<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi,I think you just need to in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/trouble-gettng-tcp-state-bypass-to-function-properly/m-p/2593018#M205868</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I think you just need to configure the TCP state Bypass on the Other ASA device and it will allow the SYN-ACK to go through without dropping it.&lt;/P&gt;&lt;P&gt;This should resolve the issue.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 04 Nov 2014 15:46:47 GMT</pubDate>
    <dc:creator>Vibhor Amrodia</dc:creator>
    <dc:date>2014-11-04T15:46:47Z</dc:date>
    <item>
      <title>Trouble gettng TCP State bypass to function properly</title>
      <link>https://community.cisco.com/t5/network-security/trouble-gettng-tcp-state-bypass-to-function-properly/m-p/2593006#M205856</link>
      <description>&lt;P&gt;I have a situation were we require asymmetrical routing. I have turned on TCP-State-Bypass and if I do a show conn I can see the connection with a B flag&lt;/P&gt;&lt;P&gt;TCP OUTSIDE 10.10.20.15:1157 INSIDE 192.168.135.15:80, idle 0:00:12, bytes 564, flags UIOB&lt;/P&gt;&lt;P&gt;However the connection fails and the syslog gives me this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;ASA-session-6-106015: Deny TCP (no connection) from 192.168.135.15/80 to 10.10.20.15/1159 flags SYN ACK on interface INSIDE&lt;/P&gt;&lt;P&gt;So I get a connection but then I get denied with a SYN ACK which I was under the impression that what TCP-State Bypass did was tell the firewall to ignore these packets and pass them along.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Needless to say the traffic to the web app is failing.&lt;/P&gt;&lt;P&gt;What am I missing I have read everything I can find but I have not been able to figure this out. I am running ASA ver 8.4.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks to all that read and help I am stuck in the mud here and probably overlooking the obvious&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:57:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-gettng-tcp-state-bypass-to-function-properly/m-p/2593006#M205856</guid>
      <dc:creator>Joe Scharbrough</dc:creator>
      <dc:date>2019-03-12T04:57:13Z</dc:date>
    </item>
    <item>
      <title>Hi ,I think there is a</title>
      <link>https://community.cisco.com/t5/network-security/trouble-gettng-tcp-state-bypass-to-function-properly/m-p/2593007#M205857</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;&lt;P&gt;I think there is a misconfiguration in regards to the TCP state Bypass policy as this does not seem to match the interesting traffic.&lt;/P&gt;&lt;P&gt;The Flag for TCP state BYPASS is "b" and not "B" which is for initial SYN from outside. Quite similar &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;You need to verify the configuration and if it is correct you should see the correct flag for the connection. You would also see something quite clear in the syslog that Bypass policy is working.&lt;/P&gt;&lt;P&gt;You can use this command or the packet tracer for checking if the traffic is hitting this policy or not ?&lt;/P&gt;&lt;P&gt;show service-policy flow &amp;lt;&amp;gt;&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/S/cmdref3/s12.html#pgfId-1327492&lt;/P&gt;&lt;P&gt;Let me know if you have any other queries.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Sat, 18 Oct 2014 01:22:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-gettng-tcp-state-bypass-to-function-properly/m-p/2593007#M205857</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-10-18T01:22:59Z</dc:date>
    </item>
    <item>
      <title>Thanks for your reply. I got</title>
      <link>https://community.cisco.com/t5/network-security/trouble-gettng-tcp-state-bypass-to-function-properly/m-p/2593008#M205858</link>
      <description>&lt;P&gt;Thanks for your reply. I got called away to put out more urgent fires and am back on this issue now. I will let you know what I learn. Again thanks for your help&lt;/P&gt;&lt;P&gt;Joe&lt;/P&gt;</description>
      <pubDate>Wed, 22 Oct 2014 16:31:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-gettng-tcp-state-bypass-to-function-properly/m-p/2593008#M205858</guid>
