<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic The ACL in your screenshot in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/able-to-ping-through-asa-but-no-tcp-traffic/m-p/3082710#M145643</link>
    <description>&lt;P&gt;The ACL in your screenshot appears correct. There's a areason why Service only appears once in the ACL - the destination port is the service and the source port will vary or each separate flow. That's the nature of TCP/IP.&lt;/P&gt;
&lt;P&gt;Your DMZ is security-level 50. InsideVLAN15 is security-level 100. You can only initiate communications from a lower security level (50) to a higher (100) when explicitly allowed by an ACL. When initiating from higher to lower, it is allowed by defualt - UNLESS there is any kind of ACL in which case you then need to explicitly define what is allowed.&lt;/P&gt;
&lt;P&gt;When in doubt about your logic or if/why an ASA is dropping a certain flow, use the packet-tracer command (or graphical version in ASDM). If will walk you through the ASA logic step-by-step and give the exact disposition of a given flow.&lt;/P&gt;</description>
    <pubDate>Wed, 22 Mar 2017 02:44:34 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2017-03-22T02:44:34Z</dc:date>
    <item>
      <title>Able to Ping through ASA but no TCP traffic</title>
      <link>https://community.cisco.com/t5/network-security/able-to-ping-through-asa-but-no-tcp-traffic/m-p/3082701#M145634</link>
      <description>&lt;P&gt;Hey everyone,&lt;/P&gt;
&lt;P&gt;So I've been troubleshooting this for about the last 10 hours and have stripped my ACL's down to a bare minimum to avoid any confusion.&lt;/P&gt;
&lt;P&gt;I have an ASA 5505 setup with a DMZ. I have a server connected to the DMZ (PC1, AKA Historian, 10.11.1.10, VLAN1011). I am able to remote desktop from my outside network to PC1 (via NAT) without a problem. I am now trying to get PC1 to connect to a second PC that is connected to my inside network (PC2 - 192.168.50.14, VLAN 500). There is no NAT being used here. I can ping PC2, or any other device on my inside network from PC1, but I can't RDP (I can RDP to PC2 from another device on the inside network.) When I try to RDP, it doesn't even show up in the hit count of the ASA. I have also tried telnet instead of RDP just to rule out any funnyness there.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have a static route added to the L3 switch on my inside network to route any traffic destined for 10.11.1.0 to 192.168.15.220 (which is the address of the ASA on the 192.168.15.0 network.) (ip route 10.11.1.0 255.255.255.0 192.168.15.219) I have no static routes defined on the ASA.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please excuse any remnants of my troubleshooting efforts - but here is a backup of my config. I have done it with a combination of the CLI and ASDM 7.5. Thanks for any help! Note: There is a rough network architecture attached at the bottom as well as a screenshot from ASDM.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;: Saved&lt;BR /&gt;: &lt;BR /&gt;: Serial Number: JMX1722Z0CG&lt;BR /&gt;: Hardware: ASA5505, 512 MB RAM, CPU Geode 500 MHz&lt;BR /&gt;: Written by admin at 22:26:37.989 EDT Mon Mar 20 2017&lt;BR /&gt;!&lt;BR /&gt;ASA Version 9.2(4) &lt;BR /&gt;!&lt;BR /&gt;hostname XXXXXXXXXXXX&lt;BR /&gt;enable password XXX encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;switchport access vlan 15&lt;BR /&gt;switchport trunk allowed vlan 15,254,400,500,600&lt;BR /&gt;switchport trunk native vlan 254&lt;BR /&gt;switchport mode trunk&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;switchport access vlan 1011&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;switchport access vlan 1011&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;switchport access vlan 1011&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;switchport access vlan 1011&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;switchport access vlan 1011&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;switchport access vlan 254&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;description XXXXX Corp Interface&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 192.168.6.190 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan15&lt;BR /&gt;description Inside Control Network Interface