<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic hi Marius,I added the same in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cannot-tftp-image-from-ios-rommon-prompt-via-asa-device/m-p/2509005#M225724</link>
    <description>&lt;P&gt;hi Marius,&lt;/P&gt;&lt;P&gt;I added the same-security-traffic permit inter-interface command. still cannot tftp. &amp;nbsp;Attached pic of my setup with the config&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 19 Sep 2014 13:01:04 GMT</pubDate>
    <dc:creator>jgohil</dc:creator>
    <dc:date>2014-09-19T13:01:04Z</dc:date>
    <item>
      <title>Cannot tftp image from IOS rommon prompt via ASA device</title>
      <link>https://community.cisco.com/t5/network-security/cannot-tftp-image-from-ios-rommon-prompt-via-asa-device/m-p/2509003#M225721</link>
      <description>&lt;P&gt;Need help configuring ASA to allow tftp download: cannot download tftp timesout Device 1 --&amp;gt; (Port 9 )Device 2 --&amp;gt; port 1(Device 2 ) --&amp;gt; switch --&amp;gt; tftp server Device 1 is sitting at rommon prompt. I would like to download an image to device 1. Device 1 configuration at rommon prompt is shown below: ap: set DEFAULT_ROUTER=192.168.10.1 IOS_STATIC_DEFAULT_GATEWAY=192.168.10.1 IOS_STATIC_IP_ADDR=192.168.10.2 IOS_STATIC_NETMASK=255.255.255.0 IP_ADDR=192.168.10.1 NETMASK=255.255.255.0 SERVERIP=171.70.42.151 Device 1 is connected to an ASA unit on port 9. ASA configuration is shown below. ciscoasa(config-if)# show run : Saved : : Serial Number: JAD18330047 : Hardware: ASA5506W, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores) : ASA Version 100.12(10)44 ! hostname ciscoasa enable password 8Ry2YjIyt7RRXU24 encrypted names ! interface GigabitEthernet1/1 nameif g1 security-level 0 ip address 172.24.22.49 255.255.0.0 ! interface GigabitEthernet1/2 shutdown no nameif no security-level no ip address ! interface GigabitEthernet1/3 shutdown no nameif no security-level no ip address ! interface GigabitEthernet1/4 shutdown no nameif no security-level no ip address ! interface GigabitEthernet1/5 shutdown no nameif no security-level no ip address ! interface GigabitEthernet1/6 shutdown no nameif no security-level no ip address ! interface GigabitEthernet1/7 shutdown no nameif no security-level no ip address ! interface GigabitEthernet1/8 shutdown no nameif no security-level no ip address ! interface GigabitEthernet1/9 nameif g9 security-level 0 ip address 192.168.10.1 255.255.255.0 ! interface Management1/1 management-only shutdown no nameif no security-level no ip address ! ftp mode passive pager lines 24 mtu g1 1500 mtu g9 1500 icmp unreachable rate-limit 1 burst-size 1 no asdm history enable arp timeout 14400 no arp permit-nonconnected timeout xlate 3:00:00 timeout pat-xlate 0:00:30 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute timeout tcp-proxy-reassembly 0:01:00 timeout floating-conn 0:00:00 user-identity default-domain LOCAL no snmp-server location no snmp-server contact service sw-reset-button crypto ipsec security-association pmtu-aging infinite crypto ca trustpool policy telnet timeout 5 no ssh stricthostkeycheck ssh timeout 5 ssh key-exchange group dh-group1-sha1 console timeout 0 threat-detection basic-threat threat-detection statistics access-list no threat-detection statistics tcp-intercept dynamic-access-policy-record DfltAccessPolicy ! class-map inspection_default match default-inspection-traffic ! ! policy-map type inspect dns preset_dns_map parameters message-length maximum client auto message-length maximum 512 policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect rsh inspect rtsp inspect esmtp inspect sqlnet inspect skinny inspect sunrpc inspect xdmcp inspect sip inspect netbios inspect tftp inspect ip-options ! service-policy global_policy global prompt hostname context no call-home reporting anonymous Cryptochecksum:8a78f7d952a22f621855c62baecd3b2d : end Device 2 port 1 is connected to switch 172.24.22.49 ( and can access 171.70.42.151 tftp server ) Device 2 port 9 is connected to Device 1 192.168.10.2 I need to tftp image from device 1 rommon prompt using the following command: ( ap: copy tftp://171.70.42.151/auto/tftp-users/filename flash:filename)&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:46:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-tftp-image-from-ios-rommon-prompt-via-asa-device/m-p/2509003#M225721</guid>
