<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi ,  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-hair-pinning-and-external-smtp-to-internal-not-working/m-p/2986541#M148981</link>
    <description>&lt;P&gt;Hi ,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;can you check below .&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Following point you have to check .&lt;/P&gt;
&lt;P&gt;01. Identity NAT . ( Inside nw to VPN Nw)&lt;/P&gt;
&lt;P&gt;02.Dynamic NAT ( VPN nw to outside interface)&lt;/P&gt;
&lt;P&gt;03.option 1 - static NAT for smtp server ( static NAT)&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; option 2 - Dynamic NAT with PAT for smtp server ( outside interface with service smtp port policy defined or Any IP address )&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 27 Oct 2016 06:32:20 GMT</pubDate>
    <dc:creator>MANI .P</dc:creator>
    <dc:date>2016-10-27T06:32:20Z</dc:date>
    <item>
      <title>VPN Hair-pinning and External SMTP to internal not working</title>
      <link>https://community.cisco.com/t5/network-security/vpn-hair-pinning-and-external-smtp-to-internal-not-working/m-p/2986540#M148979</link>
      <description>&lt;P&gt;I have been beating my head against the wall for the last four days trying to figure out why my VPN clients cannot access the Internet when connected AND why my internal SMTP server cannot receive outside traffic. I have replaced an ASA 5510 with an ASA 5512 which was doing these things without issue. I'm hoping someone will see what I've missed and can help me out before I rip out what's left of my hair. The only major differences between ASAs are&lt;/P&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;ASA 5510&amp;nbsp;(working)&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;ASA 5512-X&amp;nbsp;(not working)&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;SW V 8.4(7)&lt;/TD&gt;
&lt;TD&gt;SW V 9.4(3)11&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;AnyConnect Essentials&lt;/TD&gt;
&lt;TD&gt;APEX Licenses&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;No additional modules/hardware&lt;/TD&gt;
&lt;TD&gt;FirePOWER Service Module&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I've run the packet-tracer for my SMTP issue and it claims traffic will get through, but when I monitor both sides of the new ASA I see the connection try to come in from the outside but there is&amp;nbsp;nothing on the inside.&lt;/P&gt;
&lt;P&gt;ASA Version 9.4(3)11&lt;BR /&gt;!&lt;BR /&gt;hostname asa5512&lt;BR /&gt;domain-name dmz.***.***&lt;BR /&gt;enable password *** encrypted&lt;BR /&gt;names&lt;BR /&gt;ip local pool ASA_VPN_Pool 10.1.101.2-10.1.101.62 mask 255.255.255.192&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt; nameif Outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address PublicAddress&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt; nameif Inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.11 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; management-only&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa943-11-smp-k8.bin&lt;BR /&gt;boot system disk0:/asa943-8-smp-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup Inside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; name-server 10.1.8.20&lt;BR /&gt; name-server 10.1.8.30&lt;BR /&gt; domain-name dmz.***.***&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network Admin&lt;BR /&gt; subnet 10.1.0.0 255.255.255.0&lt;BR /&gt; description Administration workstations network&lt;BR /&gt;object network Clients_Wired&lt;BR /&gt; subnet 10.1.60.0 255.255.254.0&lt;BR /&gt; description Wired Local Site Clients&lt;BR /&gt;object network Clients_Wireless&lt;BR /&gt; subnet 10.1.100.0 255.255.255.0&lt;BR /&gt; description Legacy Wireless Clients&lt;BR /&gt;object network Servers&lt;BR /&gt; subnet 10.1.8.0 255.255.252.0&lt;BR /&gt; description Server Infrastructure&lt;BR /&gt;object network Phones&lt;BR /&gt; subnet 10.1.2.0 255.255.255.0&lt;BR /&gt; description VoIP Phones&lt;BR /&gt;object network