<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5505  Deny udp src outside to dst kulow by access-group outside_access_in in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-deny-udp-src-outside-to-dst-kulow-by-access-group/m-p/2758410#M177752</link>
    <description>&lt;P&gt;So i have been trying to set things up at home where I have my verizon router ----asa----cisco wireless router and all my host connecting to my csico wireless router.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have been able to ping everything yet I am unable to ping from my 172.*.*.* to the ASA.&amp;nbsp; I also notice I keep getting the following Deny even though I pretty much have the asa open.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Deny udp src outside:71.252.0.12/53 dst Kulow: 10.0.*.*/38269 by access group "outside_access_in"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Im stumped and would appreciate any help with figuring out why this is happening.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 06:44:35 GMT</pubDate>
    <dc:creator>blkulwicki07</dc:creator>
    <dc:date>2019-03-12T06:44:35Z</dc:date>
    <item>
      <title>ASA 5505  Deny udp src outside to dst kulow by access-group outside_access_in</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-deny-udp-src-outside-to-dst-kulow-by-access-group/m-p/2758410#M177752</link>
      <description>&lt;P&gt;So i have been trying to set things up at home where I have my verizon router ----asa----cisco wireless router and all my host connecting to my csico wireless router.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have been able to ping everything yet I am unable to ping from my 172.*.*.* to the ASA.&amp;nbsp; I also notice I keep getting the following Deny even though I pretty much have the asa open.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Deny udp src outside:71.252.0.12/53 dst Kulow: 10.0.*.*/38269 by access group "outside_access_in"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Im stumped and would appreciate any help with figuring out why this is happening.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:44:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-deny-udp-src-outside-to-dst-kulow-by-access-group/m-p/2758410#M177752</guid>
      <dc:creator>blkulwicki07</dc:creator>
      <dc:date>2019-03-12T06:44:35Z</dc:date>
    </item>
    <item>
      <title>The deny msg is due the acl</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-deny-udp-src-outside-to-dst-kulow-by-access-group/m-p/2758411#M177753</link>
      <description>&lt;P&gt;The deny msg is due the acl "outside_access_in".&lt;/P&gt;&lt;P&gt;In case you need to permit some traffic entering the interface on which you this acl applied then add those IPs in the acl.&lt;/P&gt;&lt;P&gt;Also I did not understand how you tried the ping test. Can elaborate on that and explain how the traffic flow is supposed to happen in your topolgy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;R.Seth&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2015 18:44:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-deny-udp-src-outside-to-dst-kulow-by-access-group/m-p/2758411#M177753</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-10-13T18:44:33Z</dc:date>
    </item>
    <item>
      <title>First of all thank you for</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-deny-udp-src-outside-to-dst-kulow-by-access-group/m-p/2758412#M177754</link>
      <description>&lt;P&gt;First of all thank you for responding.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I am trying to create a small network at home with an asa5505 which connects to my verizon router.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So it goes like this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Verizon Router (192.168.1.0/24)-----(outbound)ASA(kulow 10.0.*.*/248)----Cisco Wireless Router (172.20.*.*)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I do a ping from 172.20 ip to 192.168.1.5 I receive responds back yet when I ping 192.168.1.105(just example) I get no response and I start seeing the&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Deny udp src outside:71.252.0.12/53 dst Kulow: 10.0.*.*/38269 by access group "outside_access_in"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;as well as it saying&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Deny udp src kulow:10.0.*.*/prot dst outside:173.255.246.13/port by access-group kulow-access-in&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;make any sense&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2015 19:22:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-deny-udp-src-outside-to-dst-kulow-by-access-group/m-p/2758412#M177754</guid>
      <dc:creator>blkulwicki07</dc:creator>
      <dc:date>2015-10-13T19:22:20Z</dc:date>
    </item>
    <item>
      <title>Hello, Those logs are not</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-deny-udp-src-outside-to-dst-kulow-by-access-group/m-p/2758413#M177755</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Those logs are not relative to each other.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You are talking about ICMP packets and the logs talk about DNS responses.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is 192.168.1.105 a valid host? or no device owns that IP?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note: as long as you are inspecting ICMP and .105 is not the ASA external interface IP you should be good.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2015 21:54:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-deny-udp-src-outside-to-dst-kulow-by-access-group/m-p/2758413#M177755</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2015-10-13T21:54:48Z</dc:date>
    </item>
    <item>
      <title>Then why would i be getting</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-deny-udp-src-outside-to-dst-kulow-by-access-group/m-p/2758414#M177756</link>
