<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Never mind I found it. I in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5510-tcp-deny-no-connection-and-0-syn-timeout/m-p/2504371#M235123</link>
    <description>&lt;P&gt;Never mind I found it. I discovered that DNS had a bad record that was pointing the scan to a device that didn't exist. Thanks for the help!&lt;/P&gt;</description>
    <pubDate>Mon, 08 Sep 2014 17:08:31 GMT</pubDate>
    <dc:creator>Brian Beaman</dc:creator>
    <dc:date>2014-09-08T17:08:31Z</dc:date>
    <item>
      <title>ASA5510 TCP Deny no connection and 0 SYN timeout</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-tcp-deny-no-connection-and-0-syn-timeout/m-p/2504364#M235087</link>
      <description>&lt;P&gt;After a recent firewall cleanup we now are failing a PCI Scan from Trustwave. I have created a rule to allow their IP's to come in any port and I am still getting a "Network Service Stopped Responding" on there end while they are going to our Public IP address on port 443. Since I have allowed their IP's to come in any port I'm not sure what the problem is.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here are some logs from the firewall.&lt;/P&gt;&lt;P&gt;Early on in the scan I am seeing a bunch of these for different internal IPs but I can't ping any of them internally so I think they are trying to go to some devices that don't exist anymore.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;6|Sep 03 2014|15:19:20|302014|64.37.231.144|40312|10.1.20.133|22361|Teardown TCP connection 185611354 for Outside:64.37.231.144/40312 to Inside:10.1.20.133/22361 duration 0:00:30 bytes 0 SYN Timeout&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;About the same time the test fails I see this in the logs. It's them coming to our public IP on port 443 but it keeps getting a TCP deny (No Connection)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;Sep 03 2014&lt;/TD&gt;&lt;TD&gt;16:03:15&lt;/TD&gt;&lt;TD&gt;302013&lt;/TD&gt;&lt;TD&gt;&lt;SPAN style="color: rgb(0, 0, 255);"&gt;64.37.231.144&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;52986&lt;/TD&gt;&lt;TD&gt;&lt;SPAN style="color: rgb(0, 128, 0);"&gt;207.140.152.66&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;&lt;SPAN style="color: rgb(255, 0, 0);"&gt;Built inbound TCP connection 185701488 for Outside:64.37.231.144/52986 (64.37.231.144/52986) to identity:207.140.152.66/443 (207.140.152.66/443)&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;Sep 03 2014&lt;/TD&gt;&lt;TD&gt;16:03:15&lt;/TD&gt;&lt;TD&gt;725001&lt;/TD&gt;&lt;TD&gt;&lt;SPAN style="color: rgb(0, 0, 255);"&gt;64.37.231.144&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;52986&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;SPAN style="color: rgb(255, 0, 0);"&gt;Starting SSL handshake with client Outside:64.37.231.144/52986 for TLSv1 session&lt;/SPAN&gt;.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;Sep 03 2014&lt;/TD&gt;&lt;TD&gt;16:03:16&lt;/TD&gt;&lt;TD&gt;725002&lt;/TD&gt;&lt;TD&gt;&lt;SPAN style="color: rgb(0, 0, 255);"&gt;64.37.231.144&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;52986&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;SPAN style="color: rgb(255, 0, 0);"&gt;Device completed SSL handshake with client Outside:64.37.231.144/52986&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;Sep 03 2014&lt;/TD&gt;&lt;TD&gt;16:03:16&lt;/TD&gt;&lt;TD&gt;725007&lt;/TD&gt;&lt;TD&gt;&lt;SPAN style="color: rgb(0, 0, 255);"&gt;64.37.231.144&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;52986&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&lt;SPAN style="color: rgb(255, 0, 0);"&gt;SSL session with client Outside:64.37.231.144/52986 terminated.&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;Sep 03 2014&lt;/TD&gt;&lt;TD&gt;16:03:16&lt;/TD&gt;&lt;TD&gt;302014&lt;/TD&gt;&lt;TD&gt;&lt;SPAN style="color: rgb(0, 0, 255);"&gt;64.37.231.144&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;52986&lt;/TD&gt;&lt;TD&gt;&lt;SPAN style="color: rgb(0, 128, 0);"&gt;207.140.152.66&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;&lt;SPAN style="color: rgb(255, 0, 0);"&gt;Teardown TCP connection 185701488 for Outside:64.37.231.144/52986 to identity:207.140.152.66/443 duration 0:00:00 bytes 717 TCP Reset-O&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;4&lt;/TD&gt;&lt;TD&gt;Sep 03 2014&lt;/TD&gt;&lt;TD&gt;16:03:16&lt;/TD&gt;&lt;TD&gt;106015&lt;/TD&gt;&lt;TD&gt;&lt;SPAN style="color: rgb(0, 0, 255);"&gt;64.37.231.144&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;52986&lt;/TD&gt;&lt;TD&gt;&lt;SPAN style="color: rgb(0, 128, 0);"&gt;207.140.152.66&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;&lt;SPAN style="color: rgb(255, 0, 0);"&gt;Deny TCP (no connection) from 64.37.231.144/52986 to 207.140.152.66/443 flags PSH ACK on interface Outside&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;4&lt;/TD&gt;&lt;TD&gt;Sep 03 2014&lt;/TD&gt;&lt;TD&gt;16:03:16&lt;/TD&gt;&lt;TD&gt;106015&lt;/TD&gt;&lt;TD&gt;&lt;SPAN style="color: rgb(0, 0, 255);"&gt;64.37.231.144&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;52986&lt;/TD&gt;&lt;TD&gt;&lt;SPAN style="color: rgb(0, 128, 0);"&gt;207.140.152.66&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;443&lt;/TD&gt;&lt;TD&gt;&lt;SPAN style="color: rgb(255, 0, 0);"&gt;Deny TCP (no connection) from 64.37.231.144/52986 to 207.140.152.66/443 flags FIN ACK on interface Outside&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:42:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-tcp-deny-no-connection-and-0-syn-timeout/m-p/2504364#M235087</guid>
      <dc:creator>Brian Beaman</dc:creator>
      <dc:date>2019-03-12T04:42:24Z</dc:date>
    </item>
    <item>
      <title>Hi Bryan , Looks like the tcp</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-tcp-deny-no-connection-and-0-syn-timeout/m-p/2504365#M235092</link>
      <description>&lt;P&gt;Hi Bryan ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looks like the tcp connection is denied on the outside interface . Check your policy for the traffic coming from outside to inside.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you please share your&amp;nbsp; configuration to cehck your policies , also you can try the command "sysopt connection timewait" on the ASA and check if the behavior changes,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Randy -&lt;/P&gt;</description>
      <pubDate>Thu, 04 Sep 2014 18:07:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-tcp-deny-no-connection-and-0-syn-timeout/m-p/2504365#M235092</guid>
      <dc:creator>rvarelac</dc:creator>
      <dc:date>2014-09-04T18:07:39Z</dc:date>
    </item>
    <item>