Clients_Partner_Org&lt;BR /&gt; subnet 10.1.200.0 255.255.255.0&lt;BR /&gt; description Partner Organization Clients&lt;BR /&gt;object network smtp_incoming&lt;BR /&gt; host 10.1.1.105&lt;BR /&gt; description Incomming SMTP Server&lt;BR /&gt;object network Sandboxes&lt;BR /&gt; range 192.168.198.11 192.168.198.19&lt;BR /&gt; description Virtual Routers for Sandboxed environments&lt;BR /&gt;object network DNS1&lt;BR /&gt; host 10.1.8.10&lt;BR /&gt; description DNS Filter 1&lt;BR /&gt;object network DNS2&lt;BR /&gt; host 10.1.8.15&lt;BR /&gt; description DNS Filter 2&lt;BR /&gt;object network DNS3&lt;BR /&gt; host 192.168.1.55&lt;BR /&gt; description Emergency DNS Access&lt;BR /&gt;object network VPN_Junos&lt;BR /&gt; subnet 10.1.101.64 255.255.255.192&lt;BR /&gt; description Junos Provided VPN connections&lt;BR /&gt;object network DMZ&lt;BR /&gt; subnet 192.168.1.0 255.255.255.0&lt;BR /&gt; description Local Site DMZ&lt;BR /&gt;object network smtp_outgoing&lt;BR /&gt; host 10.1.11.106&lt;BR /&gt;object network VoIP_Provider&lt;BR /&gt; subnet AnotherPublicAddress 255.255.248.0&lt;BR /&gt; description Commercial VoIP Provider&lt;BR /&gt;object network VPN_Cisco_Anyconnect&lt;BR /&gt; subnet 10.1.101.0 255.255.255.192&lt;BR /&gt;object network Backup_Site&lt;BR /&gt; subnet 10.2.0.0 255.255.255.0&lt;BR /&gt; description Offsite DR-COOP location&lt;BR /&gt;object service ExternalSMTP&lt;BR /&gt; service tcp destination eq smtp&lt;BR /&gt; description Outside SMTP&lt;BR /&gt;object network NAS_SAN&lt;BR /&gt; subnet 10.1.12.0 255.255.252.0&lt;BR /&gt; description Local Site NAS and SAN network&lt;BR /&gt;object network VPN_Old_ASA&lt;BR /&gt; subnet 10.1.101.128 255.255.255.192&lt;BR /&gt; description Old Cisco ASA's AnyConnect IP Pool&lt;BR /&gt;object-group network Authorized_DNS&lt;BR /&gt; description Hosts permitted to do DNS queries from the Local Site&lt;BR /&gt; network-object object DNS1&lt;BR /&gt; network-object object DNS2&lt;BR /&gt; network-object object DNS3&lt;BR /&gt;object-group network Authorized_Internet&lt;BR /&gt; description Network IP Addresses authorized Internet access&lt;BR /&gt; network-object object Admin&lt;BR /&gt; network-object object Clients_Partner_Org&lt;BR /&gt; network-object object Clients_Wired&lt;BR /&gt; network-object object Clients_Wireless&lt;BR /&gt; network-object object Phones&lt;BR /&gt; network-object object Sandboxes&lt;BR /&gt; network-object object VPN_Junos&lt;BR /&gt; network-object object VPN_Cisco_Anyconnect&lt;BR /&gt; network-object object DMZ&lt;BR /&gt; network-object object Servers&lt;BR /&gt;object-group icmp-type DM_INLINE_ICMP_1&lt;BR /&gt; icmp-object echo-reply&lt;BR /&gt; icmp-object time-exceeded&lt;BR /&gt; icmp-object unreachable&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt; service-object icmp echo&lt;BR /&gt; service-object icmp echo-reply&lt;BR /&gt; service-object icmp unreachable&lt;BR /&gt; service-object tcp-udp destination eq sip&lt;BR /&gt; service-object tcp destination eq ftp&lt;BR /&gt; service-object tcp destination eq ftp-data&lt;BR /&gt; service-object tcp destination eq www&lt;BR /&gt; service-object tcp destination eq https&lt;BR /&gt; service-object udp destination eq ntp&lt;BR /&gt;object-group service Extended-SMTP tcp&lt;BR /&gt; description Both published SMTP ports&lt;BR /&gt; port-object eq 587&lt;BR /&gt; port-object eq smtp&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;object-group service VoIP-UDP-Services udp&lt;BR /&gt; description UDP ports for VoIP traffic&lt;BR /&gt; port-object range 8192 65535&lt;BR /&gt;access-list SFR extended permit ip any any&lt;BR /&gt;access-list Inside_access_in extended deny ip host 192.168.3.3 any log disable&lt;BR /&gt;access-list Inside_access_in extended deny ip host 10.1.8.100 interface Inside log disable&lt;BR /&gt;access-list Inside_access_in remark Permit SMTP out of SMTP-outgoing.