      <description>&lt;P&gt;Then why would i be getting those Deny's even though I pretty much have everything open to come inbound.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes 105 is a valid host its the asa.&amp;nbsp; I am unable to ping the asa from the cisco wireless network.&amp;nbsp; I even put that ip address within the management ssh or https/asdm and still unable to reach the asa.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I guess I am just trying to figure out what is going on with not being able to reach the asa from the wireless network and why i am seeing those Deny's&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Again thank you for responding&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2015 00:17:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-deny-udp-src-outside-to-dst-kulow-by-access-group/m-p/2758414#M177756</guid>
      <dc:creator>blkulwicki07</dc:creator>
      <dc:date>2015-10-14T00:17:56Z</dc:date>
    </item>
    <item>
      <title>Hi,The .105 IP resides on</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-deny-udp-src-outside-to-dst-kulow-by-access-group/m-p/2758415#M177758</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;The .105 IP resides on outside interface of ASA. On ASA you cannot ping farside interface.&lt;/P&gt;&lt;P&gt;So basically you can ping Kulow interface from wireless network and not the outside interface. This is how ASA is designed.&lt;/P&gt;&lt;P&gt;Regarding deny logs, I think you should verify your config for acls on outside interface.&lt;/P&gt;&lt;P&gt;Check output of show run access-group and verify the acl.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;R.Seth&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2015 02:55:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-deny-udp-src-outside-to-dst-kulow-by-access-group/m-p/2758415#M177758</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-10-14T02:55:11Z</dc:date>
    </item>
    <item>
      <title>ahhhh ok that makes sense. </title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-deny-udp-src-outside-to-dst-kulow-by-access-group/m-p/2758416#M177760</link>
      <description>&lt;P&gt;ahhhh ok that makes sense.&amp;nbsp; As far as my sho run access group here is what I have in my config.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does this look accurate?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group Inside_access_in in interface Inside&lt;BR /&gt;access-group Kulow_access_in in interface Kulow&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thank you again&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2015 13:44:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-deny-udp-src-outside-to-dst-kulow-by-access-group/m-p/2758416#M177760</guid>
      <dc:creator>blkulwicki07</dc:creator>
      <dc:date>2015-10-14T13:44:50Z</dc:date>
    </item>
    <item>
      <title>Hi, Show access-group shows</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-deny-udp-src-outside-to-dst-kulow-by-access-group/m-p/2758417#M177761</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Show access-group shows you have acls applied on inside, outside and Kulow interfaces.&lt;/P&gt;&lt;P&gt;You can check each acl by checking show run access-list.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope it helps!!!&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;R.Seth&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Mark the answer as correct if it helps in resolving your query!!!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2015 13:49:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-deny-udp-src-outside-to-dst-kulow-by-access-group/m-p/2758417#M177761</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-10-14T13:49:31Z</dc:date>
    </item>
    <item>
      <title>Ok so for example here are</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-deny-udp-src-outside-to-dst-kulow-by-access-group/m-p/2758418#M177762</link>
      <description>&lt;P&gt;Ok so for example here are the acls for each the interfaces that are active&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_1 any4 any4&lt;BR /&gt;access-list outside_access_in extended deny ip any any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list Kulow_access_in extended permit object-group DM_INLINE_SERVICE_3 any4 any4&lt;BR /&gt;access-list Kulow_access_in extended deny ip any a&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does all look good?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2015 14:57:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-deny-udp-src-outside-to-dst-kulow-by-access-group/m-p/2758418#M177762</guid>
      <dc:creator>blkulwicki07</dc:creator>
      <dc:date>2015-10-14T14:57:08Z</dc:date>
    </item>
    <item>
      <title>So basically you have</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-deny-udp-src-outside-to-dst-kulow-by-access-group/m-p/2758419#M177763</link>
      <description>&lt;P&gt;So basically you have permitted traffic for a specific group and denied all other traffic.&lt;/P&gt;&lt;P&gt;This looks good and you can fine tune these ACLs to permit/deny traffic as your network grows.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope it answers your query.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;R.Seth&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2015 15:46:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-deny-udp-src-outside-to-dst-kulow-by-access-group/m-p/2758419#M177763</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-10-14T15:46:51Z</dc:date>
    </item>
    <item>
      <title>Thanks again for your</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-deny-udp-src-outside-to-dst-kulow-by-access-group/m-p/2758420#M177764</link>
      <description>&lt;P&gt;Thanks again for your knowledge on this.&amp;nbsp; I truly appreciate it!!&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2015 17:46:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-deny-udp-src-outside-to-dst-kulow-by-access-group/m-p/2758420#M177764</guid>
      <dc:creator>blkulwicki07</dc:creator>
      <dc:date>2015-10-14T17:46:28Z</dc:date>
    </item>
  </channel>
</rss>

