR /&gt;object network HV01-DOV&lt;BR /&gt;host 192.168.10.91&lt;BR /&gt;object network HV01-NYC&lt;BR /&gt;host 192.168.4.213&lt;BR /&gt;object network GP2016-DOV&lt;BR /&gt;host 192.168.10.46&lt;BR /&gt;object network SQL-GP&lt;BR /&gt;host 192.168.4.68&lt;BR /&gt;object network GP2016TS-NYC&lt;BR /&gt;host 192.168.4.67&lt;BR /&gt;object network GPTS-NYC&lt;BR /&gt;host 192.168.4.206&lt;BR /&gt;object network GP-NYC&lt;BR /&gt;host 192.168.4.205&lt;BR /&gt;object network NAS06-COLO-NIC1&lt;BR /&gt;host 192.168.170.159&lt;BR /&gt;description NIC1&lt;BR /&gt;object network NAS06-COLO-NIC2&lt;BR /&gt;host 192.168.170.160&lt;BR /&gt;description NIC2&lt;BR /&gt;object network NAS02-DOV&lt;BR /&gt;host 192.168.10.201&lt;BR /&gt;object network Server_Dover-DMZ-Test&lt;BR /&gt;host 172.30.43.210&lt;BR /&gt;description DMZ Test RRAS&lt;BR /&gt;object network DMZ-Network&lt;BR /&gt;subnet 172.30.43.0 255.255.255.0&lt;BR /&gt;object service 445&lt;BR /&gt;service tcp source eq 445 destination eq 445&lt;BR /&gt;object network NETWORK_OBJ_192.168.190.0_24&lt;BR /&gt;subnet 192.168.190.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_192.168.10.0_24&lt;BR /&gt;subnet 192.168.10.0 255.255.255.0&lt;BR /&gt;object network Dover_Data_Subnet&lt;BR /&gt;subnet 192.168.10.0 255.255.255.0&lt;BR /&gt;object network New_CoLo_Subnet&lt;BR /&gt;subnet 192.168.190.0 255.255.255.0&lt;BR /&gt;object network Colo_Subnet&lt;BR /&gt;subnet 192.168.170.0 255.255.255.0&lt;BR /&gt;object network Dover_10_subnet&lt;BR /&gt;subnet 192.168.10.0 255.255.255.0&lt;BR /&gt;object network NYC_Subnet&lt;BR /&gt;subnet 192.168.4.0 255.255.255.0&lt;BR /&gt;object network Dover_Cluster_Subnet&lt;BR /&gt;subnet 10.0.12.0 255.255.255.0&lt;BR /&gt;object network CoLo_Cluster_Subnet&lt;BR /&gt;subnet 10.0.11.0 255.255.255.0&lt;BR /&gt;object network DMZ_TEST_CROSSCLUSTER_COM&lt;BR /&gt;host 172.30.43.220&lt;BR /&gt;object network DMZ_TEST_CROSSCLUSTER_COM2&lt;BR /&gt;host 172.30.43.223&lt;BR /&gt;object network DMZ_TEST_CROSSCLUSTER_COM3&lt;BR /&gt;host 172.30.43.224&lt;BR /&gt;object network DMZ_TEST_CROSSCLUSTER_COM4&lt;BR /&gt;host 172.30.43.228&lt;BR /&gt;object network TEST_HV_COM&lt;BR /&gt;host 192.168.10.225&lt;BR /&gt;object network TEST_HV_COM2&lt;BR /&gt;host 192.168.10.226&lt;BR /&gt;object network TEST_HV_COM3&lt;BR /&gt;host 192.168.10.227&lt;BR /&gt;object network TEST_HV_COM4&lt;BR /&gt;host 192.168.10.228&lt;BR /&gt;object-group network local-network&lt;BR /&gt;network-object object Office-Dover&lt;BR /&gt;network-object 192.168.254.56 255.255.255.248&lt;BR /&gt;object-group network remote-network&lt;BR /&gt;network-object object CGI-Network&lt;BR /&gt;network-object object CGI-DMZ&lt;BR /&gt;network-object object DCIS&lt;BR /&gt;object-group network Internal_RFC1918&lt;BR /&gt;network-object object Internal_RFC1918-10&lt;BR /&gt;network-object object Internal_RFC1918-172.16&lt;BR /&gt;network-object object Internal_RFC1918-192.168&lt;BR /&gt;object-group network NOG-RingCentral&lt;BR /&gt;description All RingCentral Networks a/o 20170919&lt;BR /&gt;network-object 103.44.68.0 255.255.252.0&lt;BR /&gt;network-object 66.81.240.0 255.255.240.0&lt;BR /&gt;network-object 80.81.128.0 255.255.240.0&lt;BR /&gt;network-object 104.245.56.0 255.255.248.0&lt;BR /&gt;network-object 185.23.248.0 255.255.252.0&lt;BR /&gt;network-object 192.209.24.0 255.255.248.0&lt;BR /&gt;network-object 199.255.120.0 255.255.252.0&lt;BR /&gt;network-object 199.68.212.0 255.255.252.0&lt;BR /&gt;network-object 208.87.40.0 255.255.252.0&lt;BR /&gt;object-group service SOG-RC-SIP&lt;BR /&gt;description RingCentral SIP service identifiers a/o 20170919&lt;BR /&gt;service-object tcp-udp source range sip 6000&lt;BR /&gt;service-object tcp-udp destination range sip 6000&lt;BR /&gt;object-group service SMTP-DNS&lt;BR /&gt;service-object tcp-udp destination eq domain&lt;BR /&gt;service-object tcp destination eq smtp&lt;BR /&gt;object-group service RDC&lt;BR /&gt;service-object tcp destination eq https&lt;BR /&gt;service-object udp destination eq 3391&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt;service-object tcp destination eq https&lt;BR /&gt;service-object udp destination eq 3391&lt;BR /&gt;object-group network DCIS-Hosts&lt;BR /&gt;network-object object DCIS&lt;BR /&gt;network-object object DCIS-Test&lt;BR /&gt;object-group icmp-type ICMP-allowed&lt;BR /&gt;icmp-object echo&lt;BR /&gt;icmp-object echo-reply&lt;BR /&gt;icmp-object source-quench&lt;BR /&gt;icmp-object time-exceeded&lt;BR /&gt;icmp-object unreachable&lt;BR /&gt;object-group service http-all tcp&lt;BR /&gt;port-object eq www&lt;BR /&gt;port-object eq https&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt;protocol-object udp&lt;BR /&gt;protocol-object tcp&lt;BR /&gt;object-group service RRAS_Services tcp&lt;BR /&gt;description The following ports need to be open from 172 network to 192 network&lt;BR /&gt;port-object eq 135&lt;BR /&gt;port-object eq 15000&lt;BR /&gt;port-object eq 3268&lt;BR /&gt;port-object eq 445&lt;BR /&gt;port-object eq 464&lt;BR /&gt;port-object range 49152 65535&lt;BR /&gt;port-object eq 88&lt;BR /&gt;port-object eq domain&lt;BR /&gt;port-object eq www&lt;BR /&gt;port-object eq https&lt;BR /&gt;port-object eq ldap&lt;BR /&gt;port-object eq ldaps&lt;BR /&gt;port-object eq netbios-ssn&lt;BR /&gt;port-object eq 3389&lt;BR /&gt;object-group service RRAS_Services_UDP udp&lt;BR /&gt;description The following ports need to be open from 172 network to 192 network&lt;BR /&gt;port-object eq 389&lt;BR /&gt;port-object eq 636&lt;BR /&gt;port-object eq domain&lt;BR /&gt;port-object eq netbios-dgm&lt;BR /&gt;port-object eq netbios-ns&lt;BR /&gt;port-object eq ntp&lt;BR /&gt;port-object eq 3389&lt;BR /&gt;object-group network VPN_Local&lt;BR /&gt;network-object 192.168.254.56 255.255.255.248&lt;BR /&gt;network-object object Dover_10_subnet&lt;BR /&gt;object-group network VPN_Remote&lt;BR /&gt;network-object object New_CoLo_Subnet&lt;BR /&gt;object-group network RFIC_minus_190&lt;BR /&gt;network-object object NYC_Subnet&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;network-object object CGI-Network&lt;BR /&gt;network-object object DMZ-Network&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt;network-object 172.30.43.0 255.255.255.0&lt;BR /&gt;network-object object CGI-Network&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt;port-object eq 10001&lt;BR /&gt;port-object eq 2500&lt;BR /&gt;object-group network DMZ_CROSS_CLUSTER_TEST_OBJECTS&lt;BR /&gt;network-object object DMZ_TEST_CROSSCLUSTER_COM&lt;BR /&gt;network-object object DMZ_TEST_CROSSCLUSTER_COM2&lt;BR /&gt;network-object object DMZ_TEST_CROSSCLUSTER_COM3&lt;BR /&gt;network-object object DMZ_TEST_CROSSCLUSTER_COM4&lt;BR /&gt;object-group network TEST_HV_COM_OBJECTS&lt;BR /&gt;network-object object TEST_HV_COM&lt;BR /&gt;network-object object TEST_HV_COM2&lt;BR /&gt;network-object object TEST_HV_COM3&lt;BR /&gt;network-object object TEST_HV_COM4&lt;BR /&gt;access-list outside_access_in extended deny udp any4 any4 eq netbios-ns&lt;BR /&gt;access-list outside_access_in extended deny udp any4 any4 eq netbios-dgm&lt;BR /&gt;access-list outside_access_in extended deny tcp any4 any4 eq netbios-ssn&lt;BR /&gt;access-list outside_access_in extended deny tcp any4 any4 eq 445&lt;BR /&gt;access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_1 any4 object Server_RDGWA-Dov&lt;BR /&gt;access-list outside_access_in extended permit icmp any any&lt;BR /&gt;access-list inside_access_in extended permit ip any any&lt;BR /&gt;access-list Comcast_Test_cryptomap extended permit ip object-group VPN_Local object-group VPN_Remote&lt;BR /&gt;access-list sfr_redirect extended deny ip object-group DMZ_CROSS_CLUSTER_TEST_OBJECTS object-group TEST_HV_COM_OBJECTS&lt;BR /&gt;access-list sfr_redirect extended deny ip object-group TEST_HV_COM_OBJECTS object-group DMZ_CROSS_CLUSTER_TEST_OBJECTS&lt;BR /&gt;access-list sfr_redirect extended deny ip object FILE01-DOV object GPTS-NYC&lt;BR /&gt;access-list sfr_redirect extended deny ip object FILE01-DOV object GP-NYC&lt;BR /&gt;access-list sfr_redirect extended deny ip object FILE01-DOV object UTIL-SAC&lt;BR /&gt;access-list sfr_redirect extended deny ip object UTIL-SAC object FILE01-DOV&lt;BR /&gt;access-list sfr_redirect extended deny ip object HV01-DOV object HV01-NYC&lt;BR /&gt;access-list sfr_redirect extended deny ip object HV01-NYC object HV01-DOV&lt;BR /&gt;access-list sfr_redirect extended deny ip object GP2016-DOV object SQL-GP&lt;BR /&gt;access-list sfr_redirect extended deny ip object