&lt;BR /&gt;access-list Inside_access_in extended permit tcp object smtp_incoming any eq smtp log critical&lt;BR /&gt;access-list Inside_access_in remark Permit SMTP into SMTP-incoming&lt;BR /&gt;access-list Inside_access_in extended permit tcp object smtp_outgoing any object-group Extended-SMTP log disable&lt;BR /&gt;access-list Inside_access_in remark Permit authorized DNS servers to receive queries&lt;BR /&gt;access-list Inside_access_in extended permit object-group TCPUDP object-group Authorized_DNS any eq domain log disable&lt;BR /&gt;access-list Inside_access_in remark Permit VoIP network access to VoIP provider's networks and protocols&lt;BR /&gt;access-list Inside_access_in extended permit object-group DM_INLINE_SERVICE_1 object Phones object VoIP_Provider log disable&lt;BR /&gt;access-list Inside_access_in remark Additonal UDP port ranges permitted for VoIP phones&lt;BR /&gt;access-list Inside_access_in extended permit udp object Phones object VoIP_Provider object-group VoIP-UDP-Services log disable&lt;BR /&gt;access-list Inside_access_in remark VoIP phones pull NTP data from multiple points on the Internet&lt;BR /&gt;access-list Inside_access_in extended permit udp object Phones any eq ntp log disable&lt;BR /&gt;access-list Inside_access_in remark Restrict VoIP phones to VoIP provider's network and services and NTP only.&lt;BR /&gt;access-list Inside_access_in extended deny ip object Phones any&lt;BR /&gt;access-list Inside_access_in remark Restrict DNS to authorized DNS hosts only.&lt;BR /&gt;access-list Inside_access_in extended deny object-group TCPUDP any any eq domain&lt;BR /&gt;access-list Inside_access_in remark Restrict SMTP to SMTP relay servers&lt;BR /&gt;access-list Inside_access_in extended deny tcp any any object-group Extended-SMTP log critical&lt;BR /&gt;access-list Inside_access_in remark Permit authorized IP addresses to access the Internet&lt;BR /&gt;access-list Inside_access_in extended permit ip object-group Authorized_Internet any log disable&lt;BR /&gt;access-list Inside_access_in extended permit ip object NAS_SAN object Backup_Site log disable&lt;BR /&gt;access-list Inside_access_in remark Block all non-authorized IP addresses.&lt;BR /&gt;access-list Inside_access_in extended deny ip any any log critical&lt;BR /&gt;access-list Outside_access_in remark Permit incoming SMTP traffic to the appropriate host&lt;BR /&gt;access-list Outside_access_in extended permit tcp any object smtp_incoming eq smtp log notifications&lt;BR /&gt;access-list Outside_access_in remark Permit ping and traceroute to traverse the system&lt;BR /&gt;access-list Outside_access_in extended permit icmp any any object-group DM_INLINE_ICMP_1 log disable&lt;BR /&gt;access-list Inside_cryptomap_1 extended permit ip object Servers object Backup_Site&lt;BR /&gt;access-list Outside_cryptomap extended permit ip object Servers object Backup_Site&lt;BR /&gt;access-list Servers extended permit ip any object Servers&lt;BR /&gt;access-list Outside_cryptomap_65535.65535 extended permit ip any any&lt;BR /&gt;access-list Outside_cryptomap_65535.65535_1 extended permit ip any any&lt;BR /&gt;access-list Inside_cryptomap_65535.65535 extended permit ip any any&lt;BR /&gt;access-list Outside_cryptomap_65535.65535_2 extended permit ip any any&lt;BR /&gt;access-list Outside_cryptomap_65535.65535_3 extended permit ip any any&lt;BR /&gt;access-list Inside_cryptomap_65535.65535_1 extended permit ip any any&lt;BR /&gt;access-list global_mpc extended permit icmp any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging console emergencies&lt;BR /&gt;logging monitor notifications&lt;BR /&gt;...