      <title>Sorry I don't know much about</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-tcp-deny-no-connection-and-0-syn-timeout/m-p/2504366#M235094</link>
      <description>&lt;P&gt;Sorry I don't know much about the ASA. I assume you want the Access-list? The rule I made for them is in bold&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; alert-interval 300&lt;BR /&gt;access-list splittunnel; 1 elements; name hash: 0x907b5bd&lt;BR /&gt;access-list splittunnel line 1 standard permit 10.0.0.0 255.0.0.0 (hitcnt=0) 0x0336c9eb&lt;BR /&gt;access-list http-list2; 1 elements; name hash: 0xd06c9445&lt;BR /&gt;access-list http-list2 line 1 extended permit tcp any host 160.109.103.49 (hitcnt=4579) 0x34d298fd&lt;BR /&gt;access-list Web_filter; 4 elements; name hash: 0x607b0795&lt;BR /&gt;access-list Web_filter line 1 remark denys HTTP access to Intranet&lt;BR /&gt;access-list Web_filter line 2 extended deny ip host 10.1.21.10 any (hitcnt=0) 0xf6050e57&lt;BR /&gt;access-list Web_filter line 3 remark denys HTTP access to Esales&lt;BR /&gt;access-list Web_filter line 4 extended deny ip host 10.1.21.34 any (hitcnt=1173) 0xb6b80a52&lt;BR /&gt;access-list Web_filter line 5 remark denys Web access to Stanion.com&lt;BR /&gt;access-list Web_filter line 6 extended deny ip host 10.1.21.7 any (hitcnt=4745) 0xd13f029b&lt;BR /&gt;access-list Web_filter line 7 extended permit ip any any (hitcnt=1194557283) 0xe91822f1&lt;BR /&gt;access-list ironport_nat; 1 elements; name hash: 0xb93ecc1d&lt;BR /&gt;access-list ironport_nat line 1 extended permit ip object Ironport_Email any (hitcnt=0) 0xabf503fb&lt;BR /&gt;&amp;nbsp; access-list ironport_nat line 1 extended permit ip host 10.1.21.8 any (hitcnt=0) 0xabf503fb&lt;BR /&gt;access-list nonat; 3 elements; name hash: 0x13e041bf&lt;BR /&gt;access-list nonat line 1 extended permit ip 10.1.0.0 255.255.0.0 10.20.0.0 255.255.0.0 (hitcnt=0) 0x51aa1a9a&lt;BR /&gt;access-list nonat line 2 extended permit ip 10.1.0.0 255.255.0.0 10.1.100.0 255.255.255.0 (hitcnt=0) 0x64e430e9&lt;BR /&gt;access-list nonat line 3 extended permit ip 10.0.0.0 255.0.0.0 10.20.0.0 255.255.0.0 (hitcnt=0) 0x9aa0760e&lt;BR /&gt;access-list internet_ironport; 2 elements; name hash: 0xda435661&lt;BR /&gt;access-list internet_ironport line 1 extended permit ip host 10.1.21.9 any (hitcnt=0) 0xb6bf9d94&lt;BR /&gt;access-list internet_ironport line 2 extended permit ip 10.20.0.0 255.255.0.0 any (hitcnt=0) 0x36e2177a&lt;BR /&gt;access-list IN; 85 elements; name hash: 0x9f2434aa&lt;BR /&gt;&lt;STRONG&gt;access-list IN line 1 extended permit object-group DM_INLINE_SERVICE_2 object-group DM_INLINE_NETWORK_3 any 0xbe6e62f4&lt;BR /&gt;&amp;nbsp; access-list IN line 1 extended permit ip 204.13.201.0 255.255.255.0 any (hitcnt=0) 0x91d0f650&lt;BR /&gt;&amp;nbsp; access-list IN line 1 extended permit ip 64.37.231.0 255.255.255.0 any (hitcnt=44587) 0x24912041&lt;/STRONG&gt;&lt;BR /&gt;access-list IN line 2 extended permit tcp any any eq https (hitcnt=322454) 0x73ce9627&lt;BR /&gt;access-list IN line 3 extended permit gre object Public_Corp-Main_Router object Corp-Main_Router (hitcnt=0) 0xf4ff3cf8&lt;BR /&gt;&amp;nbsp; access-list IN line 3 extended permit gre host 207.140.152.78 host 10.1.2.253 (hitcnt=0) 0xf4ff3cf8&lt;BR /&gt;access-list IN line 4 extended permit tcp any object SWECOFTP eq ftp (hitcnt=0) 0x50c59ab3&lt;BR /&gt;&amp;nbsp; access-list IN line 4 extended permit tcp any host 10.1.21.62 eq ftp (hitcnt=94) 0x50c59ab3&lt;BR /&gt;access-list IN line 5 extended permit tcp any object-group DM_INLINE_NETWORK_1 object-group DM_INLINE_TCP_6 0xe2a3d5b7&lt;BR /&gt;&amp;nbsp; access-list IN line 5 extended permit tcp any host 10.1.20.2 eq smtp (hitcnt=0) 0x7bb9f254&lt;BR /&gt;&amp;nbsp; access-list IN line 5 extended permit tcp any host 10.1.20.2 eq ssh (hitcnt=0) 0x0f6c8f93&lt;BR /&gt;&amp;nbsp; access-list IN line 5 extended permit tcp any host 10.1.21.8 eq smtp (hitcnt=299568) 0x52abd338&lt;BR /&gt;&amp;nbsp; access-list IN line 5 extended permit tcp any host 10.1.21.8 eq ssh (hitcnt=0) 0x3485919c&lt;BR /&gt;access-list IN line 6 extended permit tcp any object-group DM_INLINE_NETWORK_8 object-group DM_INLINE_TCP_1 0x8b9eb238&lt;BR /&gt;&amp;nbsp; access-list IN line 6 extended permit tcp any host 10.1.21.24 eq www (hitcnt=722) 0xb0e5957b&lt;BR /&gt;&amp;nbsp; access-list IN line 6 extended permit tcp any host 10.1.21.24 eq https (hitcnt=0) 0xcc6cacc0&lt;BR /&gt;&amp;nbsp; access-list IN line 6 extended permit tcp any host 10.1.21.34 eq www (hitcnt=10479) 0xd31dfe76&lt;BR /&gt;&amp;nbsp; access-list IN line 6 extended permit tcp any host 10.1.21.34 eq https (hitcnt=0) 0x2939fa74&lt;BR /&gt;&amp;nbsp; access-list IN line 6 extended permit tcp any host 10.1.21.64 eq www (hitcnt=21909) 0xd0da46a1&lt;BR /&gt;&amp;nbsp; access-list IN line 6 extended permit tcp any host 10.1.21.64 eq https (hitcnt=3) 0xf9224ad7&lt;BR /&gt;access-list IN line 7 extended permit tcp object-group DM_INLINE_NETWORK_5 object-group DM_INLINE_NETWORK_6 object-group DM_INLINE_TCP_5 0x64977d1a&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp 206.114.9.0 255.255.255.0 host 10.1.21.35 eq ssh (hitcnt=0) 0xdcf294e6&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp 206.114.9.0 255.255.255.0 host 10.1.21.35 eq telnet (hitcnt=0) 0x3bb1a012&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp 206.114.9.0 255.255.255.0 host 10.1.21.35 eq 3389 (hitcnt=0) 0x412f51e3&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp 206.114.9.0 255.255.255.0 host 10.1.21.57 eq ssh (hitcnt=0) 0x59328191&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp 206.114.9.0 255.255.255.0 host 10.1.21.57 eq telnet (hitcnt=0) 0x70c9e5e0&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp 206.114.9.0 255.255.255.0 host 10.1.21.57 eq 3389 (hitcnt=0) 0xb383b91d&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp host 173.8.235.158 host 10.1.21.35 eq ssh (hitcnt=0) 0xe621ebc3&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp host 173.8.235.158 host 10.1.21.35 eq telnet (hitcnt=0) 0x04cbc347&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp host 173.8.235.158 host 10.1.21.35 eq 3389 (hitcnt=0) 0x1b956387&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp host 173.8.235.158 host 10.1.21.57 eq ssh (hitcnt=0) 0x726ff458&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp host 173.8.235.158 host 10.1.21.57 eq telnet (hitcnt=0) 0x109c30be&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp host 173.8.235.158 host 10.1.21.57 eq 3389 (hitcnt=23) 0x0137d171&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp host 173.178.135.243 host 10.1.21.35 eq ssh (hitcnt=0) 0xf4027db3&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp host 173.178.135.243 host 10.1.21.35 eq telnet (hitcnt=0) 0x59df8576&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp host 