<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi John,Yes first we need to in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558575#M203677</link>
    <description>&lt;P&gt;Hi John,&lt;/P&gt;&lt;P&gt;Yes first we need to create ACL called CAP (just a name) and call that during capture , it's interesting you are not hits for the mail traffic.&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can include only smtp related traffic in the access-list you create and double check if no traffic is hitting that if that is the case then we may have it take a different direction(could be routing or any other issue we don't know yet)&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Murali&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 19 Nov 2014 08:11:46 GMT</pubDate>
    <dc:creator>Murali</dc:creator>
    <dc:date>2014-11-19T08:11:46Z</dc:date>
    <item>
      <title>Incoming SMTP issue with an ASA5512-X</title>
      <link>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558570#M203672</link>
      <description>&lt;P&gt;I have reviewed numerous support discussions on this particular issue, but I am still unable to&amp;nbsp;properly configure my ASA 5512-X to receive SMTP email. I can send email, and have access to all other services that I setup. &amp;nbsp;I did create a network object for my Mail server and&amp;nbsp;I am fairly certain this issue has something to do with my static NAT setup.&lt;/P&gt;&lt;P&gt;My current configuration is listed below...any assistance would be greatly appreciated.&lt;/P&gt;&lt;P&gt;I am new to the Cisco ASA appliance, and I am learning CLI as I go. &amp;nbsp;I also have&amp;nbsp;ADSM setup. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CONFIGURATION:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;: Hardware: &amp;nbsp; ASA5512, 4096 MB RAM, CPU Clarkdale 2792 MHz, 1 CPU (2 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.3(1)&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;nameif Verizon&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 100.39.18.94 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;description Local Norco Domain&lt;BR /&gt;&amp;nbsp;nameif Norco.local&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.0.0.10 255.255.255.0&lt;BR /&gt;&amp;nbsp;dhcprelay server 10.0.0.1&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp;description SCE-DRAS SERVER&lt;BR /&gt;&amp;nbsp;nameif SCE-DRAS&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa931-smp-k8.bin&lt;BR /&gt;boot system disk0:/asa912-smp-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup Verizon&lt;BR /&gt;dns domain-lookup Norco.local&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;name-server 10.0.0.1&lt;BR /&gt;&amp;nbsp;name-server 68.238.96.12&lt;BR /&gt;&amp;nbsp;name-server 68.238.64.12&lt;BR /&gt;&amp;nbsp;domain-name norco.local&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object service HTTP-19560&lt;BR /&gt;&amp;nbsp;service tcp destination eq 19560&lt;BR /&gt;object service HTTP-65535&lt;BR /&gt;&amp;nbsp;service tcp destination eq 65535&lt;BR /&gt;object service HTTP-8933&lt;BR /&gt;&amp;nbsp;service tcp destination eq 8933&lt;BR /&gt;object service HTTP-8943&lt;BR /&gt;&amp;nbsp;service tcp destination eq 8943&lt;BR /&gt;object service RTP&lt;BR /&gt;&amp;nbsp;service udp destination range 19560 65535&lt;BR /&gt;object service SIP-TCP-8943&lt;BR /&gt;&amp;nbsp;service tcp destination range 8933 8943&lt;BR /&gt;&amp;nbsp;description IPPHONE - SIP&lt;BR /&gt;object service SIP-UDP-8943&lt;BR /&gt;&amp;nbsp;service udp destination range 8933 8943&lt;BR /&gt;&amp;nbsp;description IPPHONE - SIP&lt;BR /&gt;object service smtp&lt;BR /&gt;&amp;nbsp;service tcp destination eq smtp&lt;BR /&gt;object network SMTP-SERVER&lt;BR /&gt;&amp;nbsp;host 10.0.0.1&lt;BR /&gt;object-group network IPHONE-SERVERS&lt;BR /&gt;&amp;nbsp;description VERIZON IP-PHONE SERVERS&lt;BR /&gt;&amp;nbsp;network-object 128.177.14.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 128.177.36.