SQL-GP object GP2016-DOV&lt;BR /&gt;access-list sfr_redirect extended deny ip object FILE01-DOV object GP2016TS-NYC&lt;BR /&gt;access-list sfr_redirect extended deny ip object GP2016TS-NYC object FILE01-DOV&lt;BR /&gt;access-list sfr_redirect extended deny ip object NAS06-COLO-NIC2 object NAS02-DOV&lt;BR /&gt;access-list sfr_redirect extended deny ip object NAS06-COLO-NIC1 object NAS02-DOV&lt;BR /&gt;access-list sfr_redirect extended deny ip object NAS02-DOV object NAS06-COLO-NIC1&lt;BR /&gt;access-list sfr_redirect extended deny ip object NAS02-DOV object NAS06-COLO-NIC2&lt;BR /&gt;access-list sfr_redirect extended permit ip any any&lt;BR /&gt;access-list netflow-export extended permit ip any any&lt;BR /&gt;access-list mpls_access_in extended permit ip any any&lt;BR /&gt;access-list ACL-RoutingProtocol extended permit udp any any eq rip&lt;BR /&gt;access-list ACL-RoutingProtocol extended permit udp any eq rip any&lt;BR /&gt;access-list ACL-RoutingProtocol extended permit eigrp any any&lt;BR /&gt;access-list ACL-RoutingProtocol extended permit ospf any any&lt;BR /&gt;access-list ACL-RoutingProtocol extended permit tcp any any eq bgp&lt;BR /&gt;access-list ACL-RoutingProtocol extended permit tcp any eq bgp any&lt;BR /&gt;access-list ACL-RTR-IB-RC-Voice-RTP extended permit udp object-group NOG-RingCentral range 9000 64999 any&lt;BR /&gt;access-list ACL-RTR-IB-RC-Video-RTP extended permit udp object-group NOG-RingCentral any range 8801 8802&lt;BR /&gt;access-list ACL-RTR-IB-RC-GeneralSIP extended permit object-group SOG-RC-SIP object-group NOG-RingCentral any&lt;BR /&gt;access-list ACL-RTR-IB-RC-Networks-All extended permit ip object-group NOG-RingCentral any&lt;BR /&gt;access-list ACL-RTR-IB-Cust-AF11 extended deny tcp any any&lt;BR /&gt;access-list ACL-RTR-IB-Cust-AF11 extended deny udp any any&lt;BR /&gt;access-list DMZ_access_in extended permit ip any any&lt;BR /&gt;access-list DMZ_access_in_1 extended permit ip any any&lt;BR /&gt;access-list DMZ_access_out extended permit ip any any&lt;BR /&gt;access-list Comcast_Test_access_in extended permit ip object New_CoLo_Subnet object Dover_Data_Subnet&lt;BR /&gt;access-list Comcast_Test_access_in extended permit ip any any inactive&lt;BR /&gt;access-list mpls_access_out extended permit ip any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging trap errors&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging facility 17&lt;BR /&gt;logging host mpls 192.168.170.250 17/49333&lt;BR /&gt;no logging message 106014&lt;BR /&gt;no logging message 106006&lt;BR /&gt;no logging message 106001&lt;BR /&gt;no logging message 313001&lt;BR /&gt;no logging message 710003&lt;BR /&gt;no logging message 106100&lt;BR /&gt;flow-export destination mpls 192.168.170.250 2055&lt;BR /&gt;mtu mpls 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu company_Verizon 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;no failover&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any mpls&lt;BR /&gt;icmp permit any echo-reply outside&lt;BR /&gt;icmp permit host 64.128.232.98 outside&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;icmp permit any company_Verizon&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;nat (inside,outside) source static Server_RDGWA-Dov Server_RDGWA-Dov-Outside&lt;BR /&gt;nat (DMZ,any) source static CGI-Network CGI-Network destination static DMZ-Network DMZ-Network no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,any) source static CGI-Network CGI-Network destination static DMZ-Network DMZ-Network no-proxy-arp route-lookup&lt;BR /&gt;nat (DMZ,any) source static CGI-DMZ CGI-DMZ destination static DMZ-Network DMZ-Network no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,any) source static CGI-DMZ CGI-DMZ destination static DMZ-Network DMZ-Network no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,mpls) source static Dover_Cluster_Subnet Dover_Cluster_Subnet destination static CoLo_Cluster_Subnet CoLo_Cluster_Subnet no-proxy-arp&lt;BR /&gt;!