<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I know.....These are fun and in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/very-odd-issue-need-help/m-p/2771762#M171360</link>
    <description>&lt;P&gt;I know.....These are fun and frustrating all at the same time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I could post the config later but I don't think it would help very much because it is pretty much and default route and the config I posted, very basic. And it is working for everyone else but just this one customer and possibly a couple others but 50 to 100 others work just fine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;</description>
    <pubDate>Wed, 21 Oct 2015 13:39:43 GMT</pubDate>
    <dc:creator>burleyman</dc:creator>
    <dc:date>2015-10-21T13:39:43Z</dc:date>
    <item>
      <title>Very odd issue...need help</title>
      <link>https://community.cisco.com/t5/network-security/very-odd-issue-need-help/m-p/2771754#M171329</link>
      <description>&lt;P&gt;I have an ASA that is running 9.1(1)&lt;/P&gt;&lt;P&gt;I have customers that use an application that goes to my outside IP address using TCP port 15678 and redirects it to a server in the DMZ with an IP address of 10.2.1.22.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the configuration for that to happen.&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 128.1.1.2 255.255.255.248&lt;BR /&gt;&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp;description connection to DMZ interface&lt;BR /&gt;&amp;nbsp;nameif DMZ&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 10.2.1.254 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network OBJ-10.2.1.22_32&lt;BR /&gt;&amp;nbsp;host 10.2.1.22&lt;/P&gt;&lt;P&gt;object service OBJ-TCP-15678&lt;BR /&gt;&amp;nbsp;service tcp source eq 15678&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any4 object OBJ-10.2.1.22_32 eq 15678&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) source static OBJ-10.2.1.22_32 interface service OBJ-TCP-15678 OBJ-TCP-15678&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 128.1.1.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now the very odd issue.&lt;/P&gt;&lt;P&gt;all customers that have this setup are running with no issues except one.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;They are coming from an IP address of 50.50.50.54 and they do not get connected to the server on the DMZ and here is what I see in the logs.&lt;/P&gt;&lt;P&gt;6|Oct 20 2015|10:21:32|106015|10.2.1.22|15678|50.50.50.54|61991|Deny TCP (no connection) from 10.2.1.22/15678 to 50.50.50.54/61991 flags SYN ACK&amp;nbsp; on interface inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why does it say "SYN ACK on interface inside"? and not DMZ? I think this is where the issue lies but I don't know what is causing it. What should I be looking at?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:46:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/very-odd-issue-need-help/m-p/2771754#M171329</guid>
      <dc:creator>burleyman</dc:creator>
      <dc:date>2019-03-12T06:46:37Z</dc:date>
    </item>
    <item>
      <title>MikeWhat does the routing</title>
      <link>https://community.cisco.com/t5/network-security/very-odd-issue-need-help/m-p/2771755#M171333</link>
      <description>&lt;P&gt;Mike&lt;/P&gt;&lt;P&gt;What does the routing table look like ?&lt;/P&gt;&lt;P&gt;What does a packet tracer show ie. -&lt;/P&gt;&lt;P&gt;"packet-tracer input outside tcp 50.50.50.54 12345 &amp;lt;public IP of server&amp;gt; 15678"&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Tue, 20 Oct 2015 19:27:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/very-odd-issue-need-help/m-p/2771755#M171333</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-10-20T19:27:13Z</dc:date>
    </item>
    <item>
      <title>ASA# show routeCodes: C -</title>
      <link>https://community.cisco.com/t5/network-security/very-odd-issue-need-help/m-p/2771756#M171341</link>
      <description>&lt;P&gt;ASA# show route&lt;/P&gt;&lt;P&gt;Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - candidate default, U - per-user static route, o - ODR&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; P - periodic downloaded static route&lt;/P&gt;&lt;P&gt;Gateway of last resort is 128.1.1.1 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.16.1.0 255.255.255.0 is directly connected, inside&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 60.60.60.0 255.255.255.252 is directly connected, backup&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 128.1.1.0 255.255.255.248 is directly connected, outside&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.2.1.0 255.255.255.0 is directly connected, DMZ&lt;BR /&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.2.2.0 255.255.255.0 [1/0] via 128.1.1.1, outside&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [1/0] via 60.60.60.1, outside&lt;BR /&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.169.3.0 255.255.255.0 [1/0] via 128.1.1.1, outside&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [1/0] via 60.60.60.1, outside&lt;BR /&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.2.0 255.255.255.0 [1/0] via 128.1.1.1, outside&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [1/0] via 60.60.60.1, outside&lt;BR /&gt;S*&amp;nbsp;&amp;nbsp; 0.0.0.0 0.0.0.0 [1/0] via 128.1.1.1, outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA# packet-tracer input outside tcp 50.50.50.54 12345 10.2.1.22 15678&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 10.2.1.