VLAN15&lt;BR /&gt;nameif InsideVLAN15&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.15.219 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan400&lt;BR /&gt;description Inside Control Network Interface VLAN400&lt;BR /&gt;nameif InsideVLAN400&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.40.219 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan500&lt;BR /&gt;description Inside Control Network Interface VLAN500&lt;BR /&gt;nameif InsideVLAN500&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.50.219 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan600&lt;BR /&gt;description Inside Control Network Interface VLAN600&lt;BR /&gt;nameif InsideVLAN600&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.60.219 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan1011&lt;BR /&gt;description DMZ Interface&lt;BR /&gt;nameif DMZ&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 10.11.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan1212&lt;BR /&gt;nameif Temp&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 12.12.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa924-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;object network C0EAE4CE44FA&lt;BR /&gt;host 192.168.6.1&lt;BR /&gt;description XXXXX Corporate Firewall&lt;BR /&gt;object network PC_L3_Switch&lt;BR /&gt;host 192.168.15.220&lt;BR /&gt;description Process Control Layer 3 Switch - XXX_OLDLAB_L3S5400&lt;BR /&gt;object network PC_VLAN40&lt;BR /&gt;subnet 192.168.40.0 255.255.255.0&lt;BR /&gt;description Process Control VLAN40&lt;BR /&gt;object network PC_VLAN50&lt;BR /&gt;subnet 192.168.50.0 255.255.255.0&lt;BR /&gt;description Process Control VLAN50&lt;BR /&gt;object network ASA5505&lt;BR /&gt;host 192.168.6.190&lt;BR /&gt;object network ASA5505-Historian&lt;BR /&gt;host 192.168.6.191&lt;BR /&gt;object network hqCorpLAN&lt;BR /&gt;subnet 192.168.9.0 255.255.255.0&lt;BR /&gt;description hqCorpLAN&lt;BR /&gt;object network XXXXXCorpLAN&lt;BR /&gt;subnet 192.168.6.0 255.255.255.0&lt;BR /&gt;description XXXXXCorpLAN&lt;BR /&gt;object network PC_DMZ_HISTORIAN&lt;BR /&gt;host 10.11.1.10&lt;BR /&gt;description PC_DMZ_HISTORIAN&lt;BR /&gt;object service RDP-3389&lt;BR /&gt;service tcp source eq 3389 destination eq 3389 &lt;BR /&gt;description RDP-3389&lt;BR /&gt;object network ASA5505-Engineering&lt;BR /&gt;host 192.168.6.192&lt;BR /&gt;description Engineering Station&lt;BR /&gt;object network PC_DMZ_Engineering&lt;BR /&gt;host 12.12.1.11&lt;BR /&gt;object network XXXXXAzure&lt;BR /&gt;subnet 10.0.1.0 255.255.255.0&lt;BR /&gt;description XXXXXAzure&lt;BR /&gt;object network ASA5505-DMZ-IP&lt;BR /&gt;host 10.11.1.1&lt;BR /&gt;object service RDP-3390&lt;BR /&gt;service tcp source eq 3390 destination eq 3390 &lt;BR /&gt;description RDP-3390&lt;BR /&gt;object network ASA5505-INSIDE-IP_VLAN15&lt;BR /&gt;host 192.168.15.219&lt;BR /&gt;object network ASA5505-INSIDE-IP_VLAN500&lt;BR /&gt;host 192.168.50.219&lt;BR /&gt;object network ASA5505-INSIDE-IP_VLAN400&lt;BR /&gt;host 192.168.40.219&lt;BR /&gt;object network ASA5505-INSIDE-IP_VLAN600&lt;BR /&gt;host 192.168.60.219&lt;BR /&gt;object network ASA5505-INSIDE-IP_VLAN254&lt;BR /&gt;host 192.168.254.219&lt;BR /&gt;object network HistorianRDPAccess&lt;BR /&gt;host 10.11.1.10&lt;BR /&gt;description Historian&lt;BR /&gt;object network Temp&lt;BR /&gt;host 12.12.1.11&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;network-object object hqCorpLAN&lt;BR /&gt;network-object object XXXXXCorpLAN&lt;BR /&gt;network-object object XXXXXAzure&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt;network-object object hqCorpLAN&lt;BR /&gt;network-object object XXXXXCorpLAN&lt;BR /&gt;network-object object XXXXXAzure&lt;BR /&gt;object-group network DM_INLINE_NETWORK_3&lt;BR /&gt;network-object object PC_DMZ_HISTORIAN&lt;BR /&gt;network-object object PC_DMZ_Engineering&lt;BR /&gt;object-group network DM_INLINE_NETWORK_4&lt;BR /&gt;network-object object ASA5505-Engineering&lt;BR /&gt;network-object object PC_DMZ_Engineering&lt;BR /&gt;object-group network DM_INLINE_NETWORK_5&lt;BR /&gt;network-object object ASA5505-Historian&lt;BR /&gt;network-object object PC_DMZ_HISTORIAN&lt;BR /&gt;object-group network DM_INLINE_NETWORK_23&lt;BR /&gt;network-object object PC_DMZ_HISTORIAN&lt;BR /&gt;network-object object