&lt;BR /&gt;nat (any,any) after-auto source static Internal_RFC1918 Internal_RFC1918 destination static Internal_RFC1918 Internal_RFC1918 no-proxy-arp&lt;BR /&gt;nat (any,any) after-auto source static Internal_RFC1918 Internal_RFC1918 destination static DCIS-Hosts DCIS-Hosts no-proxy-arp&lt;BR /&gt;nat (any,outside) after-auto source dynamic any interface&lt;BR /&gt;access-group mpls_access_in in interface mpls&lt;BR /&gt;access-group mpls_access_out out interface mpls&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group inside_access_in out interface inside&lt;BR /&gt;access-group Comcast_Test_access_in in interface company_Verizon&lt;BR /&gt;access-group DMZ_access_in_1 in interface DMZ&lt;BR /&gt;access-group DMZ_access_out out interface DMZ&lt;BR /&gt;router bgp 65101&lt;BR /&gt;bgp log-neighbor-changes&lt;BR /&gt;address-family ipv4 unicast&lt;BR /&gt;neighbor 192.168.252.13 remote-as 65201&lt;BR /&gt;neighbor 192.168.252.13 activate&lt;BR /&gt;network 192.168.8.0 mask 255.255.252.0&lt;BR /&gt;network 10.0.12.0 mask 255.255.255.0&lt;BR /&gt;network 172.30.43.0 mask 255.255.255.0&lt;BR /&gt;network 192.168.254.56 mask 255.255.255.248&lt;BR /&gt;no auto-summary&lt;BR /&gt;no synchronization&lt;BR /&gt;exit-address-family&lt;BR /&gt;!&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 173.221.200.201 1&lt;BR /&gt;route inside 10.0.12.0 255.255.255.0 192.168.254.57 1&lt;BR /&gt;route company_Verizon x.x.x.12 255.255.255.255 x.x.x.1 1&lt;BR /&gt;route inside 192.168.8.0 255.255.252.0 192.168.254.57 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication telnet console LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.170.250 255.255.255.255 mpls&lt;BR /&gt;http 64.128.232.98 255.255.255.255 outside&lt;BR /&gt;http 192.168.0.0 255.255.0.0 mpls&lt;BR /&gt;http 192.168.0.0 255.255.0.0 inside&lt;BR /&gt;snmp-server group No_Authentication_No_Encryption v3 noauth&lt;BR /&gt;snmp-server user SolarWrite No_Authentication_No_Encryption v3 engineID 80000009fed04a183bad2cc4f630321408c05e0c384b96d858&lt;BR /&gt;snmp-server host mpls 192.168.170.250 poll community ***** version 2c&lt;BR /&gt;snmp-server location Dover Server Room&lt;BR /&gt;snmp-server contact is@companyglobal.com&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto map Comcast_Test_map0 1 match address Comcast_Test_cryptomap&lt;BR /&gt;crypto map Comcast_Test_map0 1 set peer x.x.x.12&lt;BR /&gt;crypto map Comcast_Test_map0 1 set ikev1 transform-set ESP-3DES-MD5&lt;BR /&gt;crypto map Comcast_Test_map0 interface company_Verizon&lt;BR /&gt;crypto ca trustpoint ASDM_Launcher_Access_TrustPoint_0&lt;BR /&gt;enrollment self&lt;BR /&gt;fqdn none&lt;BR /&gt;subject-name CN=198.18.215.2,CN=Dover-ASA&lt;BR /&gt;keypair ASDM_LAUNCHER&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_Launcher_Access_TrustPoint_1&lt;BR /&gt;enrollment self&lt;BR /&gt;fqdn none&lt;BR /&gt;subject-name CN=x.x.x.x,CN=Dover-ASA&lt;BR /&gt;keypair ASDM_LAUNCHER&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca certificate chain ASDM_Launcher_Access_TrustPoint_0&lt;BR /&gt;certificate 82748f5d&lt;BR /&gt;308202d2 308201ba a0030201 02020482 748f5d30 0d06092a 864886f7 0d01010b&lt;BR /&gt;0500302b 31123010 06035504 03130944 6f766572 2d415341 31153013 06035504&lt;BR /&gt;03130c31 39382e31 382e3231 352e3230 1e170d32 30303531 31313535 3134365a&lt;BR /&gt;170d3330 30353039 31353531 34365a30 2b311230 10060355 04031309 446f7665&lt;BR /&gt;722d4153 41311530 13060355 0403130c 3139382e 31382e32 31352e32 30820122&lt;BR /&gt;300d0609 2a864886 f70d0101 01050003 82010f00 3082010a 02820101 0087a508&lt;BR /&gt;01f6fe80 0ed6fb07 006fbaa5 46921767 7d976153 a421c8f1 93a08f1b f920f556&lt;BR /&gt;dcf1eb21 68e39031 7fcd2fab 610089fc 3c4caf81 5593e334 42567c3e 07bf442f&lt;BR /&gt;053a1e89 bd45eaa1 c5fcf1c1 6834e22a 1773e5cb b6c757d5 c42e2d90 6f4cbfbf&lt;BR /&gt;86302351 eabc6887 6005a6b2 dab9114a ba85ef26 ef8b9653 1c4f100f 7f536af2&lt;BR /&gt;b48a2476 582d7223 68bf718b d68244a4 e2f8a306 a8683a94 a5dedb53 fb114c6d&lt;BR /&gt;603c6c84 c402a701 42323f09 c468f535 378e149b 4a793f8f 8106e1b8 eb9117f8&lt;BR /&gt;8c0d8919 98af9c6c 442653dc 0191de8d ac3b9da2 2dbde446 e2536a01 da14c56e&lt;BR /&gt;5fed6710 881f2a39 9e0da70a ba6dd7e6 1ded30bb 5d3c2477 3d98df48 c1020301&lt;BR /&gt;0001300d 06092a86 4886f70d 01010b05 00038201 01002c5b 4c523837 3bdcb675&lt;BR /&gt;f6f3336c a2829aa8 7f04f0b2 ec4f40a6 4700906e 2d918563 fd04da2e f5d464f6&lt;BR /&gt;95d6d23e 7f1caa01 97099222 cc56817a ab41637d badabca9 af29f9eb 109d7826&lt;BR /&gt;e5745b64 98c5bc7d dbc23337 deeca3bc 5c6c7fa6 6abec024 