<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Sorry but I'm a bit out of my in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680623#M193769</link>
    <description>&lt;P&gt;Sorry but I'm a bit out of my depth when we get into the Secure Gateway flavor of the Netscaler.&lt;/P&gt;&lt;P&gt;The ASA appears fine for https but there may be some fine point about what the Netscaler Secure Gateway&amp;nbsp;requires that I'm not aware of.&amp;nbsp;Can you confirm there's no proxy server setup in your environment that might be blocking or interfering with the https communications?&lt;/P&gt;&lt;P&gt;You might try the community over at Citrix. I've has good results with them in the past.&lt;/P&gt;&lt;P&gt;http://discussions.citrix.com/forum/5-secure-gateway/&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 21 Jul 2015 15:40:37 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2015-07-21T15:40:37Z</dc:date>
    <item>
      <title>Accessing NetScaler through ASA5505 issue</title>
      <link>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680608#M193740</link>
      <description>&lt;P&gt;Hi All, I am hoping someone can help me with this issue.&lt;/P&gt;&lt;P&gt;I have a Citrix NetScaler server on my network that I am trying to access via a public address on the outside of my Cisco ASA5505.&lt;/P&gt;&lt;P&gt;The ASA has two Public Addresses, the first is used for a couple&amp;nbsp;VPN tunnels, which work fine. the second is going to be dedicated tot he Netscaler.&lt;/P&gt;&lt;P&gt;ASA5505 -&amp;nbsp;IOS version 9.0 (1)&lt;/P&gt;&lt;P&gt;Public address: Y.Y.Y.142&lt;/P&gt;&lt;P&gt;NetScaler Server: X.X.X.6&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is what I have programmed in the ASA:&lt;/P&gt;&lt;P&gt;object service https&lt;BR /&gt;&amp;nbsp;service tcp source eq https destination eq https&lt;BR /&gt;object network NetScaler_External&lt;BR /&gt;&amp;nbsp;host Y.Y.Y.142&lt;BR /&gt;&amp;nbsp;description Netscaler External IP&lt;BR /&gt;object network NetScaler_Internal&lt;BR /&gt;&amp;nbsp;host X.X.X.6&lt;BR /&gt;&amp;nbsp;description Netscaler Inside Address&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Netscaler&lt;BR /&gt;access-list outside_access_in extended permit object https any object NetScaler_Internal&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network NetScaler_Internal&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static NetScaler_External service tcp https https&lt;BR /&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am not sure what I am missing, but when I try to connect to the NetScaler from the outside, the log shows the connection attempt, then gives me a 30sec. disconnect because of missing SYN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help would greatly be appreciated. I am stuck!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:16:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680608#M193740</guid>
      <dc:creator>NICK SYMIAKAKIS</dc:creator>
      <dc:date>2019-03-12T06:16:37Z</dc:date>
    </item>
    <item>
      <title>Make sure the Netscaler NAT</title>
      <link>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680609#M193741</link>
      <description>&lt;P&gt;Make sure the Netscaler NAT entry is above the general purpose entry. First match "wins" and if the general rule is being hit, you will not get the desired results.&lt;/P&gt;&lt;P&gt;You can move the rules up or down in ASDM or, if you are using the cli, specify their order to make them be examined in the right sequence.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jul 2015 15:01:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680609#M193741</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-07-16T15:01:54Z</dc:date>
    </item>
    <item>
      <title>When viewed in ASDM, the NAT</title>
      <link>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680610#M193742</link>
      <description>&lt;P&gt;When viewed in ASDM, the NAT statement is above the Any Any rule.&lt;/P&gt;&lt;P&gt;See attached pic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jul 2015 15:16:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680610#M193742</guid>
      <dc:creator>NICK SYMIAKAKIS</dc:creator>
      <dc:date>2015-07-16T15:16:05Z</dc:date>
    </item>
    <item>
      <title>Hmm, ok that looks good.</title>
      <link>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680611#M193743</link>
      <description>&lt;P&gt;Hmm, ok that looks good.&lt;/P&gt;
&lt;P&gt;Can you try packet-tracer from the cli:&lt;/P&gt;

&lt;PRE&gt;
packet-tracer input outside tcp 8.8.8.8 1025 &amp;lt;netscaler External IP&amp;gt; 443&lt;/PRE&gt;</description>
      <pubDate>Thu, 16 Jul 2015 15:19:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680611#M193743</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-07-16T15:19:28Z</dc:date>
    </item>
    <item>
      <title>Here is the result:NOBLE-5505</title>
      <link>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680612#M193744</link>
      <description>&lt;P&gt;Here is the result:&lt;/P&gt;&lt;P&gt;NOBLE-5505# packet-tracer input outside tcp 8.8.8.8 1025 207.78.1.142 443&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network NetScaler_Internal&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static NetScaler_External service tcp https https&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate Y.Y.Y.142/443 to X.X.X.6/443&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am not sure what configuration rule it is talking about.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jul 2015 15:24:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680612#M193744</guid>
      <dc:creator>NICK SYMIAKAKIS</dc:creator>
      <dc:date>2015-07-16T15:24:32Z</dc:date>
    </item>
    <item>
      <title>I didn't read your access</title>
      <link>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680613#M193745</link>
      <description>&lt;P&gt;I didn't read your access-list closely enough. You have:&lt;/P&gt;

&lt;PRE&gt;