      <dc:creator>Joe Scharbrough</dc:creator>
      <dc:date>2014-10-22T16:31:34Z</dc:date>
    </item>
    <item>
      <title>OK so I cleared out my config</title>
      <link>https://community.cisco.com/t5/network-security/trouble-gettng-tcp-state-bypass-to-function-properly/m-p/2593009#M205859</link>
      <description>&lt;P&gt;OK so I cleared out my config an tried a very simple TCP State bypass with this:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color:#0000FF;"&gt;&lt;SPAN style="font-size: 9px;"&gt;class-map global-class-TCP-ByPass&lt;BR /&gt;&amp;nbsp;match any&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color:#0000FF;"&gt;&lt;SPAN style="font-size: 9px;"&gt;policy-map global-policy&lt;BR /&gt;&amp;nbsp;class global-class-TCP-ByPass&lt;BR /&gt;&amp;nbsp; set connection advanced-options tcp-state-bypass&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color:#0000FF;"&gt;&lt;SPAN style="font-size: 9px;"&gt;service-policy global-policy global&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;When I attempt to access the web page I get this&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color:#0000FF;"&gt;&lt;SPAN style="font-size: 9px;"&gt;ciscoasa# sh conn&lt;BR /&gt;5 in use, 8 most used&lt;BR /&gt;TCP OUTSIDE 10.10.20.15:1086 INSIDE 192.168.135.15:80, idle 0:00:41, bytes 564, flags b&lt;BR /&gt;TCP OUTSIDE 10.10.20.15:1084 INSIDE 192.168.135.15:80, idle 0:02:46, bytes 564, flags b&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;and my syslog shows this:&lt;/P&gt;&lt;P&gt;%ASA-session-6-106015: Deny TCP (no connection) from 192.168.135.15/80 to 10.10.20.15/1090 flags SYN ACK on interface INSIDE&lt;/P&gt;&lt;P&gt;What have I missed?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Oct 2014 16:48:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-gettng-tcp-state-bypass-to-function-properly/m-p/2593009#M205859</guid>
      <dc:creator>Joe Scharbrough</dc:creator>
      <dc:date>2014-10-22T16:48:53Z</dc:date>
    </item>
    <item>
      <title>Hi,I see the connection now</title>
      <link>https://community.cisco.com/t5/network-security/trouble-gettng-tcp-state-bypass-to-function-properly/m-p/2593010#M205860</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I see the connection now being bypassed for the TCP state checks.&lt;/P&gt;&lt;P&gt;As per the syslog , if the show conn output was around the same time , it would explain the issue as the source port 1090 for 10.10.20.15 in the show conn output.&lt;/P&gt;&lt;P&gt;We can actually change the embryonic timeout from default 30 Secs to a higher value.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Thu, 23 Oct 2014 05:21:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-gettng-tcp-state-bypass-to-function-properly/m-p/2593010#M205860</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-10-23T05:21:20Z</dc:date>
    </item>
    <item>
      <title>Still an issue. Something is</title>
      <link>https://community.cisco.com/t5/network-security/trouble-gettng-tcp-state-bypass-to-function-properly/m-p/2593011#M205861</link>
      <description>&lt;P&gt;Still an issue. Something is wrong but I can't see it&lt;/P&gt;&lt;P&gt;this is what I have, trying to keep it simple, this is a proof of concept&amp;nbsp; lab environment prior to moving it to production&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color:#0000FF;"&gt;class-map global-class-tcp=state-bypass&lt;BR /&gt;&amp;nbsp;match any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color:#0000FF;"&gt;policy-map global-policy&lt;BR /&gt;&amp;nbsp;class global-class-tcp=state-bypass&lt;BR /&gt;&amp;nbsp; set connection timeout embryonic 0:00:00 idle 1:00:00&lt;BR /&gt;&amp;nbsp; set connection advanced-options tcp-state-bypass&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color:#0000FF;"&gt;service-policy global-policy global&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;This yields this output:&lt;/P&gt;&lt;P&gt;On the ASA:&lt;/P&gt;&lt;P&gt;ciscoasa# sh conn&lt;BR /&gt;4 in use, 14 most used&lt;BR /&gt;&lt;SPAN style="color:#0000FF;"&gt;TCP OUTSIDE 10.10.20.15:1053 INSIDE 192.168.135.15:80, idle 0:03:08, bytes 570, flags b&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;In syslog:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color:#0000FF;"&gt;%ASA-session-6-302303: Built TCP state-bypass connection 611 from OUTSIDE:10.10.20.15/1053 (10.10.20.15/1053) to INSIDE:192.168.135.15/80 (w.x.y.z /80)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;the next line in the syslog is&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color:#0000FF;"&gt;%ASA-session-6-106015: Deny TCP (no connection) from 192.168.135.15/80 to 10.10.20.15/1054 flags SYN ACK on interface INSIDE&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am not sure where to go. I can see that a TCP state-bypass has been built but the syn ack is there causing a drop.