88000830 8337fc3f&lt;BR /&gt;ee1af1c3 dfd54779 63c47455 267956c9 bc956ec6 53433d43 6c035a89 bbd776e9&lt;BR /&gt;24630cc4 cf5aefb9 08078e27 78a5c25a 999cd4c8 fd143dbc 4b32db55 68a67c05&lt;BR /&gt;87c4109c 26a64dc0 6b11d0ef 61e60e7a 6dbe9488 b4c540ed 774491e3 199dfc17&lt;BR /&gt;63a467ac 28ab8c90 bc317049 0d487a9e b691c47c 857bd2cd d375a744 cd517422&lt;BR /&gt;9e8cbbb6 c6f7e1e6 2d2b29ca 4ae4780d 0c7de47b 6725&lt;BR /&gt;quit&lt;BR /&gt;crypto ca certificate chain ASDM_Launcher_Access_TrustPoint_1&lt;BR /&gt;certificate 83748f5d&lt;BR /&gt;308202d8 308201c0 a0030201 02020483 748f5d30 0d06092a 864886f7 0d01010b&lt;BR /&gt;0500302e 31123010 06035504 03130944 6f766572 2d415341 31183016 06035504&lt;BR /&gt;03130f31 37332e32 32312e32 30302e32 3032301e 170d3230 30373031 31353235&lt;BR /&gt;34315a17 0d333030 36323931 35323534 315a302e 31123010 06035504 03130944&lt;BR /&gt;6f766572 2d415341 31183016 06035504 03130f31 37332e32 32312e32 30302e32&lt;BR /&gt;30323082 0122300d 06092a86 4886f70d 01010105 00038201 0f003082 010a0282&lt;BR /&gt;01010087 a50801f6 fe800ed6 fb07006f baa54692 17677d97 6153a421 c8f193a0&lt;BR /&gt;8f1bf920 f556dcf1 eb2168e3 90317fcd 2fab6100 89fc3c4c af815593 e3344256&lt;BR /&gt;7c3e07bf 442f053a 1e89bd45 eaa1c5fc f1c16834 e22a1773 e5cbb6c7 57d5c42e&lt;BR /&gt;2d906f4c bfbf8630 2351eabc 68876005 a6b2dab9 114aba85 ef26ef8b 96531c4f&lt;BR /&gt;100f7f53 6af2b48a 2476582d 722368bf 718bd682 44a4e2f8 a306a868 3a94a5de&lt;BR /&gt;db53fb11 4c6d603c 6c84c402 a7014232 3f09c468 f535378e 149b4a79 3f8f8106&lt;BR /&gt;e1b8eb91 17f88c0d 891998af 9c6c4426 53dc0191 de8dac3b 9da22dbd e446e253&lt;BR /&gt;6a01da14 c56e5fed 6710881f 2a399e0d a70aba6d d7e61ded 30bb5d3c 24773d98&lt;BR /&gt;df48c102 03010001 300d0609 2a864886 f70d0101 0b050003 82010100 12ef9077&lt;BR /&gt;389b0af6 e7346e39 6617661a cfc5b0e4 1a45f9c5 43fda22c ba22ae52 a877f54e&lt;BR /&gt;2b8efafe e83df473 5253536c 0e65a780 883122e0 aa1fb57b 970b931d 97b60f81&lt;BR /&gt;7ae00ea4 3e09c3a0 5f18d2df 9f3da40b c5bd28ce d1edc94e d404d733 dacf225a&lt;BR /&gt;1166ba21 f214fd76 d84af808 981829c9 cb9f9904 4adca7c5 8150b1c1 84fa298b&lt;BR /&gt;98e54721 da672cc6 86a4ae8a 6021f5bb b0fd62ec 41f5091a 2d5c7465 e91a10db&lt;BR /&gt;87567b36 4daf85b8 61e4580e 1c925ce0 757fdfee 944a908a 232d75ce eef34a17&lt;BR /&gt;15578844 7c0136d8 a8c60abf e81894a8 a1db63fe cbbd752d 5f91df6c b1325774&lt;BR /&gt;93c07257 0bf07e06 c11ad7f6 c2b1a372 3b928975 b0262ff0 feedded9&lt;BR /&gt;quit&lt;BR /&gt;crypto ikev1 policy 1&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash md5&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 192.168.170.250 255.255.255.255 mpls&lt;BR /&gt;ssh 192.168.0.0 255.255.0.0 mpls&lt;BR /&gt;ssh 64.128.232.98 255.255.255.255 outside&lt;BR /&gt;ssh 100.4.218.110 255.255.255.255 outside&lt;BR /&gt;ssh 192.168.0.0 255.255.0.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 192.168.10.243 source inside&lt;BR /&gt;ssl trust-point ASDM_Launcher_Access_TrustPoint_0 mpls&lt;BR /&gt;ssl trust-point ASDM_Launcher_Access_TrustPoint_1 outside&lt;BR /&gt;ssl trust-point ASDM_Launcher_Access_TrustPoint_0 mpls vpnlb-ip&lt;BR /&gt;ssl trust-point ASDM_Launcher_Access_TrustPoint_1 outside vpnlb-ip&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-clientless&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username administrator password $sha512$5000$61ool92zVpkCnEMEZIfSZg==$d1Udyn8ZbNFASJ3cSnbQig== pbkdf2 privilege 15&lt;BR /&gt;username orionadmin password tT8uUhU82k.Z.s/N encrypted privilege 15&lt;BR /&gt;tunnel-group x.x.x.12 type ipsec-l2l&lt;BR /&gt;tunnel-group x.x.x.12 ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map CM-RTR-IB-RC-Other&lt;BR /&gt;description AllRingCentral Originated Traffic&lt;BR /&gt;match access-list ACL-RTR-IB-RC-Networks-All&lt;BR /&gt;class-map netflow-export-class&lt;BR /&gt;match access-list netflow-export&lt;BR /&gt;class-map global-class&lt;BR /&gt;match any&lt;BR /&gt;class-map CM-RTR-IB-RC-SIP&lt;BR /&gt;description RingCentral SIP Traffic&lt;BR /&gt;match access-list ACL-RTR-IB-RC-GeneralSIP&lt;BR /&gt;class-map CM-RTR-IB-Cust-AF12&lt;BR /&gt;description Customer AF13 class traffic&lt;BR /&gt;class-map sfr&lt;BR /&gt;match access-list sfr_redirect&lt;BR /&gt;class-map CM-RTR-IB-Cust-AF11&lt;BR /&gt;description Customer