<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic What version of ASA software in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/packet-tracer-output-doesn-t-make-sense/m-p/3078165#M134628</link>
    <description>&lt;P&gt;What version of ASA software are you running?&lt;/P&gt;</description>
    <pubDate>Mon, 19 Jun 2017 16:00:11 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2017-06-19T16:00:11Z</dc:date>
    <item>
      <title>Packet Tracer Output doesn't make sense</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-output-doesn-t-make-sense/m-p/3078164#M134626</link>
      <description>&lt;P&gt;I have implemented a DMZ and cannot get traffic to flow between the outside and the DMZ (inside to DMZ works). &amp;nbsp;Packet tracer seems to indicate that it's getting unNATed and allowed through the ACL, but then at the end, in phase 6, it says it's being blocked but I can't figure out by what:&lt;BR /&gt;&lt;BR /&gt;The ACL allows SSH traffic from the Vendor's IP to the Public IP of the DMZ server. &amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;packet-tracer input outside tcp Vendor-Company-IP&amp;nbsp;35000 &lt;SPAN&gt;Server-Public-IP&lt;/SPAN&gt; 22&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (DMZ,outside) Server-Public-IP Server-Private-IP netmask 255.255.255.255 &lt;BR /&gt; match ip DMZ host Server-Private-IP outside any&lt;BR /&gt; static translation to Server-Public-IP&lt;BR /&gt; translate_hits = 0, untranslate_hits = 13629&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface DMZ&lt;BR /&gt;Untranslate Server-Public-IP/0 to Server-Private-IP/0 using netmask 255.255.255.255&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW &lt;BR /&gt;Config:&lt;BR /&gt;access-group acl_out in interface outside&lt;BR /&gt;access-list acl_out extended permit tcp object-group Vendor-Company-IP host Server-Public-IP eq ssh &lt;BR /&gt;object-group network Server-Company-IP&lt;BR /&gt; network-object host &lt;SPAN&gt;Vendor&lt;/SPAN&gt;&lt;SPAN&gt;-Company-IP&lt;/SPAN&gt;&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0xac1405e0, priority=12, domain=permit, deny=false&lt;BR /&gt; hits=8, user_data=0xa89f5340, cs_id=0x0, flags=0x0, protocol=6&lt;BR /&gt; src ip=&amp;lt;Vendor Company IP&amp;gt;, mask=255.255.255.255, port=0&lt;BR /&gt; dst ip=Server-Public-IP, mask=255.255.255.255, port=22, dscp=0x0&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0xab7b3998, priority=0, domain=permit-ip-option, deny=true&lt;BR /&gt; hits=39108727, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt; &lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0xac230e40, priority=12, domain=ipsec-tunnel-flow, deny=true&lt;BR /&gt; hits=2667099, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; out id=0xb2a05360, priority=11, domain=permit, deny=true&lt;BR /&gt; hits=20, user_data=0x5, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: DMZ&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:36:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-output-doesn-t-make-sense/m-p/3078164#M134626</guid>
      <dc:creator>krcollab</dc:creator>
      <dc:date>2019-03-12T09:36:26Z</dc:date>
    </item>
    <item>
      <title>What version of ASA software</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-output-doesn-t-make-sense/m-p/3078165#M134628</link>
      <description>&lt;P&gt;What version of ASA software are you running?&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jun 2017 16:00:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-output-doesn-t-make-sense/m-p/3078165#M134628</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-06-19T16:00:11Z</dc:date>
    </item>
    <item>
      <title>The ASA is running 8.2, which</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-output-doesn-t-make-sense/m-p/3078166#M134632</link>
      <description>&lt;P&gt;The ASA is running 8.2, which&amp;nbsp;may be&amp;nbsp;part of my problem.&amp;nbsp; I'm used to the 8.3 and later conventions.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jun 2017 16:14:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-output-doesn-t-make-sense/m-p/3078166#M134632</guid>
      <dc:creator>krcollab</dc:creator>
      <dc:date>2017-06-19T16:14:41Z</dc:date>
    </item>
    <item>
      <title>Hmm. The NAT and ACL syntax</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-output-doesn-t-make-sense/m-p/3078167#M134634</link>
      <description>&lt;P&gt;Hmm. The NAT and ACL syntax looks OK for 8.2.&lt;/P&gt;
&lt;P&gt;Phase 6 says it's hitting in implicit deny. Is there perhaps an output ACL on the DMZ interface? If there is, you must explicitly allow the traffic to your server.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jun 2017 16:19:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-output-doesn-t-make-sense/m-p/3078167#M134634</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-06-19T16:19:10Z</dc:date>
    </item>
    <item>
      <title>There is an outbound ACL on</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-output-doesn-t-make-sense/m-p/3078168#M134635</link>
      <description>&lt;P&gt;There is an outbound ACL on the DMZ interface (I don't have an inbound one on it).&amp;nbsp; &lt;BR /&gt;&lt;BR /&gt;The ACL, if I set it up correctly, should allow access from the vendor's DMZ server to their servers that are on the inside (VendorX-Inside-Servers) using a specific set of services (VendorX-Services-TCP/UDP).&amp;nbsp; Then it should block access&amp;nbsp; to any RFC1918 addresses other than the ones already specified above it.&amp;nbsp; Then it should allow all other traffic (to grant outbound traffic to the internet).&amp;nbsp; &lt;BR /&gt;&lt;BR /&gt;Here is the DMZ's outbound ACL:&lt;/P&gt;
&lt;P&gt;access-list DMZ_outbound line 1 extended permit tcp host VendorX-Private-IP object-group VendorX-Inside-Servers object-group VendorX-Services-TCP&lt;BR /&gt;access-list DMZ_outbound line 2 extended permit udp host VendorX-Private-IP object-group VendorX-Inside-Servers object-group VendorX-Services-UDP &lt;BR /&gt;access-list DMZ_outbound line 3 extended deny tcp host VendorX-Private-IP object-group RFC1918&lt;BR /&gt;access-list DMZ_outbound line 4 extended deny udp host VendorX-Private-IP object-group RFC1918&lt;BR /&gt;access-list DMZ_outbound line 5 extended permit tcp host VendorX-Private-IP any&lt;BR /&gt;access-list DMZ_outbound line 6 extended permit udp host VendorX-Private-IP any&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jun 2017 16:25:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-output-doesn-t-make-sense/m-p/3078168#M134635</guid>
      <dc:creator>krcollab</dc:creator>
      <dc:date>2017-06-19T16:25:04Z</dc:date>
    </item>
    <item>
      <title>As I understand what you</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-output-doesn-t-make-sense/m-p/3078169#M134636</link>
      <description>&lt;P&gt;As I understand what you described, the DMZ ACL should be inbound. e.g.:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;SPAN&gt;access-group DMZ_outbound in interface DMZ&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN&gt;(...and perhaps you should rename it accordingly.)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;It then affects traffic inbound to the DMZ from hosts in the DMZ. As you have it setup, the outbound ACL affects traffic leaving the ASA's DMZ interface towards hosts in the DMZ. Since the packet-tracer test is not included in that ACL, the traffic is dropped implicitly. You could alternatively add entries for VendorX-Public-IP outbound.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;We seldom use outbound ACLs as they affect traffic that has already passed through the ASA. We seldom want to go to the trouble of allowing the traffic in the inbound interface, through the other processes, only to drop it while outbound at the egress interface.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jun 2017 16:35:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-output-doesn-t-make-sense/m-p/3078169#M134636</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-06-19T16:35:52Z</dc:date>
    </item>
  </channel>
</rss>