&lt;/P&gt;&lt;P&gt;Very confused. I know I am missing something here. Any clues.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Oct 2014 16:05:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-gettng-tcp-state-bypass-to-function-properly/m-p/2593011#M205861</guid>
      <dc:creator>Joe Scharbrough</dc:creator>
      <dc:date>2014-10-29T16:05:58Z</dc:date>
    </item>
    <item>
      <title>Hi,Would you be able to apply</title>
      <link>https://community.cisco.com/t5/network-security/trouble-gettng-tcp-state-bypass-to-function-properly/m-p/2593012#M205862</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Would you be able to apply capture on the INSIDE and Outside interface on the ASA device for this traffic. Also apply the ASP captures and take the outputs on these captures simultaneously.&lt;/P&gt;&lt;P&gt;ASP captures:-&lt;/P&gt;&lt;P&gt;capture asp type asp-drop all buffer 3333333&lt;/P&gt;&lt;P&gt;Also , is there any NAT for this traffic on the ASA device ?&lt;/P&gt;&lt;P&gt;You can use this Email address also to send these captures:- vamrodia@cisco.com or give me the details of the TAC SR.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Wed, 29 Oct 2014 16:48:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-gettng-tcp-state-bypass-to-function-properly/m-p/2593012#M205862</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-10-29T16:48:23Z</dc:date>
    </item>
    <item>
      <title>Your posts have been</title>
      <link>https://community.cisco.com/t5/network-security/trouble-gettng-tcp-state-bypass-to-function-properly/m-p/2593013#M205863</link>
      <description>&lt;P&gt;Your posts have been extremely helpful. I am using a simulator to test this prior to implementing it in production so I can easily make changes and test different things. I think I have the issue surrounded, now if I can just get it to work.&lt;/P&gt;&lt;P&gt;Here is where I am now.&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" src="http://i57.photobucket.com/albums/g213/jscharbrough/Engineering/TCP-State-Bypass_zps5e56f2c8.jpg" style="width: 640px; height: 316px;" /&gt;&lt;/P&gt;&lt;P&gt;When I do a try to go to the inside website from isp B the health asa shows conn&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color:#0000FF;"&gt;&lt;SPAN style="font-size: 11px;"&gt;Health(config)# sh conn&lt;BR /&gt;4 in use, 15 most used&lt;BR /&gt;TCP OUTSIDE 10.10.20.15:1059 INSIDE 192.168.135.15:80, idle 0:36:14, bytes 0, flags b&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;So I figure the tcp state bypass worked on this ASA&lt;/P&gt;&lt;P&gt;When I look at the ADMIN ASA to see the packets leaving the network Sh Conn shows nothing and the syslog shows&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:10px;"&gt;&lt;SPAN style="color: rgb(0, 0, 255);"&gt;%ASA-session-6-106015: Deny TCP (no connection) from 192.168.135.15/80 to 10.10.20.15/1068 flags SYN ACK on interface INSIDE&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Now what I find interesting is if I add ICMP to the access list TCP State Bypass setup on Admin ASA Ping works with out it I get the syslog error of no matching session and with HTTP I get the no connection SYN ACK.&lt;/P&gt;&lt;P&gt;I have learned so much by doing this but it is not working yet. I think I am very close but I am missing something.&lt;/P&gt;&lt;P&gt;I appreciate your help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Oct 2014 15:25:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-gettng-tcp-state-bypass-to-function-properly/m-p/2593013#M205863</guid>
      <dc:creator>Joe Scharbrough</dc:creator>