PC_DMZ_Engineering&lt;BR /&gt;object-group network DM_INLINE_NETWORK_6&lt;BR /&gt;network-object object hqCorpLAN&lt;BR /&gt;network-object object XXXXXCorpLAN&lt;BR /&gt;network-object object XXXXXAzure&lt;BR /&gt;object-group service RSLinxTCP tcp&lt;BR /&gt;port-object eq 135&lt;BR /&gt;port-object eq 2222&lt;BR /&gt;port-object eq 4241&lt;BR /&gt;port-object eq 44818&lt;BR /&gt;object-group service AnyTCP tcp&lt;BR /&gt;port-object range 1 65535&lt;BR /&gt;object-group network DM_INLINE_NETWORK_12&lt;BR /&gt;network-object host 192.168.40.25&lt;BR /&gt;network-object host 192.168.50.60&lt;BR /&gt;network-object host 192.168.60.21&lt;BR /&gt;object-group service FTHistorian tcp&lt;BR /&gt;port-object eq 5450&lt;BR /&gt;port-object range 5454 5459&lt;BR /&gt;port-object eq 5463&lt;BR /&gt;port-object eq 6000&lt;BR /&gt;object-group network DM_INLINE_NETWORK_10&lt;BR /&gt;network-object host 192.168.40.25&lt;BR /&gt;network-object host 192.168.50.60&lt;BR /&gt;network-object host 192.168.60.21&lt;BR /&gt;object-group service DM_INLINE_TCP_3 tcp&lt;BR /&gt;group-object FTHistorian&lt;BR /&gt;group-object RSLinxTCP&lt;BR /&gt;object-group service AnyUDP udp&lt;BR /&gt;port-object range 1 65535&lt;BR /&gt;object-group network DM_INLINE_NETWORK_19&lt;BR /&gt;network-object host 192.168.40.25&lt;BR /&gt;network-object host 192.168.50.60&lt;BR /&gt;network-object host 192.168.60.21&lt;BR /&gt;object-group network DM_INLINE_NETWORK_22&lt;BR /&gt;network-object host 192.168.40.25&lt;BR /&gt;network-object host 192.168.50.60&lt;BR /&gt;network-object host 192.168.60.21&lt;BR /&gt;object-group service RSLinxUDP udp&lt;BR /&gt;port-object eq 44818&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt;protocol-object udp&lt;BR /&gt;protocol-object tcp&lt;BR /&gt;access-list outside_access_in extended permit tcp object-group DM_INLINE_NETWORK_6 object PC_DMZ_Engineering eq 3389 &lt;BR /&gt;access-list outside_access_in extended permit tcp object-group DM_INLINE_NETWORK_2 object PC_DMZ_HISTORIAN eq 3389 &lt;BR /&gt;access-list outside_access_in extended permit tcp 192.168.6.0 255.255.255.0 object ASA5505 eq https &lt;BR /&gt;access-list outside_access_in extended permit icmp 192.168.6.0 255.255.255.0 object ASA5505 &lt;BR /&gt;access-list dmz_access_in extended permit icmp any any &lt;BR /&gt;access-list dmz_access_in extended permit ip any any &lt;BR /&gt;access-list dmz_access_in extended permit object RDP-3389 any object-group DM_INLINE_NETWORK_23 inactive &lt;BR /&gt;access-list dmz_access_in extended permit tcp object PC_DMZ_HISTORIAN object-group DM_INLINE_NETWORK_10 object-group DM_INLINE_TCP_3 inactive &lt;BR /&gt;access-list dmz_access_in extended permit udp object PC_DMZ_HISTORIAN object-group DM_INLINE_NETWORK_22 object-group RSLinxUDP inactive &lt;BR /&gt;access-list inside_access_in extended permit object RDP-3389 any any &lt;BR /&gt;access-list inside_access_in extended permit icmp any any &lt;BR /&gt;access-list outside_access_in_1 extended permit ip any any &lt;BR /&gt;access-list InsideVLAN500_access_in_1 extended permit object RDP-3389 any any &lt;BR /&gt;access-list InsideVLAN500_access_in_1 extended permit icmp any any &lt;BR /&gt;access-list dmz_access_out extended permit icmp any any &lt;BR /&gt;access-list dmz_access_out extended permit ip any any &lt;BR /&gt;access-list DMZ_1_access_in extended permit object RDP-3389 any any &lt;BR /&gt;access-list DMZ_1_access_in extended permit icmp any any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu InsideVLAN15 1500&lt;BR /&gt;mtu InsideVLAN400 1500&lt;BR /&gt;mtu InsideVLAN500 1500&lt;BR /&gt;mtu InsideVLAN600 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;mtu Temp 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-751.