<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I tried that but still no in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-help/m-p/2677573#M191664</link>
    <description>&lt;P&gt;I tried that but still no luck.&lt;/P&gt;</description>
    <pubDate>Wed, 13 May 2015 13:53:46 GMT</pubDate>
    <dc:creator>markdacoron</dc:creator>
    <dc:date>2015-05-13T13:53:46Z</dc:date>
    <item>
      <title>Cisco asa help</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-help/m-p/2677571#M191662</link>
      <description>&lt;P&gt;I get this message on log&lt;/P&gt;&lt;P&gt;TCP access denied by ACL from 70.xxx.xxx.xxx/3061 to outside:xxx.xxx.xxx.178/443&lt;/P&gt;&lt;P&gt;I am not a cisco person.&lt;/P&gt;&lt;P&gt;Any help will be appreciated.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.0(4)&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;domain-name xxxxx.com&lt;BR /&gt;enable password XXXXX encrypted&lt;BR /&gt;passwd XXXX encrypted&lt;BR /&gt;names&lt;BR /&gt;name 10.1.11.25 Apple&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address xxx.xxx.xxx.178 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.1.11.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;/P&gt;&lt;P&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;!&lt;BR /&gt;regex domainlist1 "\.youtube\.com"&lt;BR /&gt;regex domainlist2 "\.facebook\.com"&lt;BR /&gt;boot system disk0:/asa804-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone PST -8&lt;BR /&gt;clock summer-time PDT recurring&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;name-server 10.1.3.32&lt;BR /&gt;&amp;nbsp;name-server 10.1.3.33&lt;BR /&gt;&amp;nbsp;domain-name xxxx.com&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;access-list inside_access_in extended permit ip any any&lt;BR /&gt;access-list inside_access_in extended permit icmp 10.1.11.0 255.255.255.0 any&lt;BR /&gt;access-list inside_access_in extended permit ip 10.1.11.0 255.255.255.0 10.1.3.0 255.255.255.0&lt;BR /&gt;access-list inside_access_in extended permit ip 10.1.11.0 255.255.255.0 10.1.7.0 255.255.255.0&lt;BR /&gt;access-list inside_access_in extended permit ip 10.1.11.0 255.255.255.0 10.1.4.0 255.255.255.0&lt;BR /&gt;access-list inside_access_in extended permit ip 10.1.11.0 255.255.255.0 10.1.2.0 255.255.255.0&lt;BR /&gt;access-list inside_access_in extended permit ip 10.1.11.0 255.255.255.0 10.1.8.0 255.255.255.0&lt;BR /&gt;access-list inside_access_in extended permit ip 10.1.11.0 255.255.255.0 10.0.0.0 255.0.0.0&lt;BR /&gt;access-list inside_access_in extended permit ip 10.1.11.0 255.255.255.0 192.168.10.0 255.255.255.0&lt;BR /&gt;access-list nonat extended permit ip 10.1.11.0 255.255.255.0 10.1.3.0 255.255.255.0&lt;BR /&gt;access-list nonat extended permit ip 10.1.3.0 255.255.255.0 10.1.11.0 255.255.255.0&lt;BR /&gt;access-list nonat extended permit ip 10.1.7.0 255.255.255.0 10.1.11.0 255.255.255.0&lt;BR /&gt;access-list nonat extended permit ip 10.1.7.0 255.255.255.0 10.1.4.0 255.255.255.0&lt;BR /&gt;access-list nonat extended permit ip 10.1.2.0 255.255.255.0 10.1.2.0 255.255.255.0&lt;BR /&gt;access-list nonat extended permit ip 10.1.8.0 255.255.255.0 10.1.8.0 255.255.255.0&lt;BR /&gt;access-list nonat extended permit ip 10.0.0.0 255.0.0.0 10.0.0.0 255.0.0.0&lt;BR /&gt;access-list nonat extended permit ip 192.168.10.0 255.255.255.0 10.1.2.0 255.255.255.0&lt;BR /&gt;access-list inside_mpc extended permit tcp any any eq www&lt;BR /&gt;access-list inside_mpc extended permit tcp any any eq 8080&lt;BR /&gt;access-list outside_access_in extended permit icmp any any inactive&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;/P&gt;&lt;P&gt;logging buffered informational&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;failover timeout -1&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;asdm image disk0:/asdm-712.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,outside) tcp xxx.xxx.xxx.178 https Apple https netmask 255.255.255.255&lt;BR /&gt;static (inside,inside) 192.168.10.0 192.168.10.0 netmask 255.255.255.0 norandomseq nailed&lt;BR /&gt;static (inside,inside) 10.1.11.0 10.1.11.0 netmask 255.255.255.0&lt;BR /&gt;static (inside,inside) 10.1.3.0 10.1.3.0 netmask 255.255.255.0 norandomseq nailed&lt;BR /&gt;static (inside,inside) 10.1.7.0 10.1.7.0 netmask 255.255.255.0 norandomseq nailed&lt;BR /&gt;static (inside,inside) 10.1.4.0 10.1.4.0 netmask 255.255.255.0 norandomseq nailed&lt;BR /&gt;static (inside,inside) 10.1.2.0 10.1.2.0 netmask 255.255.255.0 norandomseq nailed&lt;BR /&gt;static (inside,inside) 10.1.8.0 10.1.8.0 netmask 255.255.255.0 norandomseq nailed&lt;BR /&gt;static (inside,inside) 10.0.0.0 10.0.0.0 netmask 255.0.0.0 norandomseq nailed&lt;BR /&gt;static (inside,outside) xxx.xxx.xxx.178 Apple netmask 255.255.255.255 dns&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 67.52.149.177 1&lt;BR /&gt;route inside 10.0.0.0 255.0.0.0 10.1.11.1 1&lt;BR /&gt;route inside 10.1.2.0 255.255.255.0 10.1.11.1 1&lt;BR /&gt;route inside 10.1.3.0 255.255.255.0 10.1.11.1 1&lt;BR /&gt;route inside 10.1.4.0 255.255.255.0 10.1.11.1 1&lt;BR /&gt;route inside 10.1.7.0 255.255.255.0 10.1.11.1 1&lt;BR /&gt;route inside 10.1.8.0 255.255.255.0 10.1.11.1 1&lt;BR /&gt;route inside 192.168.10.0 255.255.255.0 10.1.11.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;http 10.1.11.