      <dc:date>2014-10-30T15:25:41Z</dc:date>
    </item>
    <item>
      <title>Hi,I think it is pretty clear</title>
      <link>https://community.cisco.com/t5/network-security/trouble-gettng-tcp-state-bypass-to-function-properly/m-p/2593014#M205864</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I think it is pretty clear from the topology that the issue is with this design.&lt;/P&gt;&lt;P&gt;Why are you sending the traffic from the inside Network router to these two interface on different ASA devices.&lt;/P&gt;&lt;P&gt;What is the router configuration pointing to the ASA devices ?&lt;/P&gt;&lt;P&gt;Are you doing load balancing on the router ? Please share the configuration from the router.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Fri, 31 Oct 2014 03:36:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-gettng-tcp-state-bypass-to-function-properly/m-p/2593014#M205864</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-10-31T03:36:02Z</dc:date>
    </item>
    <item>
      <title>Ok Let me see if this clears</title>
      <link>https://community.cisco.com/t5/network-security/trouble-gettng-tcp-state-bypass-to-function-properly/m-p/2593015#M205865</link>
      <description>&lt;P&gt;Ok Let me see if this clears things up. I have created a better diagram of the design&lt;IMG alt="" src="http://i57.photobucket.com/albums/g213/jscharbrough/Engineering/tcpstate2_zps74c267a3.jpg" style="width: 640px; height: 422px;" /&gt;&lt;/P&gt;&lt;P&gt;Most of the users enter through the outside address b to get to the Web-APP. This works well. Straight in and out. The issue is with users who must enter through outside address A. They get to the Web-APP but are directed out the Health ASA.&lt;/P&gt;&lt;P&gt;This is exactly as demonstrated in this Cisco Document:http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/conns_tcpstatebypass.html&lt;/P&gt;&lt;P&gt;With this diagram &lt;IMG alt="" src="http://www.cisco.com/c/dam/en/us/td/i/200001-300000/250001-260000/251001-252000/251155.eps/_jcr_content/renditions/251155.jpg" style="width: 351px; height: 282px;" /&gt;&lt;/P&gt;&lt;P&gt;So I am following the TCP State Bypass instructions but when I look at the exiting traffic it is showing this error on the Health ASA:&lt;/P&gt;&lt;P style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;%ASA-session-6-106015: Deny TCP (no connection) from 192.168.135.15/80 to 10.10.20.15/1067 flags SYN ACK on interface INSIDE&lt;/P&gt;&lt;P style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&lt;SPAN style="font-size:14px;"&gt;The same packets received this in the log on ADMIN ASA when they entered the network:&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;%ASA-session-6-302303: Built TCP state-bypass connection 466 from OUTSIDE:10.10.20.15/1066 (10.10.20.15/1066) to INSIDE:192.168.135.15/80 (outside nat /80)&lt;/P&gt;&lt;P style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&lt;SPAN style="font-size:14px;"&gt;According to the article referenced above this should work or am I just reading all this wrong.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&lt;SPAN style="font-size:14px;"&gt;I can't tell you how much I appreciate your helping me understand this&lt;/SPAN&gt;.&lt;/P&gt;&lt;P style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 31 Oct 2014 17:02:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-gettng-tcp-state-bypass-to-function-properly/m-p/2593015#M205865</guid>
      <dc:creator>Joe Scharbrough</dc:creator>
      <dc:date>2014-10-31T17:02:04Z</dc:date>
    </item>
    <item>
      <title>Hi,This clears it up a bit</title>
      <link>https://community.cisco.com/t5/network-security/trouble-gettng-tcp-state-bypass-to-function-properly/m-p/2593016#M205866</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;This clears it up a bit more on the issue.&lt;/P&gt;&lt;P&gt;I think the Bypass is working fine on the Admin ASA and now as the packet [SYN-ACK] on the Health ASA , we would need a similar policy on this ASA to force it to not inspect the sequences of packets received on this Firewall as well as the other one.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Sat, 01 Nov 2014 05:31:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-gettng-tcp-state-bypass-to-function-properly/m-p/2593016#M205866</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-11-01T05:31:42Z</dc:date>
