<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I've added all of these rules in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625761#M197268</link>
    <description>&lt;P&gt;I've added all of these rules via ASDM. &amp;nbsp;Via the ASM it shows them being applied to the interface I need them too (see image attached). &amp;nbsp;Why would this not show via the CLI?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 08 Feb 2015 00:49:52 GMT</pubDate>
    <dc:creator>CSCO12047997</dc:creator>
    <dc:date>2015-02-08T00:49:52Z</dc:date>
    <item>
      <title>ASA - implicit deny issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625755#M197262</link>
      <description>&lt;P&gt;I am having issues with a new ASA deployment.&lt;/P&gt;&lt;P&gt;I have an inside interface connected and routing into my network (I can ping pretty much everything I need to). &amp;nbsp;The issue is the return traffic. &amp;nbsp;All return traffic seems to be being blocked despite the fact I have an ACL rule explicitly allowing it.&lt;/P&gt;&lt;P&gt;When I ran the packet tracer tool it told me my implicit deny rule was blocking the traffic but why would that be the case if I have a rule specifically allowing this traffic?&lt;/P&gt;&lt;P&gt;Since ACLs rules are read in order shouldn't this traffic never even reach the implicit deny?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:28:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625755#M197262</guid>
      <dc:creator>CSCO12047997</dc:creator>
      <dc:date>2019-03-12T05:28:10Z</dc:date>
    </item>
    <item>
      <title>Can you share the config,</title>
      <link>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625756#M197263</link>
      <description>&lt;P&gt;Can you share the config, output of packet tracer and a quick sketch/diagram that shows your layout?&lt;/P&gt;</description>
      <pubDate>Fri, 06 Feb 2015 20:04:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625756#M197263</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2015-02-06T20:04:55Z</dc:date>
    </item>
    <item>
      <title> I am attempting to get</title>
      <link>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625757#M197264</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am attempting to get traffic to ethernet 0/1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Its a basic topology.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA ethernet 0/1 &amp;gt;&amp;gt;&amp;gt; connecting to a 4500 catswitch&amp;nbsp;&lt;/P&gt;&lt;P&gt;- They are directly connected in the correct subnet/vlan&lt;/P&gt;&lt;P&gt;- The ASA can ping out but the switch can't reach the ASA &amp;nbsp;and according to the packet tracer it is because of the implicit deny rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 07 Feb 2015 01:37:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625757#M197264</guid>
      <dc:creator>CSCO12047997</dc:creator>
      <dc:date>2015-02-07T01:37:00Z</dc:date>
    </item>
    <item>
      <title>The packet capture is on the</title>
      <link>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625758#M197265</link>
      <description>&lt;P&gt;The packet capture is on the previous reply.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;At one point (since this is in a test environment) I deactivated all the access rules and added an any any allow yet still when I ran the packet capture it would show as the implicit deny blocking the traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know for a fact that there is connectivity because the ASA can ping out (and both links are fully) but nothing can ping or connect back.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help as soon as possible would be very much appreciated!&lt;/P&gt;</description>
      <pubDate>Sat, 07 Feb 2015 01:37:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625758#M197265</guid>
      <dc:creator>CSCO12047997</dc:creator>
      <dc:date>2015-02-07T01:37:01Z</dc:date>
    </item>
    <item>
      <title>The first thing that sticks</title>
      <link>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625759#M197266</link>
      <description>&lt;P&gt;The first thing that sticks out is that I don't see the configured ACLs being attached to any interfaces with the &lt;B&gt;access-group&amp;nbsp;&lt;/B&gt;command. Do you not have that or did you just not include it in the post?&lt;/P&gt;</description>
      <pubDate>Sat, 07 Feb 2015 02:15:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625759#M197266</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2015-02-07T02:15:08Z</dc:date>
    </item>
    <item>
      <title>I see no rules that would</title>
      <link>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625760#M197267</link>
      <description>&lt;P&gt;I see no rules that would allow 10.20.0.13 -&amp;gt; 10.20.0.200 ICMP traffic whatsoever in your configuration that you provided.&amp;nbsp; The packet-tracer is working correctly.&lt;/P&gt;</description>
      <pubDate>Sat, 07 Feb 2015 02:25:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625760#M197267</guid>
      <dc:creator>David paull</dc:creator>
      <dc:date>2015-02-07T02:25:14Z</dc:date>
    </item>
    <item>
      <title>I've added all of these rules</title>
      <link>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625761#M197268</link>
      <description>&lt;P&gt;I've added all of these rules via ASDM. &amp;nbsp;Via the ASM it shows them being applied to the interface I need them too (see image attached). &amp;nbsp;Why would this not show via the CLI?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 08 Feb 2015 00:49:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625761#M197268</guid>
      <dc:creator>CSCO12047997</dc:creator>
      <dc:date>2015-02-08T00:49:52Z</dc:date>
    </item>
    <item>
      <title>Basically it seems that</title>
      <link>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625762#M197269</link>
      <description>&lt;P&gt;Basically it seems that despite the ACL's being applied to the interfaces in the ASDM they are not reading as applied to the interfaces&amp;nbsp;by ASA. &amp;nbsp;I'm on version 8.0(3) and 6.0(3) respectively. &amp;nbsp;&lt;/P&gt;&lt;P&gt;How can I make these rules work via the ASDM?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 08 Feb 2015 01:43:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625762#M197269</guid>
      <dc:creator>CSCO12047997</dc:creator>