      <dc:creator>jgohil</dc:creator>
      <dc:date>2019-03-12T04:46:53Z</dc:date>
    </item>
    <item>
      <title>you are missing the command</title>
      <link>https://community.cisco.com/t5/network-security/cannot-tftp-image-from-ios-rommon-prompt-via-asa-device/m-p/2509004#M225723</link>
      <description>&lt;P&gt;you are missing the command &lt;STRONG&gt;same-security-traffic permit inter-interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;add that and see if you are now able to tftp through the ASA.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Fri, 19 Sep 2014 07:11:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-tftp-image-from-ios-rommon-prompt-via-asa-device/m-p/2509004#M225723</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-09-19T07:11:37Z</dc:date>
    </item>
    <item>
      <title>hi Marius,I added the same</title>
      <link>https://community.cisco.com/t5/network-security/cannot-tftp-image-from-ios-rommon-prompt-via-asa-device/m-p/2509005#M225724</link>
      <description>&lt;P&gt;hi Marius,&lt;/P&gt;&lt;P&gt;I added the same-security-traffic permit inter-interface command. still cannot tftp. &amp;nbsp;Attached pic of my setup with the config&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Sep 2014 13:01:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-tftp-image-from-ios-rommon-prompt-via-asa-device/m-p/2509005#M225724</guid>
      <dc:creator>jgohil</dc:creator>
      <dc:date>2014-09-19T13:01:04Z</dc:date>
    </item>
    <item>
      <title>Are you able to ping the tftp</title>
      <link>https://community.cisco.com/t5/network-security/cannot-tftp-image-from-ios-rommon-prompt-via-asa-device/m-p/2509006#M225725</link>
      <description>Are you able to ping the tftp server from the wlan?</description>
      <pubDate>Fri, 19 Sep 2014 20:53:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-tftp-image-from-ios-rommon-prompt-via-asa-device/m-p/2509006#M225725</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-09-19T20:53:09Z</dc:date>
    </item>
    <item>
      <title>WLAN is at rommon prompt;</title>
      <link>https://community.cisco.com/t5/network-security/cannot-tftp-image-from-ios-rommon-prompt-via-asa-device/m-p/2509007#M225726</link>
      <description>&lt;P&gt;WLAN is at rommon prompt; &amp;nbsp;there is no ping command available from the rommon prompt.&lt;/P&gt;&lt;P&gt;arp shows the following from WLAN rommon prompt:&lt;/P&gt;&lt;P&gt;ap: arp&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;255.255.255.255 &amp;nbsp;ff:ff:ff:ff:ff:ff &amp;nbsp;0 &amp;nbsp;6&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 192.168.10.1 &amp;nbsp;88:f0:31:0d:5c:86 &amp;nbsp;132 &amp;nbsp;11&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Sep 2014 21:19:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-tftp-image-from-ios-rommon-prompt-via-asa-device/m-p/2509007#M225726</guid>
      <dc:creator>jgohil</dc:creator>
      <dc:date>2014-09-19T21:19:42Z</dc:date>
    </item>
    <item>
      <title>Please run the following</title>
      <link>https://community.cisco.com/t5/network-security/cannot-tftp-image-from-ios-rommon-prompt-via-asa-device/m-p/2509008#M225727</link>
      <description>Please run the following packet tracer on the ASA and post the output here:
packet-tracer input udp g9 172.24.22.97 12345 171.70.42.151 67 detailed</description>
      <pubDate>Sat, 20 Sep 2014 06:12:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-tftp-image-from-ios-rommon-prompt-via-asa-device/m-p/2509008#M225727</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-09-20T06:12:59Z</dc:date>
    </item>
    <item>
      <title>Note: changed server ip to be</title>