173.178.135.243 host 10.1.21.35 eq 3389 (hitcnt=0) 0x19a30c88&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp host 173.178.135.243 host 10.1.21.57 eq ssh (hitcnt=0) 0x20ab6579&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp host 173.178.135.243 host 10.1.21.57 eq telnet (hitcnt=0) 0x95cba548&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp host 173.178.135.243 host 10.1.21.57 eq 3389 (hitcnt=4) 0xafa35c82&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp host 173.178.146.44 host 10.1.21.35 eq ssh (hitcnt=0) 0xfee128cb&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp host 173.178.146.44 host 10.1.21.35 eq telnet (hitcnt=0) 0x2de86bf5&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp host 173.178.146.44 host 10.1.21.35 eq 3389 (hitcnt=0) 0x7265e777&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp host 173.178.146.44 host 10.1.21.57 eq ssh (hitcnt=0) 0xb7d86182&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp host 173.178.146.44 host 10.1.21.57 eq telnet (hitcnt=0) 0xc95b6f56&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp host 173.178.146.44 host 10.1.21.57 eq 3389 (hitcnt=6) 0x0b13aeba&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp host 173.178.148.247 host 10.1.21.35 eq ssh (hitcnt=0) 0x1983ab13&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp host 173.178.148.247 host 10.1.21.35 eq telnet (hitcnt=0) 0xbba32c43&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp host 173.178.148.247 host 10.1.21.35 eq 3389 (hitcnt=0) 0x3e0d9824&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp host 173.178.148.247 host 10.1.21.57 eq ssh (hitcnt=0) 0x59537353&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp host 173.178.148.247 host 10.1.21.57 eq telnet (hitcnt=0) 0x4e0c0cb3&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp host 173.178.148.247 host 10.1.21.57 eq 3389 (hitcnt=9) 0x77641b36&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp host 184.158.74.194 host 10.1.21.35 eq ssh (hitcnt=0) 0xcb6b4ed8&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp host 184.158.74.194 host 10.1.21.35 eq telnet (hitcnt=0) 0x539015d5&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp host 184.158.74.194 host 10.1.21.35 eq 3389 (hitcnt=0) 0xd4aa4a32&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp host 184.158.74.194 host 10.1.21.57 eq ssh (hitcnt=0) 0x2edb1e3c&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp host 184.158.74.194 host 10.1.21.57 eq telnet (hitcnt=0) 0xb8d08c18&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp host 184.158.74.194 host 10.1.21.57 eq 3389 (hitcnt=0) 0x27b8dff3&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp 207.54.32.0 255.255.255.0 host 10.1.21.35 eq ssh (hitcnt=0) 0x7d90e69d&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp 207.54.32.0 255.255.255.0 host 10.1.21.35 eq telnet (hitcnt=0) 0x587f5840&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp 207.54.32.0 255.255.255.0 host 10.1.21.35 eq 3389 (hitcnt=0) 0x894d6af4&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp 207.54.32.0 255.255.255.0 host 10.1.21.57 eq ssh (hitcnt=0) 0x64427444&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp 207.54.32.0 255.255.255.0 host 10.1.21.57 eq telnet (hitcnt=0) 0x0428511a&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp 207.54.32.0 255.255.255.0 host 10.1.21.57 eq 3389 (hitcnt=0) 0x68c6adac&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp 65.241.101.0 255.255.255.128 host 10.1.21.35 eq ssh (hitcnt=0) 0x5b5eadce&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp 65.241.101.0 255.255.255.128 host 10.1.21.35 eq telnet (hitcnt=0) 0x9b1f6ec0&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp 65.241.101.0 255.255.255.128 host 10.1.21.35 eq 3389 (hitcnt=0) 0x77d58097&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp 65.241.101.0 255.255.255.128 host 10.1.21.57 eq ssh (hitcnt=0) 0x6001f207&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp 65.241.101.0 255.255.255.128 host 10.1.21.57 eq telnet (hitcnt=0) 0x79b2c587&lt;BR /&gt;&amp;nbsp; access-list IN line 7 extended permit tcp 65.241.101.0 255.255.255.128 host 10.1.21.57 eq 3389 (hitcnt=0) 0x8e9d71b8&lt;BR /&gt;access-list IN line 8 extended permit tcp object-group DM_INLINE_NETWORK_9 object TSE1 eq 3389 0xedd3c6d8&lt;BR /&gt;&amp;nbsp; access-list IN line 8 extended permit tcp host 116.75.164.101 host 10.1.21.42 eq 3389 (hitcnt=0) 0xda1d3af8&lt;BR /&gt;&amp;nbsp; access-list IN line 8 extended permit tcp host 69.15.189.147 host 10.1.21.42 eq 3389 (hitcnt=0) 0x207ccbf8&lt;BR /&gt;access-list IN line 9 extended permit tcp any object-group DM_INLINE_NETWORK_12 object-group DM_INLINE_TCP_10 0xf8839a3b&lt;BR /&gt;&amp;nbsp; access-list IN line 9 extended permit tcp any host 10.1.21.100 eq www (hitcnt=73980) 0xd8756829&lt;BR /&gt;&amp;nbsp; access-list IN line 9 extended permit tcp any host 10.1.21.100 eq https (hitcnt=43714) 0xe1ff17e3&lt;BR /&gt;&amp;nbsp; access-list IN line 9 extended permit tcp any host 10.1.21.101 eq www (hitcnt=558) 0x8883195e&lt;BR /&gt;&amp;nbsp; access-list IN line 9 extended permit tcp any host 10.1.21.101 eq https (hitcnt=40) 0x4665009f&lt;BR /&gt;access-list IN line 10 extended permit object-group DM_INLINE_SERVICE_1 host 24.159.99.28 object Infor (hitcnt=0) 0x21f8274b&lt;BR /&gt;&amp;nbsp; access-list IN line 10 extended permit ip host 24.159.99.28 host 10.1.21.15 (hitcnt=0) 0x152a9951&lt;BR /&gt;&amp;nbsp; access-list IN line 10 extended permit tcp host 24.159.99.28 host 10.1.21.15 eq 3389 (hitcnt=0) 0x241955b4&lt;BR /&gt;access-list IN line 11 extended permit ip any object-group DM_INLINE_NETWORK_2 0x26b701af&lt;BR /&gt;&amp;nbsp; access-list IN line 11 extended permit ip any host 10.1.21.7 (hitcnt=231906) 0x703f53dc&lt;BR /&gt;&amp;nbsp; access-list IN line 11 extended permit ip any host 10.1.21.6 (hitcnt=226353) 0x538e3514&lt;BR /&gt;access-list IN line 12 extended permit object-group DM_INLINE_SERVICE_3 any object-group DM_INLINE_NETWORK_7 0x2185238d&lt;BR /&gt;&amp;nbsp; access-list IN line 12 extended permit tcp any host 10.6.20.2 eq www (hitcnt=302) 0x6b752058&lt;BR /&gt;&amp;nbsp; access-list IN line 12 extended permit tcp any host 10.6.20.3 eq www (hitcnt=171) 0x5676723e&lt;BR /&gt;&amp;nbsp; access-list IN line 12 extended permit tcp any host 10.18.20.2 eq www (hitcnt=332) 0x4e028ace&lt;BR /&gt;&amp;nbsp; access-list IN line 12 extended permit tcp any host 10.3.20.2 eq www (hitcnt=643) 0x140eaec7&lt;BR /&gt;&amp;nbsp; access-list IN line 12 extended permit udp any host 10.6.20.2 eq www (hitcnt=0) 0x5179f1de&lt;BR /&gt;&amp;nbsp; access-list IN line 12 extended permit udp any host 10.6.20.3 eq www (hitcnt=0) 0x92eda56e&lt;BR /&gt;&amp;nbsp; access-list IN line 12 extended permit udp any host 10.18.20.2 eq www (hitcnt=0) 