<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I think below link will be in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-routing-conundrum/m-p/2622283#M194857</link>
    <description>&lt;P&gt;I think below link will be useful to understand packet processing.&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113396-asa-packet-flow-00.html&lt;/P&gt;</description>
    <pubDate>Tue, 21 Apr 2015 09:24:24 GMT</pubDate>
    <dc:creator>Pranay Prasoon</dc:creator>
    <dc:date>2015-04-21T09:24:24Z</dc:date>
    <item>
      <title>ASA Routing Conundrum</title>
      <link>https://community.cisco.com/t5/network-security/asa-routing-conundrum/m-p/2622282#M194856</link>
      <description>&lt;P&gt;How does a&amp;nbsp;routed mode ASA Firewall running&amp;nbsp;8.4 route a packet on the return trip? Say Host A sends a packet to Host B on the other side of the ASA and Host B responds to Host A. On the return trip (assuming NAT is not involved)&amp;nbsp;does the firewall check its routing table again to determine what interface to send the packet out of or does it skip that step and forward it out the same interface it came in on in the first place?&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:48:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-routing-conundrum/m-p/2622282#M194856</guid>
      <dc:creator>Mike Keenan</dc:creator>
      <dc:date>2019-03-12T05:48:29Z</dc:date>
    </item>
    <item>
      <title>I think below link will be</title>
      <link>https://community.cisco.com/t5/network-security/asa-routing-conundrum/m-p/2622283#M194857</link>
      <description>&lt;P&gt;I think below link will be useful to understand packet processing.&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113396-asa-packet-flow-00.html&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2015 09:24:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-routing-conundrum/m-p/2622283#M194857</guid>
      <dc:creator>Pranay Prasoon</dc:creator>
      <dc:date>2015-04-21T09:24:24Z</dc:date>
    </item>
    <item>
      <title>That is great. Can you point</title>
      <link>https://community.cisco.com/t5/network-security/asa-routing-conundrum/m-p/2622284#M194858</link>
      <description>&lt;P&gt;That is great. Can you point out where it talks about the return trip???&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jul 2015 13:11:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-routing-conundrum/m-p/2622284#M194858</guid>
      <dc:creator>Mike Keenan</dc:creator>
      <dc:date>2015-07-09T13:11:50Z</dc:date>
    </item>
    <item>
      <title>Hi Mike,The complete packet</title>
      <link>https://community.cisco.com/t5/network-security/asa-routing-conundrum/m-p/2622285#M194859</link>
      <description>&lt;P&gt;Hi Mike,&lt;/P&gt;&lt;P&gt;The complete packet flow only happens once when the packet is initially seen on the ASA device.&lt;/P&gt;&lt;P&gt;Once , a packet passes (SYN for TCP packet) , the return connection is handled statefully and that means will be checked on the basis of existing connections so packet flow would not take place again.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jul 2015 13:56:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-routing-conundrum/m-p/2622285#M194859</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-07-09T13:56:01Z</dc:date>
    </item>
    <item>
      <title>Ok, so any kind of</title>
      <link>https://community.cisco.com/t5/network-security/asa-routing-conundrum/m-p/2622286#M194860</link>
      <description>&lt;P&gt;Ok, so any kind of explanation of fast path and session management path might be helpful. Does the firewall route the return trip based on its routing table?&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jul 2015 13:59:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-routing-conundrum/m-p/2622286#M194860</guid>
      <dc:creator>Mike Keenan</dc:creator>
      <dc:date>2015-07-09T13:59:57Z</dc:date>
    </item>
    <item>
      <title>Hi,This is something that</title>
      <link>https://community.cisco.com/t5/network-security/asa-routing-conundrum/m-p/2622287#M194861</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;This is something that should explain this:-&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P class="pB1_Body1"&gt;By default, all traffic that goes through the ASA is inspected using the Adaptive Security Algorithm and is either allowed through or dropped based on the security policy. The ASA maximizes the firewall performance by checking the state of each packet (is this a new connection or an established connection?) and assigning it to either the session management path (a new connection SYN packet), the fast path (an established connection), or the control plane path (advanced inspection). See the &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/intro.html#wpxref87575" style="text-decoration: none;"&gt;"Stateful Inspection Overview" section&lt;/A&gt; for more detailed information about the stateful firewall.&lt;/P&gt;&lt;P&gt;&lt;A name="wp1087365" style="text-decoration: none;"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P class="pB1_Body1"&gt;TCP packets that match existing connections in the fast path can pass through the ASA without rechecking every aspect of the security policy. This feature maximizes performance. However, the method of establishing the session in the fast path using the SYN packet, and the checks that occur in the fast path (such as TCP sequence number), can stand in the way of asymmetrical routing solutions: both the outbound and inbound flow of a connection must pass through the same ASA.&lt;/P&gt;&lt;P&gt;&lt;A name="wp1087372" style="text-decoration: none;"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P class="pB1_Body1"&gt;For example, a new connection goes to ASA 1. The SYN packet goes through the session management path, and an entry for the connection is added to the fast path table. If subsequent packets of this connection go through ASA 1, then the packets will match the entry in the fast path, and are passed through. But if subsequent packets go to ASA 2, where there was not a SYN packet that went through the session management path, then there is no entry in the fast path for the connection, and the packets are dropped. &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/conns_tcpstatebypass.html#wp1087386" style="text-decoration: none;"&gt;Figure&amp;nbsp;51-1&lt;/A&gt; shows an asymmetric routing example where the outbound traffic goes through a different ASA than the inbound traffic: "&lt;/P&gt;&lt;P class="pB1_Body1"&gt;Also , routing table is not used for the return traffic instead the connection entry which has all the interface information and we don't need the routing table.&lt;/P&gt;&lt;P class="pB1_Body1"&gt;Thanks and Regards,&lt;/P&gt;&lt;P class="pB1_Body1"&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jul 2015 14:13:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-routing-conundrum/m-p/2622287#M194861</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-07-09T14:13:23Z</dc:date>
    </item>
  </channel>
</rss>