      <link>https://community.cisco.com/t5/network-security/cannot-tftp-image-from-ios-rommon-prompt-via-asa-device/m-p/2509009#M225728</link>
      <description>&lt;P&gt;Note: changed server ip to be on the same network 172.24.22.97 ( attached pic )&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa# packet-tracer input g9 udp 192.168.10.2 12345 172.24.22.97 67 detail$&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x7fffe5c86e70, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=21, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=g9, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 172.24.22.97 using egress ifc &amp;nbsp;g1&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x7fffe5c979b0, priority=2, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=0, user_data=0x0, cs_id=0x0, flags=0x3000, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=g9, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x7fffe54a7800, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=8184, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x7fffe5c8f710, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=0, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=g9, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x7fffe54a7800, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=8186, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x7fffe5c2ee50, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=6, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=g1, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 6, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: g9&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Sat, 20 Sep 2014 13:14:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-tftp-image-from-ios-rommon-prompt-via-asa-device/m-p/2509009#M225728</guid>
      <dc:creator>jgohil</dc:creator>
      <dc:date>2014-09-20T13:14:34Z</dc:date>
    </item>
    <item>
      <title> packet-tracer command using</title>
      <link>https://community.cisco.com/t5/network-security/cannot-tftp-image-from-ios-rommon-prompt-via-asa-device/m-p/2509010#M225729</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;packet-tracer command using g1 port instead of g9:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa# packet-tracer input g1 tcp 192.168.10.2 12345 172.24.22.97 67 ?&lt;/P&gt;&lt;P&gt;&amp;nbsp; detailed &amp;nbsp;Dump more detailed information&lt;BR /&gt;&amp;nbsp; xml &amp;nbsp; &amp;nbsp; &amp;nbsp; Output in xml format&lt;BR /&gt;&amp;nbsp; &amp;lt;cr&amp;gt;&lt;BR /&gt;ciscoasa# packet-tracer input g1 tcp 192.168.10.2 12345 172.24.22.97 67 detail$&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x7fffe5c27280, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=23, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=g1, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 172.24.22.97 using egress ifc &amp;nbsp;g1&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x7fffe5c2a210, priority=111, domain=permit, deny=true&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=0, user_data=0x0, cs_id=0x0, flags=0x4000, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=g1, output_ifc=g1&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: g1&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Sat, 20 Sep 2014 17:44:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-tftp-image-from-ios-rommon-prompt-via-asa-device/m-p/2509010#M225729</guid>
      <dc:creator>jgohil</dc:creator>
      <dc:date>2014-09-20T17:44:39Z</dc:date>
    </item>
    <item>
      <title>i added "same-security</title>
      <link>https://community.cisco.com/t5/network-security/cannot-tftp-image-from-ios-rommon-prompt-via-asa-device/m-p/2509011#M225730</link>
