<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FMC S2S VPN Return traffic ports flipping and hitting block rule in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fmc-s2s-vpn-return-traffic-ports-flipping-and-hitting-block-rule/m-p/5146126#M1114355</link>
    <description>&lt;P&gt;Hi All,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sure, let me explain a bit better. So we have a functioning VPN with Live traffic flowing. I haven't heard of any issues yet, but watching the logs within the Event Viewer, occasionally I see some strange logs like I showed in the image attached to the first post. This isn't happening all the time, but I'm seeing it frequently enough to be concerned, as this may cause issues later down the line.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The VPN Profile is fairly straight forward:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;It's a Policy Based (Crypto Map) VPN.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We are using the Auto No NAT feature when creating the VPN profile - "Exempt VPN traffic from network address translation"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;No Filter applied to the VPN with all rules defined within the &lt;STRONG&gt;Global ACP&lt;/STRONG&gt; list, so we are&amp;nbsp;&lt;STRONG&gt;not&lt;/STRONG&gt; using the&amp;nbsp;&lt;SPAN&gt;sysopt permit-vpn feature.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The access policy has been configured defining allow traffic to destination ports, but as a combined rule. (Will link a screenshot of this)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Testing with the packet tracer the times I've tested show the expected results on the times I've tested, so very confused.&lt;/P&gt;&lt;P&gt;Thanks all for your support and interest!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 17 Jul 2024 15:24:27 GMT</pubDate>
    <dc:creator>MynameisGeoff</dc:creator>
    <dc:date>2024-07-17T15:24:27Z</dc:date>
    <item>
      <title>FMC S2S VPN Return traffic ports flipping and hitting block rule</title>
      <link>https://community.cisco.com/t5/network-security/fmc-s2s-vpn-return-traffic-ports-flipping-and-hitting-block-rule/m-p/5143463#M1114210</link>
      <description>&lt;P&gt;Hi All,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Wondering if I could get your take on something and if I've got a misconfiguration in the deployment somewhere?&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have some FTD's managed by FMC.&lt;/P&gt;&lt;P&gt;We have live VPN tunnels and we've been using the mandatory ACP area to define the access rules for the VPN. We have used the auto NAT exempt feature within the S2S VPN profile, but haven't used the Sysopt-permit feature to allow VPN filters, as it doesn't support Port Groups, so managing some of the rulesets for the VPNs would become a pain.&lt;/P&gt;&lt;P&gt;Looking through the unified events, everything looks good and the traffic is hitting the defined rules, but occasionally I am seeing return traffic where the port has flipped to a source port and then that's being blocked?? We've only ever built rules specifying destination ports, so this is confusing me.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can anyone think what could be causing this??&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 09:53:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-s2s-vpn-return-traffic-ports-flipping-and-hitting-block-rule/m-p/5143463#M1114210</guid>
      <dc:creator>MynameisGeoff</dc:creator>
      <dc:date>2024-07-11T09:53:58Z</dc:date>
    </item>
    <item>
      <title>Re: FMC S2S VPN Return traffic ports flipping and hitting block rule</title>
      <link>https://community.cisco.com/t5/network-security/fmc-s2s-vpn-return-traffic-ports-flipping-and-hitting-block-rule/m-p/5143480#M1114213</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/981919"&gt;@MynameisGeoff&lt;/a&gt;&amp;nbsp;If I read your message correctly, you do use "sysopt permit-vpn" on FTD bypassing access control for VPN traffic. I remember that somebody reported that unlike ASA OS, FTD applies this setting unidirectionally for inbound traffic only: &lt;A href="https://community.cisco.com/t5/vpn/ftd-site-to-site-vpn-seems-to-ignore-bypass-acp-setting/td-p/4953947" target="_blank"&gt;https://community.cisco.com/t5/vpn/ftd-site-to-site-vpn-seems-to-ignore-bypass-acp-setting/td-p/4953947&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I didn't test myself.&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 10:40:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-s2s-vpn-return-traffic-ports-flipping-and-hitting-block-rule/m-p/5143480#M1114213</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-07-11T10:40:58Z</dc:date>
    </item>
    <item>
      <title>Re: FMC S2S VPN Return traffic ports flipping and hitting block rule</title>
      <link>https://community.cisco.com/t5/network-security/fmc-s2s-vpn-return-traffic-ports-flipping-and-hitting-block-rule/m-p/5143546#M1114217</link>