0x4b9c6dfc&lt;BR /&gt;&amp;nbsp; access-list IN line 12 extended permit udp any host 10.3.20.2 eq www (hitcnt=0) 0xe776756d&lt;BR /&gt;access-list IN line 13 extended permit tcp object WSUS any object-group DM_INLINE_TCP_4 (hitcnt=0) 0x407a23d4&lt;BR /&gt;&amp;nbsp; access-list IN line 13 extended permit tcp host 10.1.21.65 any eq www (hitcnt=0) 0xb9c45cc1&lt;BR /&gt;&amp;nbsp; access-list IN line 13 extended permit tcp host 10.1.21.65 any eq https (hitcnt=0) 0x5e88e4c5&lt;BR /&gt;access-list AnyConnect_Client_Local_Print; 8 elements; name hash: 0xe76ce9d1&lt;BR /&gt;access-list AnyConnect_Client_Local_Print line 1 extended deny ip any any (hitcnt=0) 0x08993d53&lt;BR /&gt;access-list AnyConnect_Client_Local_Print line 2 extended permit tcp any any eq lpd (hitcnt=0) 0xc2390719&lt;BR /&gt;access-list AnyConnect_Client_Local_Print line 3 remark IPP: Internet Printing Protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print line 4 extended permit tcp any any eq 631 (hitcnt=0) 0x73a9536a&lt;BR /&gt;access-list AnyConnect_Client_Local_Print line 5 remark Windows' printing port&lt;BR /&gt;access-list AnyConnect_Client_Local_Print line 6 extended permit tcp any any eq 9100 (hitcnt=0) 0x57c0d3e3&lt;BR /&gt;access-list AnyConnect_Client_Local_Print line 7 remark mDNS: multicast DNS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print line 8 extended permit udp any host 224.0.0.251 eq 5353 (hitcnt=0) 0x97c694f8&lt;BR /&gt;access-list AnyConnect_Client_Local_Print line 9 remark LLMNR: Link Local Multicast Name Resolution protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print line 10 extended permit udp any host 224.0.0.252 eq 5355 (hitcnt=0) 0xa7d3d944&lt;BR /&gt;access-list AnyConnect_Client_Local_Print line 11 remark TCP/NetBIOS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print line 12 extended permit tcp any any eq 137 (hitcnt=0) 0x5f84372c&lt;BR /&gt;access-list AnyConnect_Client_Local_Print line 13 extended permit udp any any eq netbios-ns (hitcnt=0) 0xb541e0fb&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Sep 2014 18:25:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-tcp-deny-no-connection-and-0-syn-timeout/m-p/2504366#M235094</guid>
      <dc:creator>Brian Beaman</dc:creator>
      <dc:date>2014-09-04T18:25:30Z</dc:date>
    </item>
    <item>
      <title>Hi Brian ,  I mean the "Show</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-tcp-deny-no-connection-and-0-syn-timeout/m-p/2504367#M235099</link>
      <description>&lt;P&gt;Hi Brian ,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I mean the "Show run" of the ASA , however can you try this command on your ASA and post the result.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Packet-tracer input outiside 64.37.231.144 52986 207.140.152.66 443 detailed&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Randy-&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Sep 2014 19:43:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-tcp-deny-no-connection-and-0-syn-timeout/m-p/2504367#M235099</guid>
      <dc:creator>rvarelac</dc:creator>
      <dc:date>2014-09-04T19:43:51Z</dc:date>
    </item>
    <item>
      <title>Here is the output of "Packet</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-tcp-deny-no-connection-and-0-syn-timeout/m-p/2504368#M235101</link>
      <description>&lt;P&gt;Here is the output of "&lt;SPAN style="font-size: 14px;"&gt;Packet-tracer input outside tcp 64.37.231.144 52986 207.140.152.66 443 detailed" &amp;nbsp;and below that is the&amp;nbsp;&lt;/SPAN&gt;show run&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xad640000, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=4552253758, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=Outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; 207.140.152.66 &amp;nbsp;255.255.255.255 identity&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xae13a448, priority=119, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=71322, user_data=0x0, cs_id=0x0, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=443, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=Outside, output_ifc=identity&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: CONN-SETTINGS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xad781d40, priority=8, domain=conn-set, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=71322, user_data=0xadff1d50, cs_id=0x0, reverse, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=207.140.152.66, mask=255.255.255.255, port=443, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=Outside, output_ifc=identity&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xad644af0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=183370301, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=Outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type:&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xae297338, priority=18, domain=flow-export, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=26629132, user_data=0xae39f468, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=Outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: TCP-MODULE&lt;BR /&gt;Subtype: webvpn&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xad697210, priority=13, domain=soft-np-tcp-module, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=71324, user_data=0xadfee528, cs_id=0x0, reverse, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=207.140.152.66, mask=255.255.255.255, port=443, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=Outside, output_ifc=identity&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0xae0cba70, priority=13, domain=ipsec-tunnel-flow, deny=true&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=19557028, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=Outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 186590309, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_tcp_mod&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_drop&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: Outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Show run&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA Version 8.4(2)&lt;BR /&gt;!&lt;BR /&gt;hostname CorpASA&lt;BR /&gt;domain-name stanion.com&lt;BR /&gt;enable password 33cPxp7pgqfEVuzl encrypted&lt;BR /&gt;passwd OWIlx1L56vEezdTg encrypted&lt;BR /&gt;no names&lt;BR /&gt;dns-guard&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;description Connected to the Internet Router&lt;BR /&gt;&amp;nbsp;nameif Outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 207.140.152.66 255.255.255.192&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;&amp;nbsp;description Connected to Internal LAN&lt;BR /&gt;&amp;nbsp;nameif Inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.1.2.