&lt;SPAN style="font-size: 14.3999996185303px;"&gt;access-list outside_access_in extended permit object https any object NetScaler_Internal&lt;/SPAN&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;Try instead:&lt;/SPAN&gt;&lt;/P&gt;

&lt;PRE&gt;
&lt;SPAN style="font-size: 14.3999996185303px;"&gt;access-list outside_access_in extended permit tcp any4 object NetScaler_Internal eq https&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 16 Jul 2015 15:36:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680613#M193745</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-07-16T15:36:56Z</dc:date>
    </item>
    <item>
      <title>Marvin, that change</title>
      <link>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680614#M193746</link>
      <description>&lt;P&gt;Marvin, that change definitely got the packet tracer to complete with Allows all the way down.&lt;/P&gt;&lt;P&gt;But when I try to connect through the public IP, I am still getting the 0 SYN Timeout.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jul 2015 15:48:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680614#M193746</guid>
      <dc:creator>NICK SYMIAKAKIS</dc:creator>
      <dc:date>2015-07-16T15:48:14Z</dc:date>
    </item>
    <item>
      <title>OK, can you verify the</title>
      <link>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680615#M193748</link>
      <description>&lt;P&gt;OK, can you verify the Netscaler is receiving the 3-way handshake (i.e. the initial SYN packet)?&lt;/P&gt;&lt;P&gt;You can use the nstrace utility (filtering on the originator from which the communications is failing to narrow things down)&amp;nbsp;to perform a packet capture on the Netscaler.&lt;/P&gt;&lt;P&gt;Also check the Netscaler default route points to your ASA inside interface so that when it does receive the SYN, it knows where to sent the SYN ACK.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jul 2015 15:52:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680615#M193748</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-07-16T15:52:48Z</dc:date>
    </item>
    <item>
      <title>Marvin, first let me thank</title>
      <link>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680616#M193750</link>
      <description>&lt;P&gt;Marvin, first let me thank you for your help so far.&lt;/P&gt;&lt;P&gt;OK, so I tried to run the nstrace on command line, and it is saying "command not found"&lt;/P&gt;&lt;P&gt;do I have to run it from a specific folder?&lt;/P&gt;&lt;P&gt;forgive me, I am not very good with Linux OS.&lt;/P&gt;&lt;P&gt;I did verify the Routes are correct, and I can ping the firewall's inside address.&lt;/P&gt;&lt;P&gt;I am very familiar with Wireshark, but never used nstrace.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jul 2015 20:21:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680616#M193750</guid>
      <dc:creator>NICK SYMIAKAKIS</dc:creator>
      <dc:date>2015-07-16T20:21:19Z</dc:date>
    </item>
    <item>
      <title>Nick,nstrace on a Netscaler</title>
      <link>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680617#M193753</link>
      <description>&lt;P&gt;Nick,&lt;/P&gt;&lt;P&gt;nstrace on a Netscaler needs to be run from the FreeBSD OS shell, not the Netscaler command prompt. Type "shell" from the latter and see the syntax details &lt;A href="https://support.citrix.com/article/CTX120941"&gt;here&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's also available from the GUI. &lt;A href="http://support.citrix.com/article/CTX128655"&gt;Instructions&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;It will result in a capture file that you can open in Wireshark.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jul 2015 02:32:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680617#M193753</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-07-17T02:32:58Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin, sorry, I am new to</title>
      <link>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680618#M193756</link>
      <description>&lt;P&gt;Hi Marvin, sorry, I am new to NetScaler, I actually had a consultant install it, and I am just starting to learn it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I ran a trace, and what I am seeing in Wireshark, is the Syn coming from outside to Netscaler, then a Syn/Ack going to Outside, then a RST/ACK coming from Outside.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When comparing to a good connection from my workstation inside the network to the Netscaler, the three way completes in the inside, with the final ACK.&lt;/P&gt;&lt;P&gt;I compared the data between the good handshake, and the failed one, and I cannot see why the&amp;nbsp;ASA is resetting the connection. And the odd part, is the ASA log is saying it is not receiving back the SYN from the Netscaler, when the wireshark is showing that the Netscaler sent it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am attaching the Wireshark segment.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jul 2015 13:17:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680618#M193756</guid>
      <dc:creator>NICK SYMIAKAKIS</dc:creator>
      <dc:date>2015-07-17T13:17:44Z</dc:date>
    </item>
    <item>
      <title>That's odd, maybe I don't see</title>
      <link>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680619#M193759</link>
      <description>&lt;P&gt;That's odd, maybe I don't see the big picture completely enough.&lt;/P&gt;
&lt;P&gt;Is the https address you are trying to access the Netscaler itself (i.e an NSIP or Netscaler IP) or a loadbalance VIP for a server farm?&lt;/P&gt;
&lt;P&gt;Is the source IP in the failed handshake that you posted the jpeg of (74.92.61.169) your PC testing from a public IP?&lt;/P&gt;
&lt;P&gt;Can you try packet-tracer n the ASA from the inside out using that address pair and post the results? i.e.:&lt;/P&gt;

&lt;PRE&gt;
packet-tracer input inside tcp 172.16.3.6 443 74.92.61.169 60535 detail&lt;/PRE&gt;</description>
      <pubDate>Fri, 17 Jul 2015 22:50:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680619#M193759</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-07-17T22:50:51Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin, the IP is the</title>
