<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic packet-tracer input outside in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-acls-code-8-4-2/m-p/2646420#M196967</link>
    <description>&lt;P&gt;packet-tracer input outside tcp 8.8.8.8 12345 xx.xxx.xxx.xx 88&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&amp;nbsp;&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; xx.xxx.xxx.xx &amp;nbsp; 255.255.255.255 identity&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&amp;nbsp;&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
    <pubDate>Sun, 22 Feb 2015 23:28:15 GMT</pubDate>
    <dc:creator>plaethos75</dc:creator>
    <dc:date>2015-02-22T23:28:15Z</dc:date>
    <item>
      <title>ASA 5505 ACLs, code 8.4(2)</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-acls-code-8-4-2/m-p/2646417#M196964</link>
      <description>&lt;P&gt;I'm going to present this as laymen as possible in hopes the understanding doesn't get convoluted. &amp;nbsp;This question is based off my previous link, which I can't see to get to work. &amp;nbsp;&lt;A href="https://supportforums.cisco.com/discussion/12419431/asa-5505-nat-and-acl-running-841" target="_blank"&gt;https://supportforums.cisco.com/discussion/12419431/asa-5505-nat-and-acl-running-841&lt;/A&gt; &amp;nbsp; diagram also available at this link as well...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. &amp;nbsp; Whether it's webservices or other ports being used, if I want&amp;nbsp;to use my single, public IP address assigned by a cable modem company, which is being assigned by DHCP, I will:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;assign it on the "outside" interface,&lt;/LI&gt;&lt;LI&gt;The ACL I place, will always look like (in the cli)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;access-group *acl-name* in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. &amp;nbsp; if I want the access to go to an internal server or device, whether it's telnet, www, or generic port, would the IP I reference be:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;the next hop?&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;The private IP of the device?&lt;/LI&gt;&lt;LI&gt;another IP which gets nat'd to my end device?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. &amp;nbsp;If I am specificly targeting this port/public IP and I see&amp;nbsp;&lt;STRONG&gt;ZERO (0)&amp;nbsp;&lt;/STRONG&gt;hits on my acl, could there be something else preventing it from traversing the network? &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From an ASDM standpoint, (permit on outside interface) &amp;nbsp;&amp;nbsp;Source = any &amp;nbsp; &amp;nbsp; destination address = "private IP address of device" &amp;nbsp;destination port = tcp/88 &amp;nbsp;&lt;/P&gt;&lt;P&gt;Why am I not seeing any hits?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here's the copy of my cli if this is easier to digest:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list allowed_wan_services extended permit tcp any host 172.16.0.5 eq 88 log debugging&amp;nbsp;&lt;BR /&gt;access-list allowed_wan_services extended permit udp any host 172.16.0.5 eq 88 log debugging&amp;nbsp;&lt;BR /&gt;access-list allowed_wan_services extended permit udp any host 192.168.250.2 eq 88 log debugging&lt;/P&gt;&lt;P&gt;access-list allowed_wan_services extended permit tcp any host 192.168.250.2 eq 88 log debugging&lt;/P&gt;&lt;P&gt;access-list allowed_wan_services extended permit tcp any host 192.168.254.3 eq 88 log debugging&amp;nbsp;&lt;BR /&gt;access-list allowed_wan_services extended permit udp any host 192.168.254.3 eq 88 log debugging&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list allowed_wan_services extended permit tcp any host *publicIP* eq 88 log debugging&amp;nbsp;&lt;BR /&gt;access-list allowed_wan_services extended permit udp any host *publicIP* eq 88 log debugging&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-group allowed_wan_services in interface outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (outside,inside) after-auto source static Pub-Cam Priv-Cam service tcp-88 tcp-88&lt;BR /&gt;nat (outside,inside) after-auto source static Pub-Cam next-hop service tcp-88 tcp-88&lt;BR /&gt;nat (outside,inside) after-auto source static Pub-Cam distsw service tcp-88 tcp-88&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I get 0 hits on any of the above.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've also included a screen shot of my NAT via ASDM.... &amp;nbsp;Thoughts/Suggestions?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:31:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-acls-code-8-4-2/m-p/2646417#M196964</guid>
      <dc:creator>plaethos75</dc:creator>
      <dc:date>2019-03-12T05:31:25Z</dc:date>
    </item>
    <item>
      <title>Hi, With any software 8.3 or</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-acls-code-8-4-2/m-p/2646418#M196965</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With any software 8.3 or above the ACL will always reference the local IP address and NOT the NAT IP address.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am actually not sure if an ACL hit is registered if some part of the NAT configuration drops the connection.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best place to start troubleshooting would be that you take a "packet-tracer" output from CLI of the ASA and we will see if the ASA drops it. If it does then we will need to determine if the problem is on the WAN or LAN side.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You could use this command format for example&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside tcp 8.8.8.8 12345 &amp;lt;public NAT ip&amp;gt; &amp;lt;port&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The source IP address and port can be anything. I just have the habit of using the above.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2015 08:31:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-acls-code-8-4-2/m-p/2646418#M196965</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2015-02-19T08:31:19Z</dc:date>
    </item>
    <item>
      <title>Thank you for this.  I will</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-acls-code-8-4-2/m-p/2646419#M196966</link>
      <description>&lt;P&gt;Thank you for this. &amp;nbsp;I will try this tonight. &amp;nbsp;Been a crazy week for me.&lt;/P&gt;</description>
      <pubDate>Sun, 22 Feb 2015 00:44:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-acls-code-8-4-2/m-p/2646419#M196966</guid>
      <dc:creator>plaethos75</dc:creator>
      <dc:date>2015-02-22T00:44:35Z</dc:date>
    </item>
    <item>
      <title>packet-tracer input outside</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-acls-code-8-4-2/m-p/2646420#M196967</link>
      <description>&lt;P&gt;packet-tracer input outside tcp 8.8.8.8 12345 xx.xxx.xxx.xx 88&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&amp;nbsp;&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; xx.xxx.xxx.xx &amp;nbsp; 255.255.255.255 identity&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&amp;nbsp;&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Sun, 22 Feb 2015 23:28:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-acls-code-8-4-2/m-p/2646420#M196967</guid>
      <dc:creator>plaethos75</dc:creator>
      <dc:date>2015-02-22T23:28:15Z</dc:date>
    </item>
    <item>
      <title>ok -- I'm pretty sure I</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-acls-code-8-4-2/m-p/2646421#M196968</link>
      <description>&lt;P&gt;ok -- I'm pretty sure I figured it out.&lt;/P&gt;&lt;P&gt;sysopt noproxyarp&lt;/P&gt;&lt;P&gt;access-list allowed_wan_services extended permit tcp any interface outside eq 88 log debugging&amp;nbsp;&lt;BR /&gt;access-list allowed_wan_services extended permit udp any interface outside eq 88 log debugging&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (outside,inside) source static any interface destination static interface Priv-Cam service tcp-88 tcp-88&lt;/P&gt;&lt;P&gt;access-group allowed_wan_services in interface outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your input and I will mark this correct answer if in fact this works. &amp;nbsp;I'm now having an issue getting to my private IP or pinging it....so once I get that, I think I'll be able to test correctly and upload my findings.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Feb 2015 00:54:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-acls-code-8-4-2/m-p/2646421#M196968</guid>
      <dc:creator>plaethos75</dc:creator>
      <dc:date>2015-02-23T00:54:35Z</dc:date>
    </item>
  </channel>
</rss>

