<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Start a packet capture and in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/can-t-ping-or-connect-to-port-443-on-external-interface/m-p/3033171#M134900</link>
    <description>&lt;P&gt;Start a packet capture and try to connect. Share what you find here or with your ISP. That should eliminate conjecture.&lt;/P&gt;</description>
    <pubDate>Thu, 08 Jun 2017 15:41:23 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2017-06-08T15:41:23Z</dc:date>
    <item>
      <title>Can't ping or connect to port 443 on external interface</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-or-connect-to-port-443-on-external-interface/m-p/3033167#M134895</link>
      <description>&lt;P&gt;I need a bit of a reality check here.&amp;nbsp;&amp;nbsp; I have a 5515x with two outbound connections.&amp;nbsp; One interface is connected to an ISP.&amp;nbsp; The other is connected to a stub network for testing.&amp;nbsp;&amp;nbsp;&amp;nbsp; From inside networks, I can ping through, browse the web, etc using policy based routing to direct flow via the correct interface.&amp;nbsp;&amp;nbsp;&amp;nbsp; However, I cannot connect to the firewall from outside using either icmp or port 443.&amp;nbsp; I have an explicit rule on the interface to allow icmp and the interface is enabled for Anyconnect.&amp;nbsp;&amp;nbsp; Packet traces indicate that both icmp connections to port 443 should work.&amp;nbsp;&amp;nbsp; If I plug a laptop in outside the firewall, I can ping and telnet to port 443.&amp;nbsp; The ISP claims it is not blocking ports or traffic. &amp;nbsp; Regardless, I cannot connect.&amp;nbsp;&amp;nbsp; What could I be missing?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 01:00:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-or-connect-to-port-443-on-external-interface/m-p/3033167#M134895</guid>
      <dc:creator>andrewgori</dc:creator>
      <dc:date>2019-03-26T01:00:24Z</dc:date>
    </item>
    <item>
      <title>Hi </title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-or-connect-to-port-443-on-external-interface/m-p/3033168#M134897</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you share your config on text file (don't forget to remove all confidential stuff)?&lt;/P&gt;
&lt;P&gt;Have you ran packet-tracer command? Can you share the output please?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The command should be :&lt;/P&gt;
&lt;P&gt;Packet-tracer input outside icmp 8.8.8.8 8 0 ip-outside-asa&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Saying what the cause of the issue is without more information is a bit difficult.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PS: Please don't forget to rate and mark as correct answer if this answered your question&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 00:07:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-or-connect-to-port-443-on-external-interface/m-p/3033168#M134897</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-06-08T00:07:24Z</dc:date>
    </item>
    <item>
      <title>It could be routing.</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-or-connect-to-port-443-on-external-interface/m-p/3033169#M134898</link>
      <description>&lt;P&gt;It could be routing.&lt;/P&gt;
&lt;P&gt;Also note that an "outside access-list in" ACL controls traffic THROUGH the ASA - not traffic TO the ASA.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 08:19:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-or-connect-to-port-443-on-external-interface/m-p/3033169#M134898</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-06-08T08:19:31Z</dc:date>
    </item>
    <item>
      <title>I think routing is OK since</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-or-connect-to-port-443-on-external-interface/m-p/3033170#M134899</link>
      <description>&lt;P&gt;I think routing is OK since internal clients can access outside web pages, etc.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 15:29:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-or-connect-to-port-443-on-external-interface/m-p/3033170#M134899</guid>
      <dc:creator>andrewgori</dc:creator>
      <dc:date>2017-06-08T15:29:06Z</dc:date>
    </item>
    <item>
      <title>Start a packet capture and</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-or-connect-to-port-443-on-external-interface/m-p/3033171#M134900</link>
      <description>&lt;P&gt;Start a packet capture and try to connect. Share what you find here or with your ISP. That should eliminate conjecture.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 15:41:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-or-connect-to-port-443-on-external-interface/m-p/3033171#M134900</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-06-08T15:41:23Z</dc:date>
    </item>
    <item>
      <title>Thanks to both of you for the</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-or-connect-to-port-443-on-external-interface/m-p/3033172#M134901</link>