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network HistorianRDPAccess&lt;BR /&gt;nat (DMZ,outside) static ASA5505-Historian net-to-net service tcp 3389 3389 &lt;BR /&gt;access-group outside_access_in_1 in interface outside control-plane&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_access_in in interface InsideVLAN15&lt;BR /&gt;access-group InsideVLAN500_access_in_1 in interface InsideVLAN500&lt;BR /&gt;access-group DMZ_1_access_in in interface DMZ&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication enable console LOCAL &lt;BR /&gt;aaa authentication http console LOCAL &lt;BR /&gt;aaa authentication serial console LOCAL &lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;aaa authentication telnet console LOCAL &lt;BR /&gt;aaa authorization command LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 10.0.1.0 255.255.255.0 outside&lt;BR /&gt;http 192.168.6.0 255.255.255.0 outside&lt;BR /&gt;http 192.168.9.0 255.255.255.0 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet 192.168.6.0 255.255.255.0 outside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 10.0.1.0 255.255.255.0 outside&lt;BR /&gt;ssh 192.168.6.0 255.255.255.0 outside&lt;BR /&gt;ssh 192.168.9.0 255.255.255.0 outside&lt;BR /&gt;ssh 10.11.1.0 255.255.255.0 DMZ&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;/P&gt;
&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 10.0.1.12 source outside prefer&lt;BR /&gt;ssl server-version any&lt;BR /&gt;ssl client-version any&lt;BR /&gt;username XXX password XXX encrypted privilege 15&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;no active&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination address email callhome@cisco.com&lt;BR /&gt;destination transport-method http&lt;BR /&gt;subscribe-to-alert-group diagnostic&lt;BR /&gt;subscribe-to-alert-group environment&lt;BR /&gt;subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:da62513220919118a3de2b93261af7c7&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:05:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/able-to-ping-through-asa-but-no-tcp-traffic/m-p/3082701#M145634</guid>
      <dc:creator>Aaron.Pittenger</dc:creator>
      <dc:date>2019-03-12T09:05:55Z</dc:date>
    </item>
    <item>
      <title>You have asymmetric routing.</title>
      <link>https://community.cisco.com/t5/network-security/able-to-ping-through-asa-but-no-tcp-traffic/m-p/3082702#M145635</link>
      <description>&lt;P&gt;You have asymmetric routing. That's not an issue for ping as icmp is stateless. However rdp uses tcp and requires a 3-way handshake to establish a connection.&lt;/P&gt;
&lt;P&gt;Your incoming traffic from PC2 will hit the static route on the core switch and go into the ASA via VLAN 15.&lt;/P&gt;
&lt;P&gt;The return traffic will see that the ASA has a direct connection to VLAN 500 (192.168.50.0/24) via the trunk into Eth0/0 and the VLAN interface that you have defined. A direct connection installs a conected route (administrative distance = 0) in the ASA's routing table and thus VLAN 500 be selected as the path for the egress traffic.&lt;/P&gt;
&lt;P&gt;However, the stateful firewall is waiting for the 3-way handshake to complete via return traffic going out the same interface that it arrived on (VLAN 15). If you shutdown the VLAN 500 interface, the situation will be remedied and that flow should work for you.&lt;/P&gt;
&lt;P&gt;Alternatively, you could make the ASA's VLAN 500 interfaces the default gateway for hosts on that subnet (but that would probably break other internal communications between your VLANs unless you removed the inbound ACLs and added "same-security-traffic permit inter-interface").&lt;/P&gt;</description>
      <pubDate>Tue, 21 Mar 2017 07:48:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/able-to-ping-through-asa-but-no-tcp-traffic/m-p/3082702#M145635</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-03-21T07:48:00Z</dc:date>
    </item>
    <item>
      <title>Marvin,</title>
      <link>https://community.cisco.com/t5/network-security/able-to-ping-through-asa-but-no-tcp-traffic/m-p/3082703#M145636</link>
      <description>&lt;P&gt;Marvin,&lt;/P&gt;
&lt;P&gt;Thanks so much for the reply (I have read many of your replies on the forum and you are always super helpful.)&lt;/P&gt;
&lt;P&gt;I deleted those interfaces and have changed the port mode from trunk to access on the ASA (and assigned it as access VLAN 15). &amp;nbsp;I did the same for the other end of the connection, on the inside L3 switch. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;I assumed that I would need to add a static route to the ASA in order for the 10.11.1.0 traffic to 'know' where to go (via VLAN 15.) &amp;nbsp;I first created a static route for Interface: DMZ, routing 192.168.50.0 to a gateway of 192.168.15.220. &amp;nbsp;This didn't work, even for icmp ping - however, when I changed the interface to my Inside VLAN 15, icmp began working again.&lt;/P&gt;