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object host 199.19.195.241&lt;BR /&gt;&amp;nbsp;network-object host 199.19.195.243&lt;BR /&gt;&amp;nbsp;network-object host 199.19.195.250&lt;BR /&gt;object-group service GENERAL-ACCESS tcp&lt;BR /&gt;&amp;nbsp;description GENERAL SERVICES ACCESS&lt;BR /&gt;&amp;nbsp;port-object eq ftp&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;&amp;nbsp;port-object eq smtp&lt;BR /&gt;object-group service IP-PHONE-SERVICE&lt;BR /&gt;&amp;nbsp;description PHONE SYSTEM ACCESS RULES&lt;BR /&gt;&amp;nbsp;service-object object HTTP-19560&lt;BR /&gt;&amp;nbsp;service-object object HTTP-65535&lt;BR /&gt;&amp;nbsp;service-object object HTTP-8933&lt;BR /&gt;&amp;nbsp;service-object object HTTP-8943&lt;BR /&gt;&amp;nbsp;service-object object RTP&lt;BR /&gt;&amp;nbsp;service-object object SIP-TCP-8943&lt;BR /&gt;&amp;nbsp;service-object object SIP-UDP-8943&lt;BR /&gt;&amp;nbsp;service-object tcp-udp destination eq 1025&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq www&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq https&lt;BR /&gt;&amp;nbsp;service-object udp destination eq domain&lt;BR /&gt;&amp;nbsp;service-object udp destination eq ntp&lt;BR /&gt;&amp;nbsp;service-object tcp-udp destination eq domain&lt;BR /&gt;&amp;nbsp;service-object tcp-udp destination eq www&lt;BR /&gt;&amp;nbsp;service-object tcp-udp destination eq sip&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq domain&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq smtp&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq ssh&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq telnet&lt;BR /&gt;&amp;nbsp;service-object udp destination eq dnsix&lt;BR /&gt;&amp;nbsp;service-object udp destination eq www&lt;BR /&gt;object-group service General-TCP-UDP-Access&lt;BR /&gt;&amp;nbsp;service-object tcp-udp destination eq domain&lt;BR /&gt;&amp;nbsp;service-object tcp-udp destination eq www&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq domain&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq ftp&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq www&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq https&lt;BR /&gt;&amp;nbsp;service-object udp destination eq www&lt;BR /&gt;&amp;nbsp;service-object udp destination eq ntp&lt;BR /&gt;&amp;nbsp;service-object udp destination eq radius&lt;BR /&gt;access-list Verizon_access_in extended permit object-group IP-PHONE-SERVICE object-group IPHONE-SERVERS any&lt;BR /&gt;access-list Verizon_access_in extended permit tcp any object SMTP-SERVER eq smtp&lt;BR /&gt;access-list Verizon_access_out extended permit object-group IP-PHONE-SERVICE any object-group IPHONE-SERVERS&lt;BR /&gt;access-list Verizon_access_out extended permit object-group General-TCP-UDP-Access any any&lt;BR /&gt;access-list Verizon_access_out extended permit tcp any any eq smtp&lt;BR /&gt;access-list SCE-DRAS_access_out extended permit ip any any&lt;BR /&gt;access-list SCE-DRAS_access_in extended permit ip any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu Verizon 1500&lt;BR /&gt;mtu Norco.local 1500&lt;BR /&gt;mtu SCE-DRAS 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;ip verify reverse-path interface Verizon&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-731-101.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (Norco.local,Verizon) source dynamic any interface&lt;BR /&gt;nat (SCE-DRAS,Verizon) source dynamic any interface&lt;BR /&gt;!&lt;BR /&gt;object network SMTP-SERVER&lt;BR /&gt;&amp;nbsp;nat (Norco.local,Verizon) static interface service tcp smtp smtp&lt;BR /&gt;access-group Verizon_access_in in interface Verizon&lt;BR /&gt;access-group Verizon_access_out out interface Verizon&lt;BR /&gt;access-group SCE-DRAS_access_in in interface SCE-DRAS&lt;BR /&gt;access-group SCE-DRAS_access_out out interface SCE-DRAS&lt;BR /&gt;route Verizon 0.0.0.0 0.0.0.0 100.39.18.1 1&lt;BR /&gt;route Norco.local 10.10.0.0 255.255.255.0 10.0.0.7 2&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;http 10.0.0.0 255.255.255.0 Norco.local&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;&amp;nbsp;no validation-usage&lt;BR /&gt;&amp;nbsp;crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_Launcher_Access_TrustPoint_0&lt;BR /&gt;&amp;nbsp;enrollment self&lt;BR /&gt;&amp;nbsp;subject-name CN=10.0.0.10,CN=ciscoasa&lt;BR /&gt;&amp;nbsp;crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_Launcher_Access_TrustPoint_1&lt;BR /&gt;&amp;nbsp;enrollment self&lt;BR /&gt;&amp;nbsp;subject-name CN=10.0.0.10,CN=ciscoasa&lt;BR /&gt;&amp;nbsp;crl configure&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd update dns both override&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.10.2-192.168.10.5 SCE-DRAS&lt;BR /&gt;dhcpd dns 68.238.96.12 68.238.64.12 interface SCE-DRAS&lt;BR /&gt;dhcpd