&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (Inside,Outside) source static any any destination static VPN_Cisco_Anyconnect VPN_Cisco_Anyconnect no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network Admin&lt;BR /&gt; nat (Inside,Outside) dynamic interface&lt;BR /&gt;object network Clients_Wired&lt;BR /&gt; nat (Inside,Outside) dynamic interface&lt;BR /&gt;object network Clients_Wireless&lt;BR /&gt; nat (Inside,Outside) dynamic interface&lt;BR /&gt;object network Servers&lt;BR /&gt; nat (Inside,Outside) dynamic interface&lt;BR /&gt;object network Phones&lt;BR /&gt; nat (Inside,Outside) dynamic interface&lt;BR /&gt;object network Clients_Partner_Org&lt;BR /&gt; nat (Inside,Outside) dynamic interface&lt;BR /&gt;object network smtp_incoming&lt;BR /&gt; nat (Inside,Outside) static interface service tcp smtp smtp&lt;BR /&gt;object network Sandboxes&lt;BR /&gt; nat (Inside,Outside) dynamic interface&lt;BR /&gt;object network VPN_Junos&lt;BR /&gt; nat (Inside,Outside) dynamic interface&lt;BR /&gt;object network DMZ&lt;BR /&gt; nat (Inside,Outside) dynamic interface&lt;BR /&gt;object network VPN_Cisco_Anyconnect&lt;BR /&gt; nat (Outside,Outside) dynamic interface&lt;BR /&gt;object network VPN_Old_ASA&lt;BR /&gt; nat (Inside,Outside) dynamic interface&lt;BR /&gt;!&lt;BR /&gt;nat (Outside,Outside) after-auto source dynamic any interface&lt;BR /&gt;nat (Inside,Outside) after-auto source static any any no-proxy-arp&lt;BR /&gt;access-group Outside_access_in in interface Outside&lt;BR /&gt;access-group Inside_access_in in interface Inside&lt;BR /&gt;route Outside 0.0.0.0 0.0.0.0 66.83.238.177 1&lt;BR /&gt;route Inside 10.1.0.0 255.255.0.0 192.168.1.10 1&lt;BR /&gt;route Inside 10.1.101.64 255.255.255.192 192.168.1.3 1&lt;BR /&gt;route Inside 10.1.101.128 255.255.255.192 192.168.1.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;...&lt;BR /&gt;!&lt;BR /&gt;class-map SFR&lt;BR /&gt; match access-list SFR&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map&lt;BR /&gt; inspect ftp&lt;BR /&gt; inspect h323 h225&lt;BR /&gt; inspect h323 ras&lt;BR /&gt; inspect icmp&lt;BR /&gt; inspect ip-options&lt;BR /&gt; class SFR&lt;BR /&gt; sfr fail-open&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;...&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:26:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-hair-pinning-and-external-smtp-to-internal-not-working/m-p/2986540#M148979</guid>
      <dc:creator>Chris R</dc:creator>
      <dc:date>2019-03-12T08:26:54Z</dc:date>
    </item>
    <item>
      <title>Hi , </title>
      <link>https://community.cisco.com/t5/network-security/vpn-hair-pinning-and-external-smtp-to-internal-not-working/m-p/2986541#M148981</link>
      <description>&lt;P&gt;Hi ,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;can you check below .&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Following point you have to check .&lt;/P&gt;
&lt;P&gt;01. Identity NAT . ( Inside nw to VPN Nw)&lt;/P&gt;
&lt;P&gt;02.Dynamic NAT ( VPN nw to outside interface)&lt;/P&gt;
&lt;P&gt;03.option 1 - static NAT for smtp server ( static NAT)&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; option 2 - Dynamic NAT with PAT for smtp server ( outside interface with service smtp port policy defined or Any IP address )&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Oct 2016 06:32:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-hair-pinning-and-external-smtp-to-internal-not-working/m-p/2986541#M148981</guid>
      <dc:creator>MANI .P</dc:creator>
      <dc:date>2016-10-27T06:32:20Z</dc:date>
    </item>
    <item>
      <title>Thanks. As it turns out, I</title>
      <link>https://community.cisco.com/t5/network-security/vpn-hair-pinning-and-external-smtp-to-internal-not-working/m-p/2986542#M148983</link>
      <description>&lt;P&gt;Thanks. As it turns out, I had the wrong IP address for my smtp_incoming network object. The ASA was trying to forward it to an unused IP address and I never caught it on my tcpdump scans because THAT filter was looking for only dst 10.1.11.105 dst port 25.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I had tried Option 2, but the network object was wrong.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Now to get the VPN hair-pinning ironed out (I'll open a new discussion in the VPN group for that).&lt;/P&gt;</description>
      <pubDate>Thu, 27 Oct 2016 21:01:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-hair-pinning-and-external-smtp-to-internal-not-working/m-p/2986542#M148983</guid>
      <dc:creator>Chris R</dc:creator>
      <dc:date>2016-10-27T21:01:26Z</dc:date>
    </item>
  </channel>
</rss>