&lt;P&gt;So question 1) Why am I having to make this route for the inside interface instead of the DMZ? &amp;nbsp;Am I thinking about something backwards?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Question 2) &amp;nbsp;I am still not able to use any TCP protocols, just ICMP. &amp;nbsp;Did I miss something that I should have done along with the above changes?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for the help,&lt;/P&gt;
&lt;P&gt;Aaron&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Mar 2017 14:42:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/able-to-ping-through-asa-but-no-tcp-traffic/m-p/3082703#M145636</guid>
      <dc:creator>Aaron.Pittenger</dc:creator>
      <dc:date>2017-03-21T14:42:19Z</dc:date>
    </item>
    <item>
      <title>Update:</title>
      <link>https://community.cisco.com/t5/network-security/able-to-ping-through-asa-but-no-tcp-traffic/m-p/3082704#M145637</link>
      <description>&lt;P&gt;Update:&lt;/P&gt;
&lt;P&gt;Marvin,&lt;/P&gt;
&lt;P&gt;It seems I have answered my own question #2. &amp;nbsp;(Still a bit confused on #1). &amp;nbsp;For some reason RDP was trying to initiate the connection from a random port (not sure why.) &amp;nbsp;When I tried ssh through it was successful. &amp;nbsp;So, in short, the routing changes you proposed definitely fixed the problem and now I just need to sort out why RDP is being funny.&lt;/P&gt;
&lt;P&gt;Thank you for the help, it is much appreciated!&lt;/P&gt;
&lt;P&gt;Aaron&lt;/P&gt;</description>
      <pubDate>Tue, 21 Mar 2017 16:03:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/able-to-ping-through-asa-but-no-tcp-traffic/m-p/3082704#M145637</guid>
      <dc:creator>Aaron.Pittenger</dc:creator>
      <dc:date>2017-03-21T16:03:54Z</dc:date>
    </item>
    <item>
      <title>You're welcome Aaron.</title>
      <link>https://community.cisco.com/t5/network-security/able-to-ping-through-asa-but-no-tcp-traffic/m-p/3082705#M145638</link>
      <description>&lt;P&gt;You're welcome Aaron.&lt;/P&gt;
&lt;P&gt;ASA routes are egress routes. That's why the route statement needs to specifiy the InsideVLAN15 interface.&lt;/P&gt;
&lt;P&gt;Since you've made a few changes, it would be a good time to test the logic of your flow with packet-tracer. Try running this command:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;packet-tracer input DMZ tcp&amp;nbsp;&lt;SPAN&gt;10.11.1.10 1025&amp;nbsp;192.168.50.14 3389&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN&gt;..and please share the resultant output.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Mar 2017 16:03:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/able-to-ping-through-asa-but-no-tcp-traffic/m-p/3082705#M145638</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-03-21T16:03:59Z</dc:date>
    </item>
    <item>
      <title>Glad to see the update.</title>
      <link>https://community.cisco.com/t5/network-security/able-to-ping-through-asa-but-no-tcp-traffic/m-p/3082706#M145639</link>
      <description>&lt;P&gt;Glad to see the update.&lt;/P&gt;
&lt;P&gt;TCP connections and UDP flows work that way - they use ephemeral ports as the source (i.e. something &amp;gt;1024 for most Windows PCs) and the destination port is the well-known port for the protocol.&lt;/P&gt;
&lt;P&gt;https://en.wikipedia.org/wiki/Ephemeral_port&lt;/P&gt;</description>
      <pubDate>Tue, 21 Mar 2017 16:10:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/able-to-ping-through-asa-but-no-tcp-traffic/m-p/3082706#M145639</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-03-21T16:10:36Z</dc:date>
    </item>
    <item>
      <title>Marvin,</title>
      <link>https://community.cisco.com/t5/network-security/able-to-ping-through-asa-but-no-tcp-traffic/m-p/3082707#M145640</link>
      <description>&lt;P&gt;Marvin,&lt;/P&gt;
&lt;P&gt;I guess I never knew that! &amp;nbsp;Learn something new every day. &amp;nbsp;What's the typical methodology for dealing with that then? &amp;nbsp;I really don't want to leave all those ports open between my DMZ and my inside - is there a workaround, or do most people just open all of those?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Aaron&lt;/P&gt;</description>