      <description>&lt;P&gt;i added "same-security-traffic permit intra-interface"&amp;nbsp;&lt;/P&gt;&lt;P&gt;but still cannot tftp from&amp;nbsp;&lt;/P&gt;&lt;P&gt;copy tftp://172.24.22.97/filename flash:a&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# packet-tracer input g1 udp 192.168.10.2 12345 172.24.22.97 6$&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 172.24.22.97 using egress ifc &amp;nbsp;g1&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x7fffe5caed50, priority=3, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=0, user_data=0x0, cs_id=0x0, flags=0x4000, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=g1, output_ifc=g1&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x7fffe54a7800, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=12047, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x7fffe5c2ee50, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=6, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=g1, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x7fffe54a7800, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=12049, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x7fffe5c2ee50, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=8, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=g1, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 7, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: g1&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 20 Sep 2014 18:43:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-tftp-image-from-ios-rommon-prompt-via-asa-device/m-p/2509011#M225730</guid>
      <dc:creator>jgohil</dc:creator>
      <dc:date>2014-09-20T18:43:10Z</dc:date>
    </item>
    <item>
      <title>same-security-traffic permit</title>
      <link>https://community.cisco.com/t5/network-security/cannot-tftp-image-from-ios-rommon-prompt-via-asa-device/m-p/2509012#M225731</link>
      <description>&lt;P&gt;same-security-traffic permit intra-interface is for traffic entering and leaving the same interface (ie. entering one sub interface and leaving through another sub interface) so this will not be of any use in this situation.&lt;/P&gt;&lt;P&gt;Your packet tracer for g1 interface is incorrect. when doing the packet tracer on g1 you need to have the source IP of the tftp server not the WLAN.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 14px;"&gt;packet-tracer input udp g1&amp;nbsp;172.24.22.97 12345 &amp;nbsp;192.168.10.2 67&amp;nbsp;detailed&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;But as per the first packet tracer the traffic flow is permitted through the firewall. &amp;nbsp;Have you made sure the TFTP server is setup correctly? You could try to put an ACL on both g1 and g9 that permits IP between WLAN and the TFTP server and see if that helps...though I do not expect it to help.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;Could you set up a packet capture between the g1 and g9 interface for the WLAN and TFTP server and then try to do a TFTP transfer. &amp;nbsp;Check the output to see if there is any drop and / or that you see both the request and reply for each packet.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;--&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;Please remember to select a correct answer and rate helpful posts&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 20 Sep 2014 19:10:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-tftp-image-from-ios-rommon-prompt-via-asa-device/m-p/2509012#M225731</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-09-20T19:10:27Z</dc:date>
    </item>
    <item>
      <title>don't see any activity ( or</title>
      <link>https://community.cisco.com/t5/network-security/cannot-tftp-image-from-ios-rommon-prompt-via-asa-device/m-p/2509013#M225733</link>
      <description>&lt;P&gt;don't see any activity ( or not enough )&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# show access-list&lt;BR /&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; alert-interval 300&lt;BR /&gt;access-list 101; 1 elements; name hash: 0xe7d586b5&lt;BR /&gt;access-list 101 line 1 extended permit ip any any (hitcnt=0) 0x28676dfa&lt;BR /&gt;ciscoasa(config)# show cap&lt;BR /&gt;capture 101 type raw-data interface g9 [Capturing - 2225 bytes]&lt;BR /&gt;capture 102 type raw-data interface g1 [Capturing - 0 bytes]&lt;BR /&gt;&amp;nbsp; match ip host 192.168.10.2 host 172.24.22.97&lt;BR /&gt;&amp;nbsp; match ip 