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;&amp;nbsp;description Connected to Internal DMZ network&lt;BR /&gt;&amp;nbsp;nameif dmz&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 172.16.2.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;&amp;nbsp;nameif Oustside_Test&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.2 255.255.0.0&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa842-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CST -6&lt;BR /&gt;clock summer-time CDT recurring&lt;BR /&gt;dns domain-lookup Outside&lt;BR /&gt;dns domain-lookup Inside&lt;BR /&gt;dns domain-lookup dmz&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;name-server 10.1.21.60&lt;BR /&gt;&amp;nbsp;domain-name stanion.com&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network obj-10.20.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.20.0.0 255.255.0.0&lt;BR /&gt;object network obj-10.1.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.1.0.0 255.255.0.0&lt;BR /&gt;object network obj-10.1.100.0&lt;BR /&gt;&amp;nbsp;subnet 10.1.100.0 255.255.255.0&lt;BR /&gt;object network obj-10.0.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.0.0.0 255.0.0.0&lt;BR /&gt;object network CAS1&lt;BR /&gt;&amp;nbsp;host 10.1.21.100&lt;BR /&gt;object network obj-10.1.21.100-01&lt;BR /&gt;&amp;nbsp;host 10.1.21.100&lt;BR /&gt;object network CAS2&lt;BR /&gt;&amp;nbsp;host 10.1.21.101&lt;BR /&gt;object network obj-10.1.21.101-01&lt;BR /&gt;&amp;nbsp;host 10.1.21.101&lt;BR /&gt;object network Esales&lt;BR /&gt;&amp;nbsp;host 10.1.21.34&lt;BR /&gt;object network Tarantella1&lt;BR /&gt;&amp;nbsp;host 10.1.21.24&lt;BR /&gt;object network NS2&lt;BR /&gt;&amp;nbsp;host 10.1.21.6&lt;BR /&gt;object network Staging&lt;BR /&gt;&amp;nbsp;host 10.1.21.57&lt;BR /&gt;object network TSE1&lt;BR /&gt;&amp;nbsp;host 10.1.21.42&lt;BR /&gt;object network Web1&lt;BR /&gt;&amp;nbsp;host 10.1.21.64&lt;BR /&gt;object network Unform&lt;BR /&gt;&amp;nbsp;host 10.1.21.20&lt;BR /&gt;object network NS1&lt;BR /&gt;&amp;nbsp;host 10.1.21.7&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network NETWORK_OBJ_10.1.100.0_24&lt;BR /&gt;&amp;nbsp;subnet 10.1.100.0 255.255.255.0&lt;BR /&gt;object network SWECOFTP&lt;BR /&gt;&amp;nbsp;host 10.1.21.62&lt;BR /&gt;&amp;nbsp;description FTP Server&lt;BR /&gt;object network Public_SWECOFTP&lt;BR /&gt;&amp;nbsp;host 207.140.152.92&lt;BR /&gt;&amp;nbsp;description Public IP for FTP Server&lt;BR /&gt;object network Manhattan_Cameras1&lt;BR /&gt;&amp;nbsp;host 10.6.20.2&lt;BR /&gt;object network Public_Manhattan_Cameras&lt;BR /&gt;&amp;nbsp;host 207.140.152.94&lt;BR /&gt;object network KC_Cameras&lt;BR /&gt;&amp;nbsp;host 10.18.20.2&lt;BR /&gt;&amp;nbsp;description Cameras for Kansas City&lt;BR /&gt;object network Public_KC_Cameras&lt;BR /&gt;&amp;nbsp;host 207.140.152.96&lt;BR /&gt;&amp;nbsp;description Public address Kansas City Cameras&lt;BR /&gt;object network WSUS&lt;BR /&gt;&amp;nbsp;host 10.1.21.65&lt;BR /&gt;object network Infor&lt;BR /&gt;&amp;nbsp;host 10.1.21.15&lt;BR /&gt;object network Public_Infor&lt;BR /&gt;&amp;nbsp;host 207.140.152.76&lt;BR /&gt;object network 173.8.235.158&lt;BR /&gt;&amp;nbsp;host 173.8.235.158&lt;BR /&gt;object network Manhattan_Cameras2&lt;BR /&gt;&amp;nbsp;host 10.6.20.3&lt;BR /&gt;object network Public_Manhattan_Cameras2&lt;BR /&gt;&amp;nbsp;host 207.140.152.97&lt;BR /&gt;object network Portal&lt;BR /&gt;&amp;nbsp;host 10.1.21.24&lt;BR /&gt;&amp;nbsp;description Help Desk&lt;BR /&gt;object network Public_Portal&lt;BR /&gt;&amp;nbsp;host 207.140.152.85&lt;BR /&gt;&amp;nbsp;description Public HelpDesk&lt;BR /&gt;object network test_Internet_gateway&lt;BR /&gt;&amp;nbsp;host 172.16.8.2&lt;BR /&gt;object network Corp-Main_Router&lt;BR /&gt;&amp;nbsp;host 10.1.2.253&lt;BR /&gt;object network Testsvr&lt;BR /&gt;&amp;nbsp;host 207.140.152.79&lt;BR /&gt;object network GB_Cameras&lt;BR /&gt;&amp;nbsp;host 10.3.20.2&lt;BR /&gt;object network public_GB_Cameras&lt;BR /&gt;&amp;nbsp;host 207.140.152.98&lt;BR /&gt;object network NXT&lt;BR /&gt;&amp;nbsp;host 10.1.21.35&lt;BR /&gt;object network Public_Esales&lt;BR /&gt;&amp;nbsp;host 207.140.152.70&lt;BR /&gt;object network Public_NXT&lt;BR /&gt;&amp;nbsp;host 207.140.152.68&lt;BR /&gt;object network Public_Tarantella&lt;BR /&gt;&amp;nbsp;host 207.140.152.77&lt;BR /&gt;object network Public_Unform&lt;BR /&gt;&amp;nbsp;host 207.140.152.83&lt;BR /&gt;object network Ironport_Email&lt;BR /&gt;&amp;nbsp;host 10.1.21.8&lt;BR /&gt;object network Public_CAS1&lt;BR /&gt;&amp;nbsp;host 207.140.152.69&lt;BR /&gt;object network Public_CAS2&lt;BR /&gt;&amp;nbsp;host 207.140.152.95&lt;BR /&gt;object network Public_Corp-Main_Router&lt;BR /&gt;&amp;nbsp;host 207.140.152.78&lt;BR /&gt;object network Public_NS1&lt;BR /&gt;&amp;nbsp;host 207.140.152.71&lt;BR /&gt;object network Public_NS2&lt;BR /&gt;&amp;nbsp;host 207.140.152.73&lt;BR /&gt;object network Public_Staging&lt;BR /&gt;&amp;nbsp;host 207.140.152.86&lt;BR /&gt;object network Public_TSE1&lt;BR /&gt;&amp;nbsp;host 207.140.152.87&lt;BR /&gt;object network Public_Web1&lt;BR /&gt;&amp;nbsp;host 207.140.152.74&lt;BR /&gt;object network obj-10.1.21.8&lt;BR /&gt;&amp;nbsp;host 10.1.21.8&lt;BR /&gt;object network obj-10.21.8-01&lt;BR /&gt;object network obj-10.1.21.8-01&lt;BR /&gt;&amp;nbsp;host 10.1.21.8&lt;BR /&gt;object-group service DM_INLINE_SERVICE_3&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq www&lt;BR /&gt;&amp;nbsp;service-object udp destination eq www&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;&amp;nbsp;network-object host 10.1.20.2&lt;BR /&gt;&amp;nbsp;network-object object Ironport_Email&lt;BR /&gt;object-group network DM_INLINE_NETWORK_12&lt;BR /&gt;&amp;nbsp;network-object object CAS1&lt;BR /&gt;&amp;nbsp;network-object object CAS2&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt;&amp;nbsp;network-object object NS1&lt;BR /&gt;&amp;nbsp;network-object object NS2&lt;BR /&gt;object-group network DM_INLINE_NETWORK_3&lt;BR /&gt;&amp;nbsp;network-object 204.13.201.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 64.37.231.0 255.255.255.0&lt;BR /&gt;object-group service RDP tcp&lt;BR /&gt;&amp;nbsp;port-object eq 3389&lt;BR /&gt;object-group service DM_INLINE_TCP_4 tcp&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt;&amp;nbsp;service-object ip&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq 3389&lt;BR /&gt;object-group network Trustwave&lt;BR /&gt;&amp;nbsp;network-object 204.13.201.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 64.37.231.0 255.255.255.0&lt;BR /&gt;object-group service DM_INLINE_SERVICE_2&lt;BR /&gt;&amp;nbsp;service-object ip&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq ssh&lt;BR /&gt;object-group network DM_INLINE_NETWORK_5&lt;BR /&gt;&amp;nbsp;network-object 206.114.9.