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; DMZ&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-list outside_access_in extended permit tcp any4 object OBJ-10.2.1.22_32 eq 15678&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;nat (DMZ,outside) source static OBJ-10.2.1.22_32 interface service OBJ-TCP-15678 OBJ-TCP-15678&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: DMZ&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not sure why the drop.....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;</description>
      <pubDate>Tue, 20 Oct 2015 19:41:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/very-odd-issue-need-help/m-p/2771756#M171341</guid>
      <dc:creator>burleyman</dc:creator>
      <dc:date>2015-10-20T19:41:41Z</dc:date>
    </item>
    <item>
      <title>The drop is because you used</title>
      <link>https://community.cisco.com/t5/network-security/very-odd-issue-need-help/m-p/2771757#M171345</link>
      <description>&lt;P&gt;The drop is because you used the private IP of the server and not the public IP.&lt;/P&gt;&lt;P&gt;However I should have asked for it the other way round.&lt;/P&gt;&lt;P&gt;Can you run this -&lt;/P&gt;&lt;P&gt;"packet-tracer input DMZ tcp 10.1.2.22 15678 50.50.50.54 12345"&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Oct 2015 20:24:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/very-odd-issue-need-help/m-p/2771757#M171345</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-10-20T20:24:44Z</dc:date>
    </item>
    <item>
      <title>ASA# packet-tracer input DMZ</title>
      <link>https://community.cisco.com/t5/network-security/very-odd-issue-need-help/m-p/2771758#M171351</link>
      <description>&lt;P&gt;ASA# packet-tracer input DMZ tcp 10.1.2.22 15678 50.50.50.54 12345&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group DMZ_access_in in interface DMZ&lt;BR /&gt;access-list DMZ_access_in extended permit ip any any&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 5144622, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: DMZ&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I do the command show conn here is what I get for a site that works and one for the site that does not.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Works&lt;/P&gt;&lt;P&gt;TCP outside&amp;nbsp; 75.75.75.225:1054 DMZ&amp;nbsp; 10.2.1.22:15678, idle 0:00:00, bytes 766, flags UIOB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does not work&lt;/P&gt;&lt;P&gt;TCP outside&amp;nbsp; 50.50.50.54:61525 DMZ&amp;nbsp; 10.2.1.22:15678, idle 0:00:01, bytes 0, flags SaAB&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Oct 2015 20:41:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/very-odd-issue-need-help/m-p/2771758#M171351</guid>
      <dc:creator>burleyman</dc:creator>
      <dc:date>2015-10-20T20:41:24Z</dc:date>
    </item>
    <item>
      <title>MikeThe packet tracer output</title>
      <link>https://community.cisco.com/t5/network-security/very-odd-issue-need-help/m-p/2771759#M171354</link>
      <description>&lt;P&gt;Mike&lt;/P&gt;&lt;P&gt;The packet tracer output looks okay.&lt;/P&gt;&lt;P&gt;The "sh conn" output ties up with your logs ie. the flags for the connection that doesn't work indicates a SYN packet has been received by the server but obviously if the SYN ACK is going to the inside interface then the remote device doesn't receive it and so never sends the ACK.&lt;/P&gt;&lt;P&gt;So something in your configuration must be sending that traffic to the inside but it isn't your route table as far as I can see.&lt;/P&gt;&lt;P&gt;Sorry to be a pain but can you run the original packet tracer again but this time use the public IP of the server.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Tue, 20 Oct 2015 20:50:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/very-odd-issue-need-help/m-p/2771759#M171354</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-10-20T20:50:41Z</dc:date>
    </item>
    <item>
      <title>No bother and thank you for</title>
      <link>https://community.cisco.com/t5/network-security/very-odd-issue-need-help/m-p/2771760#M171356</link>