enable SCE-DRAS&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.10 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;dhcprelay information trust-all&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection scanning-threat&lt;BR /&gt;threat-detection statistics host&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ssl encryption rc4-sha1 aes128-sha1 aes256-sha1 3des-sha1&lt;BR /&gt;ssl trust-point ASDM_Launcher_Access_TrustPoint_1 Norco.local&lt;BR /&gt;ssl trust-point ASDM_Launcher_Access_TrustPoint_1 Norco.local vpnlb-ip&lt;BR /&gt;webvpn&lt;BR /&gt;&amp;nbsp;anyconnect-essentials&lt;BR /&gt;&amp;nbsp;no error-recovery disable&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; user-statistics accounting&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;smtp-server 10.0.0.1&lt;BR /&gt;prompt hostname context&lt;BR /&gt;service call-home&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:05:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558570#M203672</guid>
      <dc:creator>khyron1969</dc:creator>
      <dc:date>2019-03-12T05:05:28Z</dc:date>
    </item>
    <item>
      <title>Did you disable rsmtp</title>
      <link>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558571#M203673</link>
      <description>&lt;P&gt;Did you disable rsmtp inspection in the default global policy ? if yes can enable and check once.&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;Murali&lt;/P&gt;</description>
      <pubDate>Mon, 17 Nov 2014 01:57:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558571#M203673</guid>
      <dc:creator>Murali</dc:creator>
      <dc:date>2014-11-17T01:57:19Z</dc:date>
    </item>
    <item>
      <title>Hi Murali, My apologies for</title>
      <link>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558572#M203674</link>
      <description>&lt;P&gt;Hi Murali,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My apologies for the delayed response...were you referring to esmtp inspection?&lt;/P&gt;&lt;P&gt;I did originally disable ESMTP inspection, I just tried re-enabling but am still having the same issue...outgoing email is working, incoming is not.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Nov 2014 19:04:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558572#M203674</guid>
      <dc:creator>khyron1969</dc:creator>
      <dc:date>2014-11-17T19:04:17Z</dc:date>
    </item>
    <item>
      <title>Hi John,My bad i meant esmtp</title>
      <link>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558573#M203675</link>
      <description>&lt;P&gt;Hi John,&lt;/P&gt;&lt;P&gt;My bad i meant esmtp .config related to your snmp server looks good to me. If you can try packet capture and post it here that should give us something to look at.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;capture TEST access-list CAP&lt;/P&gt;&lt;P&gt;show capture TEST&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Murali&lt;/P&gt;</description>
      <pubDate>Tue, 18 Nov 2014 17:24:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558573#M203675</guid>
      <dc:creator>Murali</dc:creator>
      <dc:date>2014-11-18T17:24:50Z</dc:date>
    </item>
    <item>
      <title>Hi Murali,I attempted the</title>
      <link>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558574#M203676</link>
      <description>&lt;P&gt;Hi Murali,&lt;/P&gt;&lt;P&gt;I attempted the capture via CLI using the command:&lt;/P&gt;&lt;P&gt;capture TEST access-list Verizon_access_in&lt;/P&gt;&lt;P&gt;but the show capture TEST results were 0 packets captured.&lt;/P&gt;&lt;P&gt;I used the ASDM packet capture wizard and posted those results...during the capture I sent&amp;nbsp;several test emails from the outside in.&amp;nbsp; It doesn't appear that anything with service SMTP ever hits the incoming access-list.&amp;nbsp; The traffic appears to be all phone traffic.&lt;/P&gt;&lt;P&gt;For the CLI, should I have created a new temporary access-list called CAP for all ip traffic?&lt;/P&gt;&lt;P&gt;Thanks and take care,&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Nov 2014 19:22:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558574#M203676</guid>
      <dc:creator>khyron1969</dc:creator>
      <dc:date>2014-11-18T19:22:23Z</dc:date>
    </item>
    <item>
      <title>Hi John,Yes first we need to</title>
      <link>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558575#M203677</link>