      <dc:date>2015-02-08T01:43:20Z</dc:date>
    </item>
    <item>
      <title>If they show up in ASDM, they</title>
      <link>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625763#M197270</link>
      <description>&lt;P&gt;If they show up in ASDM, they are applied (at least in ASDM 6.4 and 7.1 -- although I had no part in setting up ASDM, maybe this isn't default at my org).&amp;nbsp; Are the rules showing hits in ASDM or is the column to the right all 0's?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You haven't commented on the following:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;I see no rules that would allow 10.20.0.13 -&amp;gt; 10.20.0.200 ICMP traffic whatsoever in your configuration that you provided.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 08 Feb 2015 01:46:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625763#M197270</guid>
      <dc:creator>David paull</dc:creator>
      <dc:date>2015-02-08T01:46:19Z</dc:date>
    </item>
    <item>
      <title>They are showing up as all 0</title>
      <link>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625764#M197271</link>
      <description>&lt;P&gt;They are showing up as all 0's.&lt;/P&gt;&lt;P&gt;Its just odd that they show up as applied on the ASDM but when I use the CLI tool and see the sho run command (pasted earlier in this thread) the ACLs don't show as applied to any interface...&lt;/P&gt;</description>
      <pubDate>Sun, 08 Feb 2015 02:40:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625764#M197271</guid>
      <dc:creator>CSCO12047997</dc:creator>
      <dc:date>2015-02-08T02:40:36Z</dc:date>
    </item>
    <item>
      <title>what if you add an 'icmp</title>
      <link>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625765#M197272</link>
      <description>&lt;P&gt;what if you add an 'icmp inspect' command under inspection_default class?&lt;/P&gt;&lt;P&gt;Also what is the gateway of last resort set to on 4500 switch? What is the default route on 4500 switch?&lt;/P&gt;</description>
      <pubDate>Sun, 08 Feb 2015 22:22:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625765#M197272</guid>
      <dc:creator>APPIREDDY</dc:creator>
      <dc:date>2015-02-08T22:22:03Z</dc:date>
    </item>
    <item>
      <title>I am very confident the</title>
      <link>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625766#M197273</link>
      <description>&lt;P&gt;I am very confident the routing is fine for a few reasons:&lt;/P&gt;&lt;P&gt;1. The traffic coming FROM the ASA has a path to everything it needs to without issue.&lt;/P&gt;&lt;P&gt;2. The link is directly connected and both link lights and protocols are up.&lt;/P&gt;&lt;P&gt;3. The packet tracer explicitly shows that the implicit deny rule is dropping all traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's very frustrating actually because I've put in an allow any any at this point for testing as the top ACL yet even with this the packet tracer is showing the implicit deny is blocking all traffic.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Feb 2015 15:35:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625766#M197273</guid>
      <dc:creator>CSCO12047997</dc:creator>
      <dc:date>2015-02-09T15:35:40Z</dc:date>
    </item>
    <item>
      <title>do not associate access-list</title>
      <link>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625767#M197274</link>
      <description>&lt;P&gt;do not associate access-list&amp;nbsp;to ASA inside interface at all and see what happens.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Feb 2015 17:50:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625767#M197274</guid>
      <dc:creator>APPIREDDY</dc:creator>
      <dc:date>2015-02-09T17:50:53Z</dc:date>
    </item>
    <item>
      <title>sorry i have noticed the</title>
      <link>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625768#M197275</link>
      <description>&lt;P&gt;sorry i have noticed the following&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 14.399998664856px;"&gt;access-list inside_access_in extended permit icmp any any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;change the above as shown below.&lt;/P&gt;

&lt;PRE style="color: rgb(0, 0, 0); line-height: normal;"&gt;
access-list inside_access_in extended permit icmp any any echo-reply 
access-list inside_access_in extended permit icmp any any source-quench 
access-list inside_access_in extended permit icmp any any unreachable 
access-list inside_access_in extended permit icmp any any time-exceeded&lt;/PRE&gt;

&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Feb 2015 17:55:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625768#M197275</guid>
      <dc:creator>APPIREDDY</dc:creator>
      <dc:date>2015-02-09T17:55:52Z</dc:date>
    </item>
    <item>
      <title>Did this.  Made no difference</title>
      <link>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625769#M197276</link>
      <description>&lt;P&gt;Did this. &amp;nbsp;Made no difference.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Feb 2015 18:26:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625769#M197276</guid>
      <dc:creator>CSCO12047997</dc:creator>
      <dc:date>2015-02-09T18:26:14Z</dc:date>
    </item>
    <item>
      <title>Did this as well.  Made no</title>
      <link>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625770#M197277</link>
      <description>&lt;P&gt;Did this as well. &amp;nbsp;Made no difference. &amp;nbsp;having the Access-lists unassociated was the original setting before this morning. &amp;nbsp;I associated it in an attempt to troubleshoot this connectivity issue.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Feb 2015 18:27:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625770#M197277</guid>
      <dc:creator>CSCO12047997</dc:creator>
      <dc:date>2015-02-09T18:27:18Z</dc:date>
    </item>
    <item>
      <title>Turns out the issue was a NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625771#M197278</link>
      <description>&lt;P&gt;Turns out the issue was a NAT created directly with an interface which drops all traffic.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Feb 2015 21:17:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-implicit-deny-issue/m-p/2625771#M197278</guid>
      <dc:creator>CSCO12047997</dc:creator>
      <dc:date>2015-02-09T21:17:33Z</dc:date>
    </item>
  </channel>
</rss>