      <pubDate>Tue, 21 Mar 2017 16:15:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/able-to-ping-through-asa-but-no-tcp-traffic/m-p/3082707#M145640</guid>
      <dc:creator>Aaron.Pittenger</dc:creator>
      <dc:date>2017-03-21T16:15:10Z</dc:date>
    </item>
    <item>
      <title>A stateful firewall (such as</title>
      <link>https://community.cisco.com/t5/network-security/able-to-ping-through-asa-but-no-tcp-traffic/m-p/3082708#M145641</link>
      <description>&lt;P&gt;A stateful firewall (such as the ASA) uses a 5-tuple in the ACL. (not including newer things like SGTs). The protocol, source and destination addresses and ports are part of a given access control list entry.&lt;/P&gt;
&lt;P&gt;If you allow the lower security DMZ hosts to initiate RDP to the higher security Inside hosts, that's generally all you need.&amp;nbsp;The return traffic is allowed automatically as it is then part of an allowed and established TCP connection (i.e. it has "state"). It bypasses any input ACL on the inside interface since the first thing checked (even before the interface ACL or security level) is whether or not there's an existing connection.&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113396-asa-packet-flow-00.html&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Mar 2017 16:29:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/able-to-ping-through-asa-but-no-tcp-traffic/m-p/3082708#M145641</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-03-21T16:29:45Z</dc:date>
    </item>
    <item>
      <title>Marvin,Thank you for sticking</title>
      <link>https://community.cisco.com/t5/network-security/able-to-ping-through-asa-but-no-tcp-traffic/m-p/3082709#M145642</link>
      <description>&lt;P&gt;Marvin,&lt;BR /&gt;Thank you for sticking with me here - I'm learning.&lt;/P&gt;
&lt;P&gt;I think I understand what you are saying - I actually did intended to tighten up the ACL once I got things working. &amp;nbsp;So right now, here's a screenshot of what I've got.&lt;/P&gt;
&lt;P&gt;When you say I should '&lt;SPAN&gt;allow the lower security DMZ hosts to initiate RDP to the higher security Inside hosts' what exactly do you mean? &amp;nbsp;How do I allow that through without allowing giant range of ports (since I don't know exactly which port on which it will initiate RDP.) &amp;nbsp;I've allowed 3389 but, since RDP is using an ephemeral port to initiate the connection, it is getting dropped.) &amp;nbsp;It seems in the example link you posted, a similar thing is happening, but I'm not following how they are making it work.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Thank you again,&lt;/P&gt;
&lt;P&gt;Aaron&lt;/P&gt;</description>
      <pubDate>Tue, 21 Mar 2017 17:02:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/able-to-ping-through-asa-but-no-tcp-traffic/m-p/3082709#M145642</guid>
      <dc:creator>Aaron.Pittenger</dc:creator>
      <dc:date>2017-03-21T17:02:10Z</dc:date>
    </item>
    <item>
      <title>The ACL in your screenshot</title>
      <link>https://community.cisco.com/t5/network-security/able-to-ping-through-asa-but-no-tcp-traffic/m-p/3082710#M145643</link>
      <description>&lt;P&gt;The ACL in your screenshot appears correct. There's a areason why Service only appears once in the ACL - the destination port is the service and the source port will vary or each separate flow. That's the nature of TCP/IP.&lt;/P&gt;
&lt;P&gt;Your DMZ is security-level 50. InsideVLAN15 is security-level 100. You can only initiate communications from a lower security level (50) to a higher (100) when explicitly allowed by an ACL. When initiating from higher to lower, it is allowed by defualt - UNLESS there is any kind of ACL in which case you then need to explicitly define what is allowed.&lt;/P&gt;
&lt;P&gt;When in doubt about your logic or if/why an ASA is dropping a certain flow, use the packet-tracer command (or graphical version in ASDM). If will walk you through the ASA logic step-by-step and give the exact disposition of a given flow.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Mar 2017 02:44:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/able-to-ping-through-asa-but-no-tcp-traffic/m-p/3082710#M145643</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-03-22T02:44:34Z</dc:date>
    </item>
  </channel>
</rss>