      <description>&lt;P&gt;Sorry I don't full get your issue here&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HostA send traffic from portA to hostB portB&lt;/P&gt;
&lt;P&gt;The hostB sure will use reply by portB to portA of HostA&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ACL must check one direction and return traffic must bypass any ACL since conn is there.&lt;/P&gt;
&lt;P&gt;Can you more elaborate&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 12:28:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-s2s-vpn-return-traffic-ports-flipping-and-hitting-block-rule/m-p/5143546#M1114217</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-11T12:28:12Z</dc:date>
    </item>
    <item>
      <title>Re: FMC S2S VPN Return traffic ports flipping and hitting block rule</title>
      <link>https://community.cisco.com/t5/network-security/fmc-s2s-vpn-return-traffic-ports-flipping-and-hitting-block-rule/m-p/5146126#M1114355</link>
      <description>&lt;P&gt;Hi All,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sure, let me explain a bit better. So we have a functioning VPN with Live traffic flowing. I haven't heard of any issues yet, but watching the logs within the Event Viewer, occasionally I see some strange logs like I showed in the image attached to the first post. This isn't happening all the time, but I'm seeing it frequently enough to be concerned, as this may cause issues later down the line.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The VPN Profile is fairly straight forward:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;It's a Policy Based (Crypto Map) VPN.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We are using the Auto No NAT feature when creating the VPN profile - "Exempt VPN traffic from network address translation"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;No Filter applied to the VPN with all rules defined within the &lt;STRONG&gt;Global ACP&lt;/STRONG&gt; list, so we are&amp;nbsp;&lt;STRONG&gt;not&lt;/STRONG&gt; using the&amp;nbsp;&lt;SPAN&gt;sysopt permit-vpn feature.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The access policy has been configured defining allow traffic to destination ports, but as a combined rule. (Will link a screenshot of this)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Testing with the packet tracer the times I've tested show the expected results on the times I've tested, so very confused.&lt;/P&gt;&lt;P&gt;Thanks all for your support and interest!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2024 15:24:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-s2s-vpn-return-traffic-ports-flipping-and-hitting-block-rule/m-p/5146126#M1114355</guid>
      <dc:creator>MynameisGeoff</dc:creator>
      <dc:date>2024-07-17T15:24:27Z</dc:date>
    </item>
    <item>
      <title>Re: FMC S2S VPN Return traffic ports flipping and hitting block rule</title>
      <link>https://community.cisco.com/t5/network-security/fmc-s2s-vpn-return-traffic-ports-flipping-and-hitting-block-rule/m-p/5146139#M1114357</link>
      <description>&lt;P&gt;Friend you need&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ACL from OUT into IN&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ACL from IN into OUT&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I see you config only &lt;STRONG&gt;one&lt;/STRONG&gt; ACL for &lt;STRONG&gt;both&lt;/STRONG&gt; direction so sure if remote VPN try to access any resource internal then traffic will drop.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2024 09:57:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-s2s-vpn-return-traffic-ports-flipping-and-hitting-block-rule/m-p/5146139#M1114357</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-18T09:57:18Z</dc:date>
    </item>
    <item>
      <title>Re: FMC S2S VPN Return traffic ports flipping and hitting block rule</title>
      <link>https://community.cisco.com/t5/network-security/fmc-s2s-vpn-return-traffic-ports-flipping-and-hitting-block-rule/m-p/5146551#M1114378</link>
      <description>&lt;P&gt;Ok. In this case the blocked packet can be a TCP RST packet sent by host A after the connection was torn down by host B (or something like that). You can collect capture on the inside interface to verify this theory.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2024 08:32:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-s2s-vpn-return-traffic-ports-flipping-and-hitting-block-rule/m-p/5146551#M1114378</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-07-18T08:32:26Z</dc:date>
    </item>
    <item>
      <title>Re: FMC S2S VPN Return traffic ports flipping and hitting block rule</title>
      <link>https://community.cisco.com/t5/network-security/fmc-s2s-vpn-return-traffic-ports-flipping-and-hitting-block-rule/m-p/5146553#M1114379</link>