AF11 class traffic&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;class-map CM-RTR-IB-RC-Video-RT&lt;BR /&gt;description RingCentral Originated Traffic Video RTP&lt;BR /&gt;match access-list ACL-RTR-IB-RC-Video-RTP&lt;BR /&gt;class-map CM-RTR-IB-RC-Voice-RT&lt;BR /&gt;match access-list ACL-RTR-IB-RC-Voice-RTP&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect icmp&lt;BR /&gt;class sfr&lt;BR /&gt;sfr fail-open&lt;BR /&gt;class netflow-export-class&lt;BR /&gt;flow-export event-type all destination 192.168.170.250&lt;BR /&gt;policy-map PM-RTR-IB-Standard-QoS&lt;BR /&gt;class CM-RTR-IB-RC-Voice-RT&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_2&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;no active&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination address email callhome@cisco.com&lt;BR /&gt;destination transport-method http&lt;BR /&gt;subscribe-to-alert-group diagnostic&lt;BR /&gt;subscribe-to-alert-group environment&lt;BR /&gt;subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:8ecc67c9358ebabd3496666c2e151e5a&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Mon, 12 Dec 2022 18:17:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-3343-not-allowed-across-interfaces-on-asa/m-p/4737295#M1095850</guid>
      <dc:creator>Jesserony</dc:creator>
      <dc:date>2022-12-12T18:17:02Z</dc:date>
    </item>
    <item>
      <title>Re: UDP 3343 not allowed across interfaces on ASA</title>
      <link>https://community.cisco.com/t5/network-security/udp-3343-not-allowed-across-interfaces-on-asa/m-p/4737304#M1095852</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1104473"&gt;@Jesserony&lt;/a&gt; the network 172.30.43.x is your DMZ network, but your packet-tracer input interface you defined as "inside" - re-run packet-tracer with the correct input interface and paste the full output.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Dec 2022 18:36:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-3343-not-allowed-across-interfaces-on-asa/m-p/4737304#M1095852</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-12-12T18:36:03Z</dc:date>
    </item>
    <item>
      <title>Re: UDP 3343 not allowed across interfaces on ASA</title>
      <link>https://community.cisco.com/t5/network-security/udp-3343-not-allowed-across-interfaces-on-asa/m-p/4737326#M1095859</link>
      <description>&lt;P&gt;My mistake, thank you - this brings me back to the original question i had.&lt;/P&gt;&lt;P&gt;Look at the two packet traces below - one going from UDP 3343 to 3343. The PT output says its allowed, but doesnt show what the output interface will be. Now if i do 3343 to 3344, it does show the output interface.. Is that meaningful to you Rob?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Result of the command: "packet-tracer input DMZ udp 172.30.43.223 3343 192.168.10.225 3343"&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found flow with id 40519440, using existing flow&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: DMZ&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-----------------------&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Result of the command: "packet-tracer input DMZ udp 172.30.43.223 3343 192.168.10.225 3344"&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 192.168.254.57 using egress ifc inside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group DMZ_access_in_1 in interface DMZ&lt;BR /&gt;access-list DMZ_access_in_1 extended permit ip any any&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,any) source static CGI-Network CGI-Network destination static DMZ-Network DMZ-Network no-proxy-arp route-lookup&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 172.30.43.223/3343 to 172.30.43.223/3343&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: SFR&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map sfr&lt;BR /&gt;match access-list sfr_redirect&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class sfr&lt;BR /&gt;sfr fail-open&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: FLOW-EXPORT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside_access_in out interface inside&lt;BR /&gt;access-list inside_access_in extended permit ip any any&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,any) source static CGI-Network CGI-Network destination static DMZ-Network DMZ-Network no-proxy-arp route-lookup&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 42760708, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: DMZ&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Dec 2022 19:14:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-3343-not-allowed-across-interfaces-on-asa/m-p/4737326#M1095859</guid>