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object object 173.8.235.158&lt;BR /&gt;&amp;nbsp;network-object host 173.178.135.243&lt;BR /&gt;&amp;nbsp;network-object host 173.178.146.44&lt;BR /&gt;&amp;nbsp;network-object host 173.178.148.247&lt;BR /&gt;&amp;nbsp;network-object host 184.158.74.194&lt;BR /&gt;&amp;nbsp;network-object 207.54.32.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 65.241.101.0 255.255.255.128&lt;BR /&gt;object-group service DM_INLINE_TCP_5 tcp&lt;BR /&gt;&amp;nbsp;port-object eq ssh&lt;BR /&gt;&amp;nbsp;port-object eq telnet&lt;BR /&gt;&amp;nbsp;port-object eq 3389&lt;BR /&gt;object-group network DM_INLINE_NETWORK_6&lt;BR /&gt;&amp;nbsp;network-object object NXT&lt;BR /&gt;&amp;nbsp;network-object object Staging&lt;BR /&gt;object-group network DM_INLINE_NETWORK_7&lt;BR /&gt;&amp;nbsp;network-object object Manhattan_Cameras1&lt;BR /&gt;&amp;nbsp;network-object object Manhattan_Cameras2&lt;BR /&gt;&amp;nbsp;network-object object KC_Cameras&lt;BR /&gt;&amp;nbsp;network-object object GB_Cameras&lt;BR /&gt;object-group network DM_INLINE_NETWORK_8&lt;BR /&gt;&amp;nbsp;network-object object Portal&lt;BR /&gt;&amp;nbsp;network-object object Esales&lt;BR /&gt;&amp;nbsp;network-object object Web1&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt;&amp;nbsp;protocol-object udp&lt;BR /&gt;&amp;nbsp;protocol-object tcp&lt;BR /&gt;object-group network DM_INLINE_NETWORK_9&lt;BR /&gt;&amp;nbsp;network-object host 116.75.164.101&lt;BR /&gt;&amp;nbsp;network-object host 69.15.189.147&lt;BR /&gt;object-group service DM_INLINE_TCP_6 tcp&lt;BR /&gt;&amp;nbsp;port-object eq smtp&lt;BR /&gt;&amp;nbsp;port-object eq ssh&lt;BR /&gt;object-group service DM_INLINE_TCP_10 tcp&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;access-list splittunnel standard permit 10.0.0.0 255.0.0.0&lt;BR /&gt;access-list http-list2 extended permit tcp any host 160.109.103.49&lt;BR /&gt;access-list Web_filter remark denys HTTP access to Intranet&lt;BR /&gt;access-list Web_filter extended deny ip host 10.1.21.10 any&lt;BR /&gt;access-list Web_filter remark denys HTTP access to Esales&lt;BR /&gt;access-list Web_filter extended deny ip host 10.1.21.34 any&lt;BR /&gt;access-list Web_filter remark denys Web access to Stanion.com&lt;BR /&gt;access-list Web_filter extended deny ip host 10.1.21.7 any&lt;BR /&gt;access-list Web_filter extended permit ip any any&lt;BR /&gt;access-list ironport_nat extended permit ip object Ironport_Email any&lt;BR /&gt;access-list nonat extended permit ip 10.1.0.0 255.255.0.0 10.20.0.0 255.255.0.0&lt;BR /&gt;access-list nonat extended permit ip 10.1.0.0 255.255.0.0 10.1.100.0 255.255.255.0&lt;BR /&gt;access-list nonat extended permit ip 10.0.0.0 255.0.0.0 10.20.0.0 255.255.0.0&lt;BR /&gt;access-list internet_ironport extended permit ip host 10.1.21.9 any&lt;BR /&gt;access-list internet_ironport extended permit ip 10.20.0.0 255.255.0.0 any&lt;BR /&gt;access-list IN extended permit object-group DM_INLINE_SERVICE_2 object-group DM_INLINE_NETWORK_3 any&lt;BR /&gt;access-list IN extended permit tcp any any eq https&lt;BR /&gt;access-list IN extended permit gre object Public_Corp-Main_Router object Corp-Main_Router&lt;BR /&gt;access-list IN extended permit tcp any object SWECOFTP eq ftp&lt;BR /&gt;access-list IN extended permit tcp any object-group DM_INLINE_NETWORK_1 object-group DM_INLINE_TCP_6&lt;BR /&gt;access-list IN extended permit tcp any object-group DM_INLINE_NETWORK_8 object-group DM_INLINE_TCP_1&lt;BR /&gt;access-list IN extended permit tcp object-group DM_INLINE_NETWORK_5 object-group DM_INLINE_NETWORK_6 object-group DM_INLINE_TCP_5&lt;BR /&gt;access-list IN extended permit tcp object-group DM_INLINE_NETWORK_9 object TSE1 eq 3389&lt;BR /&gt;access-list IN extended permit tcp any object-group DM_INLINE_NETWORK_12 object-group DM_INLINE_TCP_10&lt;BR /&gt;access-list IN extended permit object-group DM_INLINE_SERVICE_1 host 24.159.99.28 object Infor&lt;BR /&gt;access-list IN extended permit ip any object-group DM_INLINE_NETWORK_2&lt;BR /&gt;access-list IN extended permit object-group DM_INLINE_SERVICE_3 any object-group DM_INLINE_NETWORK_7&lt;BR /&gt;access-list IN extended permit tcp object WSUS any object-group DM_INLINE_TCP_4&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended deny ip any any&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any any eq lpd&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark IPP: Internet Printing Protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any any eq 631&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark Windows' printing port&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any any eq 9100&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark mDNS: multicast DNS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any host 224.0.0.251 eq 5353&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark LLMNR: Link Local Multicast Name Resolution protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any host 224.0.0.252 eq 5355&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark TCP/NetBIOS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any any eq 137&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any any eq netbios-ns&lt;BR /&gt;!&lt;BR /&gt;tcp-map mss-map&lt;BR /&gt;!&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging buffer-size 10000&lt;BR /&gt;logging monitor informational&lt;BR /&gt;logging buffered notifications&lt;BR /&gt;logging trap informational&lt;BR /&gt;logging history errors&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging host Inside 10.1.21.62&lt;BR /&gt;no logging message 106023&lt;BR /&gt;no logging message 305012&lt;BR /&gt;no logging message 305011&lt;BR /&gt;no logging message 305010&lt;BR /&gt;no logging message 338303&lt;BR /&gt;no logging message 304001&lt;BR /&gt;logging message 106015 level warnings&lt;BR /&gt;flow-export destination Inside 10.1.21.55 2055&lt;BR /&gt;flow-export destination Inside 10.1.21.30 2055&lt;BR /&gt;flow-export template timeout-rate 1&lt;BR /&gt;flow-export delay flow-create 60&lt;BR /&gt;mtu Outside 1500&lt;BR /&gt;mtu Inside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;mtu Oustside_Test 1500&lt;BR /&gt;ip local pool vpn-pool 10.1.100.1-10.1.100.254 mask 255.255.255.0&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any Outside&lt;BR /&gt;icmp permit any Inside&lt;BR /&gt;asdm image disk0:/asdm-645.