      <description>&lt;P&gt;Hi John,&lt;/P&gt;&lt;P&gt;Yes first we need to create ACL called CAP (just a name) and call that during capture , it's interesting you are not hits for the mail traffic.&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can include only smtp related traffic in the access-list you create and double check if no traffic is hitting that if that is the case then we may have it take a different direction(could be routing or any other issue we don't know yet)&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Murali&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Nov 2014 08:11:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558575#M203677</guid>
      <dc:creator>Murali</dc:creator>
      <dc:date>2014-11-19T08:11:46Z</dc:date>
    </item>
    <item>
      <title>Hi Murali,I played with this</title>
      <link>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558576#M203679</link>
      <description>&lt;P&gt;Hi Murali,&lt;/P&gt;&lt;P&gt;I played with this for a bit today...I created a capture and access list for only smtp traffic. The results are included below...I sent three test emails...all three&amp;nbsp;generated an immediate RST.&amp;nbsp; The packets were captured on the Verizon interface&lt;/P&gt;&lt;P&gt;Thanks and Take care,&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Wed, 19 Nov 2014 22:08:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558576#M203679</guid>
      <dc:creator>khyron1969</dc:creator>
      <dc:date>2014-11-19T22:08:33Z</dc:date>
    </item>
    <item>
      <title>Hello John,I reviewed the</title>
      <link>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558577#M203680</link>
      <description>&lt;P&gt;Hello John,&lt;/P&gt;&lt;P&gt;I reviewed the packet capture and i suspect issue could be related ASA tcp source port randomization. Now by DEFAULT tcp randomization is enabled and what it does is to improve the security ASA intercepts the client connections and randomizes the source port so that tcp source port prediction based hijacking/attacks can be prevented but i guess ASA will not do randomization for NATed address so i think we are sending the same source port number and as a results because it maintains the state table RST are happening .&lt;/P&gt;&lt;P&gt;If possible could you disable TCP randomization feature only for SMTP traffic and check if it works for you ?&lt;/P&gt;&lt;P&gt;You can use below example ( you can be as specific as you want for the ACL)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) access-list SMTP_ACL extended permit tcp host 100.39.18.94 any eq smtp&lt;/P&gt;&lt;P&gt;2) class-map SMTP_CLASS&lt;BR /&gt;&amp;nbsp;match access-list SMTP_CAP&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;3) policy-map SMTP_POLICY&lt;BR /&gt;&amp;nbsp;class SMTP_CLASS&lt;BR /&gt;&amp;nbsp;set connection random-sequence-number disable&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;Murali&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Nov 2014 19:33:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558577#M203680</guid>
      <dc:creator>Murali</dc:creator>
      <dc:date>2014-11-20T19:33:16Z</dc:date>
    </item>
    <item>
      <title>Hi Murali,I setup the access</title>
      <link>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558578#M203682</link>
      <description>&lt;P&gt;Hi Murali,&lt;/P&gt;&lt;P&gt;I setup the access-list, class-map, and policy-map as indicated above, but it did not fix the problem...&lt;/P&gt;&lt;P&gt;Unfortunately, I realized I was incorrect in my statement yesterday...I rechecked the file I uploaded (as I captured additional data today after the additions above)...and noted that there is incoming SMTP traffic that&amp;nbsp;appears to be passing through the outside interface...It was a coincidence that I sent three emails and had 3 RST responses...I checked the addresses for those 3 RST packets and they were not from me...the ones I sent generated a SYN.&lt;/P&gt;&lt;P&gt;I have yet to run a capture on the internal interface...I'll perform a capture and see if I find anything...if I do I'll upload the file...&lt;/P&gt;&lt;P&gt;Thanks for your assistance and patience.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Nov 2014 23:17:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558578#M203682</guid>
      <dc:creator>khyron1969</dc:creator>
      <dc:date>2014-11-20T23:17:40Z</dc:date>
    </item>