      <link>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680620#M193761</link>
      <description>&lt;P&gt;Hi Marvin, the IP is the Netscaler itself, and I can access it from the inside network.&lt;/P&gt;&lt;P&gt;The 74 address is the public address my PC is using, I have also tried it from two different locations.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the output of Packet Tracer:&lt;/P&gt;&lt;P&gt;NOBLE-5505# packet-tracer input inside tcp 172.16.3.6 443 74.92.61.169 60535 d$&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network NetScaler_Internal&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static NetScaler_External service tcp https https&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 172.16.3.6/443 to 207.78.1.142/443&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xc88cb928, priority=6, domain=nat, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3, user_data=0xcca22340, cs_id=0x0, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=172.16.3.6, mask=255.255.255.255, port=443, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=outside&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xc8668990, priority=1, domain=nat-per-session, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3334378, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xcc12d630, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3147035, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xc8668990, priority=1, domain=nat-per-session, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3334380, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xcc0d8320, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3170385, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 3380626, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jul 2015 12:42:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680620#M193761</guid>
      <dc:creator>NICK SYMIAKAKIS</dc:creator>
      <dc:date>2015-07-21T12:42:30Z</dc:date>
    </item>
    <item>
      <title>Everything looks good from</title>
      <link>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680621#M193764</link>
      <description>&lt;P&gt;Everything looks good from the perspective of the ASA.&lt;/P&gt;&lt;P&gt;What exactly are you trying to access on the Netscaler? I haven't checked on the latest versions, but the version 10 boxes I've worked with most required not only tcp/443 for administrative access but also tcp/3008 and/or tcp/3010 for the Java bits of the GUI (encrypted and non-encrypted). You also could add tcp/22 and see if that works for ssh access.&amp;nbsp;&lt;A href="https://support.citrix.com/servlet/KbServlet/download/2389-102-704421/CTX101810_28th_June_2013.pdf"&gt;Reference&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jul 2015 12:59:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680621#M193764</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-07-21T12:59:00Z</dc:date>
    </item>
    <item>
      <title>Primarily I am trying to</title>
      <link>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680622#M193767</link>
      <description>&lt;P&gt;Primarily I am trying to access the gateway (Citrix Reciever) so I can get to my published applications and desktops.&lt;/P&gt;&lt;P&gt;On my old Citrix platform they referred to it as "Secure Gateway".&lt;/P&gt;&lt;P&gt;As I said, NetScaler is new to me, but the login looks similar.&lt;/P&gt;&lt;P&gt;The consultant that installed it called the virtual server: Netscaler-VPX if that helps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jul 2015 14:40:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680622#M193767</guid>
      <dc:creator>NICK SYMIAKAKIS</dc:creator>
      <dc:date>2015-07-21T14:40:46Z</dc:date>
    </item>
    <item>
      <title>Sorry but I'm a bit out of my</title>
      <link>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680623#M193769</link>
      <description>&lt;P&gt;Sorry but I'm a bit out of my depth when we get into the Secure Gateway flavor of the Netscaler.&lt;/P&gt;&lt;P&gt;The ASA appears fine for https but there may be some fine point about what the Netscaler Secure Gateway&amp;nbsp;requires that I'm not aware of.&amp;nbsp;Can you confirm there's no proxy server setup in your environment that might be blocking or interfering with the https communications?&lt;/P&gt;&lt;P&gt;You might try the community over at Citrix. I've has good results with them in the past.&lt;/P&gt;&lt;P&gt;http://discussions.citrix.com/forum/5-secure-gateway/&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jul 2015 15:40:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680623#M193769</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-07-21T15:40:37Z</dc:date>
    </item>
    <item>
      <title>Thank you for all of your</title>
      <link>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680624#M193770</link>
      <description>&lt;P&gt;Thank you for all of your help in confirming the ASA is setup correctly.&lt;/P&gt;&lt;P&gt;Much Appreciated.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jul 2015 15:42:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680624#M193770</guid>
      <dc:creator>NICK SYMIAKAKIS</dc:creator>
      <dc:date>2015-07-21T15:42:46Z</dc:date>
    </item>
    <item>
      <title>Did you ever find your</title>
      <link>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680625#M193777</link>
      <description>&lt;P&gt;Did you ever find your problem? We are having a weird issue similar to yours with a missing ack from the netscaler server.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;We see syn,syn ack, then fin,ack.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;We are having an missing ack.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Apr 2016 15:30:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-netscaler-through-asa5505-issue/m-p/2680625#M193777</guid>
      <dc:creator>jessieherrera</dc:creator>
      <dc:date>2016-04-27T15:30:05Z</dc:date>
    </item>
  </channel>
</rss>