      <description>&lt;P&gt;Hi Cisco World,&lt;/P&gt;&lt;P&gt;Not exactly, I've included everything into one line. But maybe doing like this could cause issues in the flow??&lt;/P&gt;&lt;P&gt;How it's configured::&lt;/P&gt;&lt;P&gt;Source Zone: Both Inside &amp;amp; Outside&lt;BR /&gt;Source Networks: Both Source and Destination Networks (Defined in VPN interesting Traffic)&lt;BR /&gt;Source Ports: ANY&lt;BR /&gt;Destination Zone: Both Inside &amp;amp; Outside&lt;BR /&gt;Destination Networks: Both Source and Destination Networks (Defined in VPN interesting Traffic)&lt;BR /&gt;Destination Ports: Defined Ports for VPN&lt;/P&gt;&lt;P&gt;There's no reason I couldn't separate the rule into two; having a single rule for Inbound traffic and another for Outbound traffic, but I didn't think this was required?&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2024 08:35:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-s2s-vpn-return-traffic-ports-flipping-and-hitting-block-rule/m-p/5146553#M1114379</guid>
      <dc:creator>MynameisGeoff</dc:creator>
      <dc:date>2024-07-18T08:35:51Z</dc:date>
    </item>
    <item>
      <title>Re: FMC S2S VPN Return traffic ports flipping and hitting block rule</title>
      <link>https://community.cisco.com/t5/network-security/fmc-s2s-vpn-return-traffic-ports-flipping-and-hitting-block-rule/m-p/5146558#M1114380</link>
      <description>&lt;P&gt;Ok... That is interesting!&lt;BR /&gt;&lt;BR /&gt;And this may happen only occasionally and be represented in the logs with the destination port flipping to a source port? Similarly to the screenshot in my original post?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2024 08:49:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-s2s-vpn-return-traffic-ports-flipping-and-hitting-block-rule/m-p/5146558#M1114380</guid>
      <dc:creator>MynameisGeoff</dc:creator>
      <dc:date>2024-07-18T08:49:29Z</dc:date>
    </item>
    <item>
      <title>Re: FMC S2S VPN Return traffic ports flipping and hitting block rule</title>
      <link>https://community.cisco.com/t5/network-security/fmc-s2s-vpn-return-traffic-ports-flipping-and-hitting-block-rule/m-p/5146562#M1114382</link>
      <description>&lt;P&gt;Yes, this is a new connection request from firewall point of view.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2024 08:55:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-s2s-vpn-return-traffic-ports-flipping-and-hitting-block-rule/m-p/5146562#M1114382</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-07-18T08:55:30Z</dc:date>
    </item>
    <item>
      <title>Re: FMC S2S VPN Return traffic ports flipping and hitting block rule</title>
      <link>https://community.cisco.com/t5/network-security/fmc-s2s-vpn-return-traffic-ports-flipping-and-hitting-block-rule/m-p/5146602#M1114383</link>
      <description>&lt;P&gt;Ok right, I'll start trying to capture some of this!&lt;/P&gt;&lt;P&gt;Thanks all for your help so far trying to figure out what's happening here, really appreciate the support.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2024 10:00:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-s2s-vpn-return-traffic-ports-flipping-and-hitting-block-rule/m-p/5146602#M1114383</guid>
      <dc:creator>MynameisGeoff</dc:creator>
      <dc:date>2024-07-18T10:00:42Z</dc:date>
    </item>
    <item>
      <title>Re: FMC S2S VPN Return traffic ports flipping and hitting block rule</title>
      <link>https://community.cisco.com/t5/network-security/fmc-s2s-vpn-return-traffic-ports-flipping-and-hitting-block-rule/m-p/5146604#M1114384</link>
      <description>&lt;P&gt;Friend ypu use one line for both zone and ypu use destiantion port not source port.&lt;/P&gt;
&lt;P&gt;My suggestion is separate this ACL into two line&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Inside to outside and use l4 port of&amp;nbsp; remote LAN server as destiantion&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Outside to inside and use l4 port of local LAN server as destiantion&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can use one acl both directions if you use subnet only but use l4 port make acl direcional aware and this drop your traffic&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2024 10:01:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-s2s-vpn-return-traffic-ports-flipping-and-hitting-block-rule/m-p/5146604#M1114384</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-18T10:01:56Z</dc:date>
    </item>
    <item>
      <title>Re: FMC S2S VPN Return traffic ports flipping and hitting block rule</title>
      <link>https://community.cisco.com/t5/network-security/fmc-s2s-vpn-return-traffic-ports-flipping-and-hitting-block-rule/m-p/5146608#M1114385</link>
      <description>&lt;P&gt;Thanks for this input Cisco World, I will also split the ACL into 2 separate rules to see if the behaviour changes.&lt;/P&gt;&lt;P&gt;Just for transparency, it will look something like the screenshot attached.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2024 10:09:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-s2s-vpn-return-traffic-ports-flipping-and-hitting-block-rule/m-p/5146608#M1114385</guid>
      <dc:creator>MynameisGeoff</dc:creator>
      <dc:date>2024-07-18T10:09:03Z</dc:date>
    </item>
  </channel>
</rss>