    </item>
    <item>
      <title>Ok I have isolated it to this</title>
      <link>https://community.cisco.com/t5/network-security/trouble-gettng-tcp-state-bypass-to-function-properly/m-p/2593017#M205867</link>
      <description>&lt;P&gt;Ok I have isolated it to this. It builds a tcp state bypass connection on each firewall as long as the packet is coming from the outside. When a packet hits the firewall from the inside there is no building of the tcp bypass connection.&lt;/P&gt;&lt;P&gt;I build this in ASDM and used a global policy which should apply it to all intrerfaces, correct?&lt;/P&gt;&lt;P&gt;I will experiment with the building it on the inside but I think I have already done that and it still fails to show anything at all in the Show Conn and the logs show nothing happening.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 01 Nov 2014 19:54:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-gettng-tcp-state-bypass-to-function-properly/m-p/2593017#M205867</guid>
      <dc:creator>Joe Scharbrough</dc:creator>
      <dc:date>2014-11-01T19:54:29Z</dc:date>
    </item>
    <item>
      <title>Hi,I think you just need to</title>
      <link>https://community.cisco.com/t5/network-security/trouble-gettng-tcp-state-bypass-to-function-properly/m-p/2593018#M205868</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I think you just need to configure the TCP state Bypass on the Other ASA device and it will allow the SYN-ACK to go through without dropping it.&lt;/P&gt;&lt;P&gt;This should resolve the issue.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Nov 2014 15:46:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-gettng-tcp-state-bypass-to-function-properly/m-p/2593018#M205868</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-11-04T15:46:47Z</dc:date>
    </item>
    <item>
      <title>reat now I have packets</title>
      <link>https://community.cisco.com/t5/network-security/trouble-gettng-tcp-state-bypass-to-function-properly/m-p/2593019#M205869</link>
      <description>&lt;P&gt;reat now I have packets flowing but I had do to some extra stuff and I am not sure why I had to do this extra stuff. I am using ASDM 6.4 and IOS ASA 8.4(2) just to clarify&lt;BR /&gt;I could not get it to work by just using ASDM and adding a Service Policy Rule. I also had to add an ACL to the interface and this is somehting that I did not find in any Cisco Dacumentation so I am trying to figure out what I did wrong and why the "text book" iconfiguration did not work.&lt;/P&gt;&lt;P&gt;This is my actual config and it builds the TCP State Bypass and Packets leave the firewall but I have a Syn SynAck RST on the host but more on that later.&lt;BR /&gt;In order to get this to work I had to add this line:&lt;BR /&gt;access-group INSIDE_mpc in interface INSIDE&lt;BR /&gt;I could find no reffernce to this step in any documantation.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color:#0000FF;"&gt;&lt;SPAN style="font-size: 11px;"&gt;ADMIN(config)# sh run&lt;BR /&gt;ASA Version 8.4(2)&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0&lt;BR /&gt;&amp;nbsp;nameif INSIDE&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1&lt;BR /&gt;&amp;nbsp;nameif OUTSIDE&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.121.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;object network webserver&lt;BR /&gt;&amp;nbsp;host 192.168.135.15&lt;BR /&gt;object network outsideNAT&lt;BR /&gt;&amp;nbsp;host 192.168.121.4&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt;&amp;nbsp;service-object icmp&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq www&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq https&lt;BR /&gt;object-group service DM_INLINE_SERVICE_2&lt;BR /&gt;&amp;nbsp;service-object icmp&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq www&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt;&amp;nbsp;protocol-object udp&lt;BR /&gt;&amp;nbsp;protocol-object tcp&lt;BR /&gt;object-group service DM_INLINE_SERVICE_3&lt;BR /&gt;&amp;nbsp;service-object icmp&lt;BR /&gt;&amp;nbsp;service-object tcp-udp destination eq www&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq ftp&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq ftp-data&lt;BR /&gt;access-list OUTSIDE_access_in extended permit object-group DM_INLINE_SERVICE_1 any object webserver log disable&lt;BR /&gt;access-list INSIDE_access_in extended permit object-group DM_INLINE_SERVICE_2 object webserver any log debugging&lt;BR /&gt;access-list INSIDE_access_in extended permit icmp object 135LAN any&lt;BR /&gt;access-list OUTSIDE_access_in_1 extended permit object-group DM_INLINE_SERVICE_3 any object webserver&lt;BR /&gt;access-list INSIDE_access_in_1 extended permit tcp object webserver any eq www inactive&lt;BR /&gt;access-list INSIDE_mpc extended permit tcp object webserver any&lt;BR /&gt;!object network webserver&lt;BR /&gt;&amp;nbsp;nat (any,any) static 192.168.121.3&lt;BR /&gt;!&lt;BR /&gt;nat (INSIDE,OUTSIDE) after-auto source dynamic any interface&lt;BR /&gt;access-group INSIDE_mpc in interface INSIDE&lt;BR /&gt;route OUTSIDE 0.0.0.0 0.0.0.0 192.168.121.1 1&lt;BR /&gt;route INSIDE 192.168.135.0 255.255.255.0 192.168.1.1 1&lt;BR /&gt;!&lt;BR /&gt;class-map global-class&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;class-map TCP-BYPASS&lt;BR /&gt;&amp;nbsp;match access-list INSIDE_mpc&lt;BR /&gt;class-map tcp_bypass&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global-policy&lt;BR /&gt;&amp;nbsp;class global-class&lt;BR /&gt;&amp;nbsp; inspect http&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;policy-map INSIDE-policy&lt;BR /&gt;&amp;nbsp;class TCP-BYPASS&lt;BR /&gt;&amp;nbsp; set connection timeout embryonic 0:00:00 idle 1:00:00&lt;BR /&gt;&amp;nbsp; set connection advanced-options tcp-state-bypass&lt;BR /&gt;!&lt;BR /&gt;service-policy global-policy global&lt;BR /&gt;service-policy INSIDE-policy interface INSIDE&lt;BR /&gt;: end&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;So now the packets do flow and I have TCP State bypass working, but on the host that originates the request the webpage fails to show up. I get this in Wireshark&lt;BR /&gt;&lt;SPAN style="font-size:10px;"&gt;334&amp;nbsp;&amp;nbsp; &amp;nbsp;13:45:57.977250&amp;nbsp;&amp;nbsp; &amp;nbsp;10.10.20.15&amp;nbsp;&amp;nbsp; &amp;nbsp;172.16.15.244&amp;nbsp;&amp;nbsp; &amp;nbsp;TCP&amp;nbsp;&amp;nbsp; &amp;nbsp;62&amp;nbsp;&amp;nbsp; &amp;nbsp;web2host &amp;gt; http [SYN] Seq=0 Win=64240 Len=0 MSS=1460 SACK_PERM=1&lt;BR /&gt;335&amp;nbsp;&amp;nbsp; &amp;nbsp;13:45:58.127720&amp;nbsp;&amp;nbsp; &amp;nbsp;192.168.121.3&amp;nbsp;&amp;nbsp; &amp;nbsp;10.10.20.15&amp;nbsp;&amp;nbsp; &amp;nbsp;TCP&amp;nbsp;&amp;nbsp; &amp;nbsp;62&amp;nbsp;&amp;nbsp; &amp;nbsp;http &amp;gt; web2host [SYN, ACK] Seq=0 Ack=0 Win=64240 Len=0 MSS=1460 SACK_PERM=1&lt;BR /&gt;336&amp;nbsp;&amp;nbsp; &amp;nbsp;13:45:58.127743&amp;nbsp;&amp;nbsp; &amp;nbsp;10.10.20.15&amp;nbsp;&amp;nbsp; &amp;nbsp;192.168.121.3&amp;nbsp;&amp;nbsp; &amp;nbsp;TCP&amp;nbsp;&amp;nbsp; &amp;nbsp;54&amp;nbsp;&amp;nbsp; &amp;nbsp;web2host &amp;gt; http [RST] Seq=0 Win=0 Len=0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;What do I need to do to get past this last step. I am just starting to read about policy Nat. Is that something I should explore.&lt;/P&gt;&lt;P&gt;Thanks again for all your help&lt;BR /&gt;Joe&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Nov 2014 19:15:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-gettng-tcp-state-bypass-to-function-properly/m-p/2593019#M205869</guid>
      <dc:creator>Joe Scharbrough</dc:creator>
      <dc:date>2014-11-04T19:15:02Z</dc:date>
    </item>
    <item>
      <title>Hi,I don't think you would</title>
      <link>https://community.cisco.com/t5/network-security/trouble-gettng-tcp-state-bypass-to-function-properly/m-p/2593020#M205870</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I don't think you would need that ACL on the Inside Interface.&lt;/P&gt;&lt;P&gt;Also , can you please provide the Wireshark Captures and IP address information for the Client and Server.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Thu, 06 Nov 2014 10:12:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-gettng-tcp-state-bypass-to-function-properly/m-p/2593020#M205870</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-11-06T10:12:23Z</dc:date>
    </item>
  </channel>
</rss>