      <dc:creator>Jesserony</dc:creator>
      <dc:date>2022-12-12T19:14:45Z</dc:date>
    </item>
    <item>
      <title>Re: UDP 3343 not allowed across interfaces on ASA</title>
      <link>https://community.cisco.com/t5/network-security/udp-3343-not-allowed-across-interfaces-on-asa/m-p/4737338#M1095862</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1104473"&gt;@Jesserony&lt;/a&gt; this is probably a clue.&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;STRONG&gt;Found flow with id 40519440, using existing flow&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Do you have an existing connection?&lt;/P&gt;
&lt;P&gt;Is real traffic working or not?&lt;/P&gt;</description>
      <pubDate>Mon, 12 Dec 2022 19:30:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-3343-not-allowed-across-interfaces-on-asa/m-p/4737338#M1095862</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-12-12T19:30:43Z</dc:date>
    </item>
    <item>
      <title>Re: UDP 3343 not allowed across interfaces on ASA</title>
      <link>https://community.cisco.com/t5/network-security/udp-3343-not-allowed-across-interfaces-on-asa/m-p/4737339#M1095863</link>
      <description>&lt;P&gt;DMZ and Inside same security level so you need below command&amp;nbsp;&lt;BR /&gt;same-secuirty-traffic permit inter-interface&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Dec 2022 19:31:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-3343-not-allowed-across-interfaces-on-asa/m-p/4737339#M1095863</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-12-12T19:31:23Z</dc:date>
    </item>
    <item>
      <title>Re: UDP 3343 not allowed across interfaces on ASA</title>
      <link>https://community.cisco.com/t5/network-security/udp-3343-not-allowed-across-interfaces-on-asa/m-p/4737341#M1095864</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;DMZ and Inside same security level so you need below command&amp;nbsp;&lt;BR /&gt;same-secuirty-traffic permit inter-interface&amp;nbsp;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;looks like it's already configured &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Dec 2022 19:35:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-3343-not-allowed-across-interfaces-on-asa/m-p/4737341#M1095864</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-12-12T19:35:44Z</dc:date>
    </item>
    <item>
      <title>Re: UDP 3343 not allowed across interfaces on ASA</title>
      <link>https://community.cisco.com/t5/network-security/udp-3343-not-allowed-across-interfaces-on-asa/m-p/4737346#M1095867</link>
      <description>&lt;P&gt;show arp in FW do you see the MAC address of next-hop&amp;nbsp;&lt;SPAN&gt;192.168.254.57&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Dec 2022 19:51:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-3343-not-allowed-across-interfaces-on-asa/m-p/4737346#M1095867</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-12-12T19:51:56Z</dc:date>
    </item>
    <item>
      <title>Re: UDP 3343 not allowed across interfaces on ASA</title>
      <link>https://community.cisco.com/t5/network-security/udp-3343-not-allowed-across-interfaces-on-asa/m-p/4737383#M1095868</link>
      <description>&lt;P&gt;Yes, the connection works, ping and SMB are currently working between those subnets, it just doesnt seem to be liking UDP 3343 for some reason.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Dec 2022 21:06:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-3343-not-allowed-across-interfaces-on-asa/m-p/4737383#M1095868</guid>
      <dc:creator>Jesserony</dc:creator>
      <dc:date>2022-12-12T21:06:13Z</dc:date>
    </item>
    <item>
      <title>Re: UDP 3343 not allowed across interfaces on ASA</title>
      <link>https://community.cisco.com/t5/network-security/udp-3343-not-allowed-across-interfaces-on-asa/m-p/4737384#M1095869</link>