      <description>&lt;P&gt;No bother and thank you for your help. I went over the config again and nothing that should send the traffic to the inside interface. In fact this is pretty much the only rule in the ASA. It is only there to do pretty much this one thing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA# packet-tracer input DMZ tcp 128.1.1.2 15678 50.50.50.54 12345&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group DMZ_access_in in interface DMZ&lt;BR /&gt;access-list DMZ_access_in extended permit ip any any&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 5180851, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: DMZ&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Oct 2015 12:29:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/very-odd-issue-need-help/m-p/2771760#M171356</guid>
      <dc:creator>burleyman</dc:creator>
      <dc:date>2015-10-21T12:29:18Z</dc:date>
    </item>
    <item>
      <title>MikeTo say it is odd is an</title>
      <link>https://community.cisco.com/t5/network-security/very-odd-issue-need-help/m-p/2771761#M171358</link>
      <description>&lt;P&gt;Mike&lt;/P&gt;&lt;P&gt;To say it is odd is an understatement &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I can't see why it would send that traffic to the inside interface.&lt;/P&gt;&lt;P&gt;I am happy to provide a second pair of eyes on the configuration if you want to post it but you know what you are doing so I doubt I will spot anything.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Wed, 21 Oct 2015 12:43:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/very-odd-issue-need-help/m-p/2771761#M171358</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-10-21T12:43:53Z</dc:date>
    </item>
    <item>
      <title>I know.....These are fun and</title>
      <link>https://community.cisco.com/t5/network-security/very-odd-issue-need-help/m-p/2771762#M171360</link>
      <description>&lt;P&gt;I know.....These are fun and frustrating all at the same time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I could post the config later but I don't think it would help very much because it is pretty much and default route and the config I posted, very basic. And it is working for everyone else but just this one customer and possibly a couple others but 50 to 100 others work just fine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;</description>
      <pubDate>Wed, 21 Oct 2015 13:39:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/very-odd-issue-need-help/m-p/2771762#M171360</guid>
      <dc:creator>burleyman</dc:creator>
      <dc:date>2015-10-21T13:39:43Z</dc:date>
    </item>
    <item>
      <title>Hi Mike, From the syslogs it</title>
      <link>https://community.cisco.com/t5/network-security/very-odd-issue-need-help/m-p/2771763#M171361</link>
      <description>&lt;P&gt;Hi Mike,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From the syslogs it looks like the SYN ACK is coming on the inside interface.&lt;/P&gt;&lt;P&gt;It is possible that you have some routing issue in your internal network due to which the reply traffic is coming to the inside interface.&lt;/P&gt;&lt;P&gt;Can you try to do traceroute from internal machine with IP&amp;nbsp;&lt;SPAN style="font-size: 14.4px; line-height: normal;"&gt;10.2.1.22 for any public IP and see how traffic flows.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.4px; line-height: normal;"&gt;Do share your findings.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.4px; line-height: normal;"&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.4px; line-height: normal;"&gt;R.Seth&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Oct 2015 09:17:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/very-odd-issue-need-help/m-p/2771763#M171361</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-10-22T09:17:28Z</dc:date>
    </item>
    <item>
      <title>A reboot of the server</title>
      <link>https://community.cisco.com/t5/network-security/very-odd-issue-need-help/m-p/2771764#M171364</link>
      <description>&lt;P&gt;A reboot of the server resolved the issue. I believe the DMZ server was for some reason send that traffic inside. I think it was the application and the transactions it does got messed up and routed the traffic for only a few transactions&amp;nbsp; to the inside.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you everyone for your help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;</description>
      <pubDate>Fri, 23 Oct 2015 11:57:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/very-odd-issue-need-help/m-p/2771764#M171364</guid>
      <dc:creator>burleyman</dc:creator>
      <dc:date>2015-10-23T11:57:03Z</dc:date>
    </item>
    <item>
      <title>Glad that the issue is</title>
      <link>https://community.cisco.com/t5/network-security/very-odd-issue-need-help/m-p/2771765#M171365</link>
      <description>&lt;P&gt;Glad that the issue is resolved. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;R.Seth&lt;/P&gt;</description>
      <pubDate>Fri, 23 Oct 2015 15:43:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/very-odd-issue-need-help/m-p/2771765#M171365</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-10-23T15:43:55Z</dc:date>
    </item>
  </channel>
</rss>