    <item>
      <title>Hi Murali,I captured the data</title>
      <link>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558579#M203685</link>
      <description>&lt;P&gt;Hi Murali,&lt;/P&gt;&lt;P&gt;I captured the data from the inside (Norco.local) interface and there is only outgoing smtp traffic...I wondering if there is an issue with my NAT and routing of the SMTP traffic...&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Nov 2014 23:42:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558579#M203685</guid>
      <dc:creator>khyron1969</dc:creator>
      <dc:date>2014-11-20T23:42:25Z</dc:date>
    </item>
    <item>
      <title>Hello John, Could you confirm</title>
      <link>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558580#M203687</link>
      <description>&lt;P&gt;Hello John,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you confirm if you've used the correct ACL's to capture the traffic because as you said we only see outgoing SMTP traffic in the capture.&lt;/P&gt;&lt;P&gt;If not you can create another ACL that has source as outside (if you know the ip mention it otherwise say any ) destination as inside for smtp port.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;Murali.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;P.S: As we are in two different timezones it's taking sometime to fix your issue . I feel sorry for that&lt;/P&gt;</description>
      <pubDate>Fri, 21 Nov 2014 07:41:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558580#M203687</guid>
      <dc:creator>Murali</dc:creator>
      <dc:date>2014-11-21T07:41:09Z</dc:date>
    </item>
    <item>
      <title>Also i realized we didn't</title>
      <link>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558581#M203688</link>
      <description>&lt;P&gt;Also i realized we didn't check the packet-tracer results till now , please check that as well.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Nov 2014 07:57:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558581#M203688</guid>
      <dc:creator>Murali</dc:creator>
      <dc:date>2014-11-21T07:57:30Z</dc:date>
    </item>
    <item>
      <title>Hi Murali,My apologies...I</title>
      <link>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558582#M203689</link>
      <description>&lt;P&gt;Hi Murali,&lt;/P&gt;&lt;P&gt;My apologies...I probably should have provided the ACL I used for the uploads:&lt;/P&gt;&lt;P&gt;For the first upload&amp;nbsp;I used (file ASA_CAP-2.txt):&lt;/P&gt;&lt;P&gt;access-list asa_cap extended permit tcp any4 any4 eq smtp&lt;/P&gt;&lt;P&gt;cap asa_cap interface verizon access-list asa_cap&lt;/P&gt;&lt;P&gt;This appears to show both inbound and outbound SMTP traffic on the outside interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For the second upload I used (file ASA_CAP-6.txt):&lt;/P&gt;&lt;P&gt;access-list asa_cap extended permit tcp any4 any4 eq smtp&lt;/P&gt;&lt;P&gt;cap asa_cap interface&amp;nbsp;Norco.local access-list asa_cap&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This appears to show only outbound SMTP traffic on the inside interface...nothing coming in.&lt;/P&gt;&lt;P&gt;I'll re-examine and see if I missed anything though...and I'll look at the packet-tracer results as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No worries about the time-zones...as a newbie to ASA I've been trying to figure this out for several weeks, so I'm currently switching between a working cisco SA-520 and the ASA5512-x.&amp;nbsp; I can only "play" for a short time here and there during the course of the day&amp;nbsp;as I learn, so the pace is actually working out just fine. I am appreciative of your efforts and assistance...&lt;/P&gt;&lt;P&gt;Take care,&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Nov 2014 15:48:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558582#M203689</guid>
      <dc:creator>khyron1969</dc:creator>
      <dc:date>2014-11-21T15:48:15Z</dc:date>
    </item>
    <item>
      <title>Hi Murali,I ran the packet</title>
      <link>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558583#M203691</link>