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (Inside,any) source static obj-10.1.0.0 obj-10.1.0.0 destination static obj-10.20.0.0 obj-10.20.0.0 no-proxy-arp&lt;BR /&gt;nat (Inside,any) source static obj-10.1.0.0 obj-10.1.0.0 destination static obj-10.1.100.0 obj-10.1.100.0 no-proxy-arp&lt;BR /&gt;nat (Inside,any) source static obj-10.0.0.0 obj-10.0.0.0 destination static obj-10.20.0.0 obj-10.20.0.0 no-proxy-arp&lt;BR /&gt;nat (Inside,Outside) source static any any destination static NETWORK_OBJ_10.1.100.0_24 NETWORK_OBJ_10.1.100.0_24 no-proxy-arp route-lookup&lt;BR /&gt;nat (Inside,Outside) source static SWECOFTP Public_SWECOFTP description FTP1&lt;BR /&gt;nat (Inside,Outside) source static Manhattan_Cameras2 Public_Manhattan_Cameras2&lt;BR /&gt;nat (Inside,Outside) source static Portal Public_Portal&lt;BR /&gt;nat (Inside,Outside) source static Manhattan_Cameras1 Public_Manhattan_Cameras&lt;BR /&gt;nat (Inside,Outside) source static KC_Cameras Public_KC_Cameras&lt;BR /&gt;nat (Inside,Outside) source static Infor Public_Infor&lt;BR /&gt;!&lt;BR /&gt;object network obj-10.20.0.0&lt;BR /&gt;&amp;nbsp;nat (Outside,Outside) dynamic interface&lt;BR /&gt;object network CAS1&lt;BR /&gt;&amp;nbsp;nat (Inside,Outside) static 207.140.152.69 service tcp www www&lt;BR /&gt;object network obj-10.1.21.100-01&lt;BR /&gt;&amp;nbsp;nat (Inside,Outside) static 207.140.152.69 service tcp https https&lt;BR /&gt;object network CAS2&lt;BR /&gt;&amp;nbsp;nat (Inside,Outside) static 207.140.152.95 service tcp www www&lt;BR /&gt;object network obj-10.1.21.101-01&lt;BR /&gt;&amp;nbsp;nat (Inside,Outside) static 207.140.152.95 service tcp https https&lt;BR /&gt;object network Esales&lt;BR /&gt;&amp;nbsp;nat (Inside,Outside) static Public_Esales&lt;BR /&gt;object network Tarantella1&lt;BR /&gt;&amp;nbsp;nat (Inside,Outside) static Public_Tarantella&lt;BR /&gt;object network NS2&lt;BR /&gt;&amp;nbsp;nat (Inside,Outside) static Public_NS2&lt;BR /&gt;object network Staging&lt;BR /&gt;&amp;nbsp;nat (Inside,Outside) static Public_Staging&lt;BR /&gt;object network TSE1&lt;BR /&gt;&amp;nbsp;nat (Inside,Outside) static Public_TSE1&lt;BR /&gt;object network Web1&lt;BR /&gt;&amp;nbsp;nat (Inside,Outside) static Public_Web1&lt;BR /&gt;object network Unform&lt;BR /&gt;&amp;nbsp;nat (Inside,Outside) static Public_Unform&lt;BR /&gt;object network NS1&lt;BR /&gt;&amp;nbsp;nat (Inside,Outside) static Public_NS1&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (Inside,Outside) dynamic interface&lt;BR /&gt;object network SWECOFTP&lt;BR /&gt;&amp;nbsp;nat (Inside,Outside) static Public_SWECOFTP&lt;BR /&gt;object network Corp-Main_Router&lt;BR /&gt;&amp;nbsp;nat (Inside,Outside) static Public_Corp-Main_Router&lt;BR /&gt;object network GB_Cameras&lt;BR /&gt;&amp;nbsp;nat (Inside,Outside) static public_GB_Cameras&lt;BR /&gt;object network NXT&lt;BR /&gt;&amp;nbsp;nat (Inside,Outside) static Public_NXT&lt;BR /&gt;object network obj-10.1.21.8&lt;BR /&gt;&amp;nbsp;nat (Inside,Outside) static 207.140.152.69 service tcp smtp smtp&lt;BR /&gt;object network obj-10.1.21.8-01&lt;BR /&gt;&amp;nbsp;nat (Inside,Outside) dynamic 207.140.152.69&lt;BR /&gt;access-group IN in interface Outside&lt;BR /&gt;route Outside 0.0.0.0 0.0.0.0 207.140.152.65 1&lt;BR /&gt;route Inside 10.0.0.0 255.0.0.0 10.1.2.253 1&lt;BR /&gt;route Inside 70.252.185.124 255.255.255.252 10.1.2.253 1&lt;BR /&gt;route Inside 70.252.185.128 255.255.255.252 10.1.2.253 1&lt;BR /&gt;route Inside 0.0.0.0 0.0.0.0 10.1.2.253 tunneled&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record "Deny Access"&lt;BR /&gt;&amp;nbsp;user-message "NO VPN Access"&lt;BR /&gt;&amp;nbsp;action terminate&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa-server AD protocol ldap&lt;BR /&gt;aaa-server AD (Inside) host 10.1.21.60&lt;BR /&gt;&amp;nbsp;ldap-base-dn DC=sweco,DC=corp&lt;BR /&gt;&amp;nbsp;ldap-group-base-dn DC=sweco,DC=corp&lt;BR /&gt;&amp;nbsp;ldap-scope subtree&lt;BR /&gt;&amp;nbsp;ldap-login-password *****&lt;BR /&gt;&amp;nbsp;ldap-login-dn CN=ldapuser,CN=users,DC=sweco,DC=corp&lt;BR /&gt;&amp;nbsp;server-type microsoft&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 10.1.20.0 255.255.255.0 Inside&lt;BR /&gt;http 10.1.21.0 255.255.255.0 Inside&lt;BR /&gt;http 10.0.0.0 255.0.0.0 Inside&lt;BR /&gt;http 10.20.0.0 255.255.0.0 Outside&lt;BR /&gt;snmp-server host Inside 10.1.21.30 community ***** version 2c udp-port 161&lt;BR /&gt;snmp-server host Inside 10.1.21.55 community ***** version 2c udp-port 161&lt;BR /&gt;snmp-server location Corp&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server community *****&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;snmp-server enable traps syslog&lt;BR /&gt;snmp-server enable traps ipsec start stop&lt;BR /&gt;sysopt connection timewait&lt;BR /&gt;crypto ipsec ikev1 transform-set myset esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set mystanion esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt;&amp;nbsp;protocol esp encryption aes-256&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt;&amp;nbsp;protocol esp encryption aes-192&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt;&amp;nbsp;protocol esp encryption aes&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt;&amp;nbsp;protocol esp encryption 3des&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt;&amp;nbsp;protocol esp encryption des&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto dynamic-map client-vpn 10 set ikev1 transform-set myset&lt;BR /&gt;crypto dynamic-map mymap 1 set ikev1 transform-set mystanion ESP-3DES-SHA&lt;BR /&gt;crypto dynamic-map mymap 1 set reverse-route&lt;BR /&gt;crypto map StanionVPN 10 ipsec-isakmp dynamic client-vpn&lt;BR /&gt;crypto map dyn-map 10 ipsec-isakmp dynamic mymap&lt;BR /&gt;crypto map dyn-map interface Outside&lt;BR /&gt;no crypto isakmp nat-traversal&lt;BR /&gt;crypto isakmp disconnect-notify&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt;&amp;nbsp;encryption aes-192&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 20&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 30&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 40&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev1 enable Outside&lt;BR /&gt;crypto ikev1 ipsec-over-tcp port 10000&lt;BR /&gt;crypto ikev1 policy 1&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 30&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash md5&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 65535&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 10.20.0.0 255.255.0.0 Outside&lt;BR /&gt;ssh 10.0.0.0 255.0.0.0 Inside&lt;BR /&gt;ssh timeout 15&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;wccp web-cache redirect-list Web_filter&lt;BR /&gt;wccp interface Inside web-cache redirect in&lt;BR /&gt;ntp server 10.1.254.1 source Inside prefer&lt;BR /&gt;webvpn&lt;BR /&gt;&amp;nbsp;enable Outside&lt;BR /&gt;&amp;nbsp;anyconnect-essentials&lt;BR /&gt;&amp;nbsp;anyconnect image disk1:/anyconnect-dart-win-2.5.3055-k9.pkg 1&lt;BR /&gt;&amp;nbsp;anyconnect image disk1:/anyconnect-win-3.1.03103-k9.pkg 