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 management&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd dns 10.1.3.32 10.1.3.33&lt;BR /&gt;dhcpd domain xxxxx.com&lt;BR /&gt;dhcpd auto_config inside&lt;BR /&gt;!&lt;BR /&gt;dhcpd dns 10.1.3.32 10.1.3.33 interface inside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;username cisco password 3USUcOPFUiMCO4Jk encrypted&lt;BR /&gt;!&lt;BR /&gt;class-map type regex match-any DomainBlockList&lt;BR /&gt;&amp;nbsp;match regex domainlist1&lt;BR /&gt;&amp;nbsp;match regex domainlist2&lt;BR /&gt;class-map type inspect http match-all BlockDomainsClass&lt;BR /&gt;match request header host regex class DomainBlockList&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;class-map type inspect http match-all AppHeaderClass&lt;BR /&gt;class-map httptraffic&lt;BR /&gt;&amp;nbsp;match access-list inside_mpc&lt;BR /&gt;class-map type inspect http match-all BlockURLsClass&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect http http_inspection_policy_blockdomains&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; protocol-violation action drop-connection&lt;BR /&gt;&amp;nbsp;class AppHeaderClass&lt;BR /&gt;&amp;nbsp; drop-connection log&lt;BR /&gt;&amp;nbsp;match request method connect&lt;BR /&gt;&amp;nbsp; drop-connection log&lt;BR /&gt;&amp;nbsp;class BlockDomainsClass&lt;BR /&gt;&amp;nbsp; reset log&lt;BR /&gt;&amp;nbsp;class BlockURLsClass&lt;BR /&gt;&amp;nbsp; reset log&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns migrated_dns_map_1&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;&amp;nbsp;class httptraffic&lt;BR /&gt;&amp;nbsp; inspect http http_inspection_policy_blockdomains&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:b489c2480654120d513d7cb907a92c82&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- See more at: &lt;A href="https://supportforums.cisco.com/discussion/12505581/help-needed-cisco-asa-5505-website-https-access#sthash.y76HHrgt.dpuf" target="_blank"&gt;https://supportforums.cisco.com/discussion/12505581/help-needed-cisco-asa-5505-website-https-access#sthash.y76HHrgt.dpuf&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:55:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-help/m-p/2677571#M191662</guid>
      <dc:creator>markdacoron</dc:creator>
      <dc:date>2019-03-12T05:55:30Z</dc:date>
    </item>
    <item>
      <title>Your access-list outside</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-help/m-p/2677572#M191663</link>
      <description>&lt;P&gt;Your access-list outside_access_in is missing a line to allow your access on HTTPS port to your Apple device.&lt;/P&gt;&lt;P&gt;Try this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list outside_aceess_in extended permit tcp any xxx.xxx.xxx.178 255.255.255.255 eq 443&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 May 2015 12:36:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-help/m-p/2677572#M191663</guid>
      <dc:creator>Pavel Trinos</dc:creator>
      <dc:date>2015-05-13T12:36:03Z</dc:date>
    </item>
    <item>
      <title>I tried that but still no</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-help/m-p/2677573#M191664</link>
      <description>&lt;P&gt;I tried that but still no luck.&lt;/P&gt;</description>
      <pubDate>Wed, 13 May 2015 13:53:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-help/m-p/2677573#M191664</guid>
      <dc:creator>markdacoron</dc:creator>
      <dc:date>2015-05-13T13:53:46Z</dc:date>
    </item>
    <item>
      <title>Hi,With the above ACL in</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-help/m-p/2677574#M191665</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;With the above ACL in place , can you provide the output of this packet trace:-&lt;/P&gt;&lt;P&gt;packet input outside tcp 4.2.2.2 2345 xxx.xxx.xxx.178 443 det&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2015 04:23:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-help/m-p/2677574#M191665</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-05-14T04:23:56Z</dc:date>
    </item>
    <item>
      <title>Phase: 1Type: FLOW</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-help/m-p/2677575#M191666</link>
      <description>&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; xxx.xxx.xxx.178&amp;nbsp;&amp;nbsp; 255.255.255.255 identity&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xd56a0d20, priority=0, domain=permit, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=5517604, user_data=0x9, cs_id=0x0, flags=0x1000, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2015 16:36:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-help/m-p/2677575#M191666</guid>
      <dc:creator>markdacoron</dc:creator>
      <dc:date>2015-05-14T16:36:54Z</dc:date>
    </item>
    <item>
      <title>Looks like this line of code</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-help/m-p/2677576#M191667</link>
      <description>&lt;P&gt;Looks like this line of code fixed the issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface https Apple https netmask 255.255.255.255&lt;/P&gt;</description>
      <pubDate>Fri, 15 May 2015 14:15:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-help/m-p/2677576#M191667</guid>
      <dc:creator>markdacoron</dc:creator>
      <dc:date>2015-05-15T14:15:36Z</dc:date>
    </item>
  </channel>
</rss>