      <description>&lt;P&gt;Hi Murali,&lt;/P&gt;&lt;P&gt;I ran the packet tracer routine...please let me know if I did this correctly...the results are below. &amp;nbsp;The results indicate the traffic is denied by the implicit rule, but I'm not sure why....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# packet-tracer input verizon tcp 209.85.213.176 smtp 100.39.18.94 smtp&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; 100.39.18.94 &amp;nbsp; &amp;nbsp;255.255.255.255 identity&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; via 100.39.18.1, Verizon&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: Verizon&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Sat, 22 Nov 2014 02:23:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558583#M203691</guid>
      <dc:creator>khyron1969</dc:creator>
      <dc:date>2014-11-22T02:23:03Z</dc:date>
    </item>
    <item>
      <title>Hi,The issue is actually with</title>
      <link>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558584#M203692</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;The issue is actually with the order of NAT statements that's why you see the drop on the ASA device for the packet tracer.&lt;/P&gt;&lt;P&gt;Change the Order of NAT statement and that should fix this issue:-&lt;/P&gt;&lt;P&gt;nat (Norco.local,Verizon) source dynamic any interface&lt;BR /&gt;nat (SCE-DRAS,Verizon) source dynamic any interface&lt;BR /&gt;!&lt;BR /&gt;object network SMTP-SERVER&lt;BR /&gt;&amp;nbsp;nat (Norco.local,Verizon) static interface service tcp smtp smtp&lt;/P&gt;&lt;P&gt;Change the Manual NAT for Dynamic to Auto NAT:-&lt;/P&gt;&lt;P&gt;object network 0.0.0.0&lt;/P&gt;&lt;P&gt;subnet 0 0&lt;/P&gt;&lt;P&gt;nat (Norco.local,Verizon) dynamic interface&lt;/P&gt;&lt;P&gt;object network 0.0.0.0-1&lt;/P&gt;&lt;P&gt;subnet 0 0&lt;/P&gt;&lt;P&gt;nat (SCE-DRAS,Verizon) dynamic interface&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Sat, 22 Nov 2014 09:20:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558584#M203692</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-11-22T09:20:37Z</dc:date>
    </item>
    <item>
      <title>Hey John,Actually Vibhor made</title>
      <link>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558585#M203694</link>
      <description>&lt;P&gt;Hey John,&lt;/P&gt;&lt;P&gt;Actually Vibhor made a good point here , because we are overloading the same external interface it is better to put the most specific first in the first in nat order.&lt;/P&gt;&lt;P&gt;If you see below as we are doing static nat for our smtp server for smtp service that should be first in the order of nat flow that we you can determine/confirm using "show&amp;nbsp; nat" command and you can change it by giving nat &amp;lt;number&amp;gt; or as you are already familer with asdm you can simply click on them to change the order.&lt;/P&gt;&lt;P&gt;I guess why we are seeing drop in acl is we only allowed smtp traffic on the outside interface going to SMTP_SERVER so if it's in the right NAT order only then it'll allow.&lt;/P&gt;&lt;P&gt;It's worth a shot , please try and let us know if its fixes the issue.&lt;/P&gt;&lt;P&gt;nat (Norco.local,Verizon) source dynamic any interface&lt;BR /&gt;nat (SCE-DRAS,Verizon) source dynamic any interface&lt;BR /&gt;!&lt;BR /&gt;object network SMTP-SERVER&lt;BR /&gt;&amp;nbsp;nat (Norco.local,Verizon) static interface service tcp smtp smtp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Murali.&lt;/P&gt;</description>
      <pubDate>Sat, 22 Nov 2014 14:18:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558585#M203694</guid>
      <dc:creator>Murali</dc:creator>
      <dc:date>2014-11-22T14:18:45Z</dc:date>
    </item>
    <item>
      <title>Thanks Vibhor and Murali,The</title>
      <link>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558586#M203696</link>
      <description>&lt;P&gt;Thanks Vibhor and Murali,&lt;/P&gt;&lt;P&gt;The problem has been resolved!&lt;/P&gt;&lt;P&gt;As I did my research into this issue, I saw numerous posting about ensuring the proper order for NAT...I made a bad assumption that the NAT rule for a network object was treated independent of a standard NAT rule, so I never even looked at the order...&lt;/P&gt;&lt;P&gt;I appreciate the efforts from both parties as I learned quite a bit from the experience.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks and regards,&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Sat, 22 Nov 2014 23:52:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/incoming-smtp-issue-with-an-asa5512-x/m-p/2558586#M203696</guid>
      <dc:creator>khyron1969</dc:creator>
      <dc:date>2014-11-22T23:52:05Z</dc:date>
    </item>
  </channel>
</rss>