192.0.0.0 255.0.0.0 172.0.0.0 255.0.0.0&lt;BR /&gt;capture 103 type raw-data ethernet-type ip trace interface g9 [Capturing - 623 bytes]&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# show cap 101&lt;/P&gt;&lt;P&gt;7 packets captured&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;1: 17:03:10.137978 &amp;nbsp; &amp;nbsp; &amp;nbsp; 192.168.10.1.1031 &amp;gt; 172.24.22.97.69: &amp;nbsp;udp 40&lt;BR /&gt;&amp;nbsp; &amp;nbsp;2: 17:03:13.889953 &amp;nbsp; &amp;nbsp; &amp;nbsp; 192.168.10.1.1031 &amp;gt; 172.24.22.97.69: &amp;nbsp;udp 40&lt;BR /&gt;&amp;nbsp; &amp;nbsp;3: 17:03:29.229465 &amp;nbsp; &amp;nbsp; &amp;nbsp; 192.168.10.1.1031 &amp;gt; 172.24.22.97.69: &amp;nbsp;udp 40&lt;BR /&gt;&amp;nbsp; &amp;nbsp;4: 17:03:44.568986 &amp;nbsp; &amp;nbsp; &amp;nbsp; 192.168.10.1.1031 &amp;gt; 172.24.22.97.69: &amp;nbsp;udp 40&lt;BR /&gt;&amp;nbsp; &amp;nbsp;5: 17:03:59.908446 &amp;nbsp; &amp;nbsp; &amp;nbsp; 192.168.10.1.1031 &amp;gt; 172.24.22.97.69: &amp;nbsp;udp 40&lt;BR /&gt;&amp;nbsp; &amp;nbsp;6: 17:04:15.247957 &amp;nbsp; &amp;nbsp; &amp;nbsp; 192.168.10.1.1031 &amp;gt; 172.24.22.97.69: &amp;nbsp;udp 40&lt;BR /&gt;&amp;nbsp; &amp;nbsp;7: 17:04:30.587478 &amp;nbsp; &amp;nbsp; &amp;nbsp; 192.168.10.1.1031 &amp;gt; 172.24.22.97.69: &amp;nbsp;udp 40&lt;BR /&gt;7 packets shown&lt;BR /&gt;ciscoasa(config)# show cap 102&lt;/P&gt;&lt;P&gt;0 packet captured&lt;/P&gt;&lt;P&gt;0 packet shown&lt;BR /&gt;ciscoasa(config)# show cap 103&lt;/P&gt;&lt;P&gt;7 packets captured&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;1: 17:03:10.137978 &amp;nbsp; &amp;nbsp; &amp;nbsp; 192.168.10.1.1031 &amp;gt; 172.24.22.97.69: &amp;nbsp;udp 40&lt;BR /&gt;&amp;nbsp; &amp;nbsp;2: 17:03:13.889953 &amp;nbsp; &amp;nbsp; &amp;nbsp; 192.168.10.1.1031 &amp;gt; 172.24.22.97.69: &amp;nbsp;udp 40&lt;BR /&gt;&amp;nbsp; &amp;nbsp;3: 17:03:29.229465 &amp;nbsp; &amp;nbsp; &amp;nbsp; 192.168.10.1.1031 &amp;gt; 172.24.22.97.69: &amp;nbsp;udp 40&lt;BR /&gt;&amp;nbsp; &amp;nbsp;4: 17:03:44.568986 &amp;nbsp; &amp;nbsp; &amp;nbsp; 192.168.10.1.1031 &amp;gt; 172.24.22.97.69: &amp;nbsp;udp 40&lt;BR /&gt;&amp;nbsp; &amp;nbsp;5: 17:03:59.908446 &amp;nbsp; &amp;nbsp; &amp;nbsp; 192.168.10.1.1031 &amp;gt; 172.24.22.97.69: &amp;nbsp;udp 40&lt;BR /&gt;&amp;nbsp; &amp;nbsp;6: 17:04:15.247957 &amp;nbsp; &amp;nbsp; &amp;nbsp; 192.168.10.1.1031 &amp;gt; 172.24.22.97.69: &amp;nbsp;udp 40&lt;BR /&gt;&amp;nbsp; &amp;nbsp;7: 17:04:30.587478 &amp;nbsp; &amp;nbsp; &amp;nbsp; 192.168.10.1.1031 &amp;gt; 172.24.22.97.69: &amp;nbsp;udp 40&lt;BR /&gt;7 packets shown&lt;BR /&gt;ciscoasa(config)#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 21 Sep 2014 00:06:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-tftp-image-from-ios-rommon-prompt-via-asa-device/m-p/2509013#M225733</guid>
      <dc:creator>jgohil</dc:creator>
      <dc:date>2014-09-21T00:06:39Z</dc:date>
    </item>
    <item>
      <title>Could you post the commands</title>
      <link>https://community.cisco.com/t5/network-security/cannot-tftp-image-from-ios-rommon-prompt-via-asa-device/m-p/2509014#M225735</link>
      <description>&lt;P&gt;Could you post the commands you used to create the packet capture please.&lt;/P&gt;&lt;P&gt;As per the output, we don't see any return traffic from the TFTP server so it would seem that there is an issue between the ASA and the TFTP server.&amp;nbsp; Is the TFTP server a windows server? if so have you turned off the windows firewall? is there any other software firewall installed on the TFTP server that you may have forgotten to turn off during your transfer?&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px"&gt;--&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px"&gt;Please remember to select a correct answer and rate helpful posts&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 21 Sep 2014 16:03:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-tftp-image-from-ios-rommon-prompt-via-asa-device/m-p/2509014#M225735</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-09-21T16:03:07Z</dc:date>
    </item>
  </channel>
</rss>