      <description>&lt;P&gt;Thanks to both of you for the input.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It looks like it may be a routing issue of sorts after all.&amp;nbsp; If I'm reading the output correctly, it's pushing the return packets out the external-ISP1 interface rather than external-ISP2 that the ICMP packets originally came in on.&amp;nbsp; (default route is via External-ISP1)&amp;nbsp; How do I make the replies go out the correct interface?&amp;nbsp; Do I need another Policy Based Route?&amp;nbsp;&amp;nbsp; I'm trying to work through the flow logic.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;5515x# packet-tracer input external-ISP2 icmp 8.8.8.8 0 0 10.90.7.12&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 10.211.84.113 using egress ifc&amp;nbsp; external-ISP1&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group External-ISP2_access_in in interface External-Integra&lt;BR /&gt;access-list External-ISP2_access_in extended permit icmp any any&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 6&lt;BR /&gt;Type: FLOW-EXPORT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 7&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 8&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 2228722, packet dispatched to next module&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;input-interface: External-ISP2&lt;/SPAN&gt;&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;output-interface: external-ISP1&lt;/SPAN&gt;&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/PRE&gt;</description>
      <pubDate>Thu, 08 Jun 2017 16:41:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-or-connect-to-port-443-on-external-interface/m-p/3033172#M134901</guid>
      <dc:creator>andrewgori</dc:creator>
      <dc:date>2017-06-08T16:41:43Z</dc:date>
    </item>
    <item>
      <title>PBR is not very useful in</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-or-connect-to-port-443-on-external-interface/m-p/3033173#M134902</link>
      <description>&lt;P&gt;PBR is not very useful in most uses cases for incoming Internet traffic. &amp;nbsp;If you know the client source address sure you can use it. But this is not normally the case in most situations outside the lab or testbed.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 16:50:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-or-connect-to-port-443-on-external-interface/m-p/3033173#M134902</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-06-08T16:50:38Z</dc:date>
    </item>
    <item>
      <title>Thank you for the input; that</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-or-connect-to-port-443-on-external-interface/m-p/3033174#M134903</link>
      <description>&lt;P&gt;Thank you for the input; that makes sense.&amp;nbsp;&amp;nbsp; Is there a viable way to host AnyConnect via an interface that is not used as the default route?&amp;nbsp;&amp;nbsp; We're not running any routing protocols, just static routes for internal traffic and next-hop to the ISP's so there is no dynamic routing done by our hardware.&amp;nbsp; At this point, I'm thinking I may need to re-evaluate my plan.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 17:11:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-or-connect-to-port-443-on-external-interface/m-p/3033174#M134903</guid>
      <dc:creator>andrewgori</dc:creator>
      <dc:date>2017-06-08T17:11:16Z</dc:date>
    </item>
    <item>
      <title>SSL VPN (Anyconnect) is</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-or-connect-to-port-443-on-external-interface/m-p/3033175#M134904</link>
      <description>&lt;P&gt;SSL VPN (Anyconnect) is almost always served up on the default route interface.&lt;/P&gt;
&lt;P&gt;You really cannot effectively do it with dual ISPs except in cases where one is essentially standby and you have an ip sla monitor to swing the default route to it when the primary fails.&lt;/P&gt;
&lt;P&gt;Why do you not want to use the current primary ISP connection for SSL VPN?&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 17:15:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-or-connect-to-port-443-on-external-interface/m-p/3033175#M134904</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-06-08T17:15:35Z</dc:date>
    </item>
    <item>
      <title> I'm not vested in the idea</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-or-connect-to-port-443-on-external-interface/m-p/3033176#M134905</link>
      <description>&lt;P&gt;&amp;nbsp;I'm not vested in the idea of serving VPN via the second interface.&amp;nbsp; I'm just trying to relieve some of the load off of the default route interface.&amp;nbsp;&amp;nbsp;&amp;nbsp; I have a couple of other options for separating traffic and will go down that route instead.&amp;nbsp; Simply moving a large enough portion of the outbound desktop/wifi traffic should suffice.&amp;nbsp; With my newly acquired knowledge, seems like a simpler approach.&amp;nbsp;&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Thanks again.&amp;nbsp; I appreciate the help.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 17:24:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-or-connect-to-port-443-on-external-interface/m-p/3033176#M134905</guid>
      <dc:creator>andrewgori</dc:creator>
      <dc:date>2017-06-08T17:24:48Z</dc:date>
    </item>
    <item>
      <title>You're welcome.</title>
      <link>https://community.cisco.com/t5/network-security/can-t-ping-or-connect-to-port-443-on-external-interface/m-p/3033177#M134906</link>
      <description>&lt;P&gt;You're welcome.&lt;/P&gt;
&lt;P&gt;Please let me know if you have any other questions.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 17:29:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-ping-or-connect-to-port-443-on-external-interface/m-p/3033177#M134906</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-06-08T17:29:12Z</dc:date>
    </item>
  </channel>
</rss>