      <description>&lt;P&gt;Yup, i can see&amp;nbsp;&lt;SPAN&gt;192.168.254.57 in arp.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Dec 2022 21:06:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-3343-not-allowed-across-interfaces-on-asa/m-p/4737384#M1095869</guid>
      <dc:creator>Jesserony</dc:creator>
      <dc:date>2022-12-12T21:06:39Z</dc:date>
    </item>
    <item>
      <title>Re: UDP 3343 not allowed across interfaces on ASA</title>
      <link>https://community.cisco.com/t5/network-security/udp-3343-not-allowed-across-interfaces-on-asa/m-p/4737411#M1095870</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1104473"&gt;@Jesserony&lt;/a&gt;&amp;nbsp;check local firewall on the server itself to ensure that port is allowed from the source.&lt;/P&gt;
&lt;P&gt;Take a packet capture&lt;/P&gt;</description>
      <pubDate>Mon, 12 Dec 2022 21:19:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-3343-not-allowed-across-interfaces-on-asa/m-p/4737411#M1095870</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-12-12T21:19:20Z</dc:date>
    </item>
    <item>
      <title>Re: UDP 3343 not allowed across interfaces on ASA</title>
      <link>https://community.cisco.com/t5/network-security/udp-3343-not-allowed-across-interfaces-on-asa/m-p/4737425#M1095871</link>
      <description>&lt;P&gt;Ok ill give that a try. Related question: When i run a packet trace does it somehow know there is an issue somewhere outside of the ASA? I was under the impression packet trace was completely simulated.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Dec 2022 21:33:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-3343-not-allowed-across-interfaces-on-asa/m-p/4737425#M1095871</guid>
      <dc:creator>Jesserony</dc:creator>
      <dc:date>2022-12-12T21:33:30Z</dc:date>
    </item>
    <item>
      <title>Re: UDP 3343 not allowed across interfaces on ASA</title>
      <link>https://community.cisco.com/t5/network-security/udp-3343-not-allowed-across-interfaces-on-asa/m-p/4737470#M1095877</link>
      <description>&lt;P&gt;&lt;SPAN&gt;the server is in DMZ and it use 3343 ? or server in IN and use 3343 ?&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Dec 2022 22:45:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-3343-not-allowed-across-interfaces-on-asa/m-p/4737470#M1095877</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-12-12T22:45:21Z</dc:date>
    </item>
    <item>
      <title>Re: UDP 3343 not allowed across interfaces on ASA</title>
      <link>https://community.cisco.com/t5/network-security/udp-3343-not-allowed-across-interfaces-on-asa/m-p/4737751#M1095897</link>
      <description>&lt;P&gt;in this case there is many point the packet can drop on it,&amp;nbsp;&lt;BR /&gt;but we want to mini our search,&amp;nbsp;&lt;BR /&gt;you can use capture in ASA to find if the packet is receive and send to server through ASA FW.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (76).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/170813i0C0EDA10A6E31728/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (76).png" alt="Screenshot (76).png" /&gt;&lt;/span&gt;&lt;BR /&gt;I run lab show you how you can use capture in ASA FW&amp;nbsp;&lt;BR /&gt;I have two interface IN and DMZ.&lt;BR /&gt;&lt;BR /&gt;please note that you must use NO capture ......... after finish because this capture take large CPU/memory resource.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2022 10:33:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-3343-not-allowed-across-interfaces-on-asa/m-p/4737751#M1095897</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-12-13T10:33:22Z</dc:date>
    </item>
    <item>
      <title>Re: UDP 3343 not allowed across interfaces on ASA</title>
      <link>https://community.cisco.com/t5/network-security/udp-3343-not-allowed-across-interfaces-on-asa/m-p/4738061#M1095929</link>
      <description>&lt;P&gt;Thank you so much for the help! I will give it a try.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2022 19:20:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-3343-not-allowed-across-interfaces-on-asa/m-p/4738061#M1095929</guid>
      <dc:creator>Jesserony</dc:creator>
      <dc:date>2022-12-13T19:20:00Z</dc:date>
    </item>
  </channel>
</rss>