2&lt;BR /&gt;&amp;nbsp;anyconnect enable&lt;BR /&gt;&amp;nbsp;tunnel-group-list enable&lt;BR /&gt;group-policy split-tunnel internal&lt;BR /&gt;group-policy split-tunnel attributes&lt;BR /&gt;&amp;nbsp;vpn-idle-timeout 30&lt;BR /&gt;group-policy GroupPolicy_StanionAny internal&lt;BR /&gt;group-policy GroupPolicy_StanionAny attributes&lt;BR /&gt;&amp;nbsp;wins-server value 10.1.21.60&lt;BR /&gt;&amp;nbsp;dns-server value 10.1.21.60 10.1.21.25&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ssl-client ssl-clientless&lt;BR /&gt;&amp;nbsp;default-domain value stanion.com&lt;BR /&gt;group-policy clientvpn internal&lt;BR /&gt;group-policy clientvpn attributes&lt;BR /&gt;&amp;nbsp;dns-server value 10.1.21.60 10.1.21.25&lt;BR /&gt;&amp;nbsp;vpn-idle-timeout 20&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ikev1 l2tp-ipsec&lt;BR /&gt;&amp;nbsp;ipsec-udp enable&lt;BR /&gt;&amp;nbsp;ipsec-udp-port 10000&lt;BR /&gt;&amp;nbsp;split-tunnel-policy tunnelspecified&lt;BR /&gt;&amp;nbsp;split-tunnel-network-list value splittunnel&lt;BR /&gt;&amp;nbsp;default-domain value Stanion.com&lt;BR /&gt;group-policy clientgroup internal&lt;BR /&gt;username StanionAny password y9al.Ax396eTnCwt encrypted&lt;BR /&gt;username stanion password jzeq0YLBbw50qQPY encrypted&lt;BR /&gt;tunnel-group DefaultL2LGroup ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;&amp;nbsp;peer-id-validate nocheck&lt;BR /&gt;tunnel-group clientvpn type remote-access&lt;BR /&gt;tunnel-group clientvpn general-attributes&lt;BR /&gt;&amp;nbsp;address-pool vpn-pool&lt;BR /&gt;&amp;nbsp;authorization-server-group LOCAL&lt;BR /&gt;&amp;nbsp;default-group-policy clientvpn&lt;BR /&gt;tunnel-group clientvpn ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;&amp;nbsp;ikev1 user-authentication none&lt;BR /&gt;tunnel-group split-tunnel type remote-access&lt;BR /&gt;tunnel-group split-tunnel general-attributes&lt;BR /&gt;&amp;nbsp;default-group-policy split-tunnel&lt;BR /&gt;tunnel-group StanionAny type remote-access&lt;BR /&gt;tunnel-group StanionAny general-attributes&lt;BR /&gt;&amp;nbsp;address-pool vpn-pool&lt;BR /&gt;&amp;nbsp;authentication-server-group AD&lt;BR /&gt;&amp;nbsp;default-group-policy GroupPolicy_StanionAny&lt;BR /&gt;tunnel-group StanionAny webvpn-attributes&lt;BR /&gt;&amp;nbsp;group-alias StanionAny enable&lt;BR /&gt;!&lt;BR /&gt;class-map global-class&lt;BR /&gt;&amp;nbsp;match any&lt;BR /&gt;class-map Outside-ips-class&lt;BR /&gt;&amp;nbsp;match any&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;class-map http-map1&lt;BR /&gt;&amp;nbsp;match access-list http-list2&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns migrated_dns_map_1&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect icmp error&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp;class http-map1&lt;BR /&gt;&amp;nbsp; set connection advanced-options mss-map&lt;BR /&gt;&amp;nbsp;class global-class&lt;BR /&gt;&amp;nbsp; flow-export event-type all destination 10.1.21.30 10.1.21.55&lt;BR /&gt;policy-map Outside-IPS-Policy&lt;BR /&gt;&amp;nbsp;description Outside IPS Rule sends traffic to ips for inspection&lt;BR /&gt;&amp;nbsp;class Outside-ips-class&lt;BR /&gt;&amp;nbsp; ips inline fail-open&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;service-policy Outside-IPS-Policy interface Outside&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;&amp;nbsp;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email callhome@cisco.com&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;hpm topN enable&lt;BR /&gt;Cryptochecksum:22033f54e5f5d2eb77a8f018b1f5443c&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Sep 2014 19:52:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-tcp-deny-no-connection-and-0-syn-timeout/m-p/2504368#M235101</guid>
      <dc:creator>Brian Beaman</dc:creator>
      <dc:date>2014-09-04T19:52:33Z</dc:date>
    </item>
    <item>
      <title>Looks like the ASA is not</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-tcp-deny-no-connection-and-0-syn-timeout/m-p/2504369#M235110</link>
      <description>&lt;P&gt;Looks like the ASA is not dropping the connection , maybe the server / ISP&amp;nbsp;is cutting off the connection.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would check that part first , before doing any changes on the ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Randy -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Sep 2014 20:06:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-tcp-deny-no-connection-and-0-syn-timeout/m-p/2504369#M235110</guid>
      <dc:creator>rvarelac</dc:creator>
      <dc:date>2014-09-04T20:06:24Z</dc:date>
    </item>
    <item>
      <title>Is there a command to see</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-tcp-deny-no-connection-and-0-syn-timeout/m-p/2504370#M235116</link>
      <description>&lt;P&gt;Is there a command to see what our PAT rule for our general public IP&amp;nbsp;is translating to on the inside so I could find the devices that trustwave is actually talking to?&lt;/P&gt;</description>
      <pubDate>Mon, 08 Sep 2014 15:12:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-tcp-deny-no-connection-and-0-syn-timeout/m-p/2504370#M235116</guid>
      <dc:creator>Brian Beaman</dc:creator>
      <dc:date>2014-09-08T15:12:43Z</dc:date>
    </item>
    <item>
      <title>Never mind I found it. I</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-tcp-deny-no-connection-and-0-syn-timeout/m-p/2504371#M235123</link>
      <description>&lt;P&gt;Never mind I found it. I discovered that DNS had a bad record that was pointing the scan to a device that didn't exist. Thanks for the help!&lt;/P&gt;</description>
      <pubDate>Mon, 08 Sep 2014 17:08:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-tcp-deny-no-connection-and-0-syn-timeout/m-p/2504371#M235123</guid>
      <dc:creator>Brian Beaman</dc:creator>
      <dc:date>2014-09-08T17:08:31Z</dc:date>
    </item>
    <item>
      <title>Hi Brian. "Show xlate " is</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-tcp-deny-no-connection-and-0-syn-timeout/m-p/2504372#M235130</link>
      <description>&lt;P&gt;Hi Brian.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"Show xlate " is the command your looking for.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Use show xlate | incl (server ip ) to filter the results and see the public/private IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Randy-&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Sep 2014 16:47:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-tcp-deny-no-connection-and-0-syn-timeout/m-p/2504372#M235130</guid>
      <dc:creator>rvarelac</dc:creator>
      <dc:date>2014-09-09T16:47:06Z</dc:date>
    </item>
  </channel>
</rss>

