<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi, So are you saying that in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cant-access-epson-com-via-asa/m-p/2543347#M235911</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So are you saying that the connectivity to the mentioned site worked just fine with the ASA and then suddenly stopped working? It would seem strange that the ASA would have anything to do with this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I guess I would personally first use the "nslookup" to determine the IP address to which the host is connecting and monitor that IP address through the ASDM of the ASA. I guess it might be required also that you simply monitor connections formed from your test host through the ASDM. You could them monitor the TCP connection &lt;STRONG&gt;"Teardown"&lt;/STRONG&gt; messages and see what the reason for the &lt;STRONG&gt;"Teardown"&lt;/STRONG&gt; is. If its &lt;STRONG&gt;TCP FINs&lt;/STRONG&gt; then it refers to normal connection close sequence. If its &lt;STRONG&gt;SYN Timeout&lt;/STRONG&gt; then it means that the TCP connection opening sequence didnt go through and the most usual reason is that the remote host does not reply or some other device in between blocks this. The result might also be &lt;STRONG&gt;TCP Reset-O&lt;/STRONG&gt; or &lt;STRONG&gt;TCP Reset-I&lt;/STRONG&gt; which are resets either from the less secure or more secure interface (inside/outside determine by the &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; value) Though the resets might be a bit harder to troubleshoot as you see them normally in browser based traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I guess this point I would perhaps try using different computers and browsers to test and also see that no software on the actual host could affect this. I doubt that there is any web filtering in use that you would not know about that could cause this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But as I said the ASDM real time logs should give us some idea on what the problem is.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can also take a traffic capture on the ASA on its internal interface and perhaps on the external interface too to confirm if there is any return traffic from the remote host (server) coming to your ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you want to configure traffic capture on the ASA you can use the following configurations&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list EPSON-EXT-CAP permit ip host &amp;lt;your external pat ip&amp;gt; host &amp;lt;epson.com ip&amp;gt;&lt;BR /&gt;access-list EPSON-EXT-CAP permit ip host &amp;lt;epson.com ip&amp;gt; host &amp;lt;your external pat ip&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list EPSON-INT-CAP permit ip host &amp;lt;your internal host ip&amp;gt; host &amp;lt;epson.com ip&amp;gt;&lt;BR /&gt;access-list EPSON-INT-CAP permit ip host &amp;lt;epson.com ip&amp;gt; host &amp;lt;your internal host ip&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;capture EPSON-EXT-CAP type raw-data packet-length 1522 access-list EPSON-EXT-CAP interface outside-fios buffer 33500000 circular-buffer&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;capture EPSON-INT-CAP type raw-data packet-length 1522 access-list EPSON-INT-CAP interface inside buffer 33500000 circular-buffer&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With regards to the above &lt;STRONG&gt;"access-list"&lt;/STRONG&gt;&amp;nbsp; and &lt;STRONG&gt;"capture"&lt;/STRONG&gt; configurations I would like to stress the following points&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The ACL tells what traffic to capture. So if there are multiple destination IP addresses or subnets then you can add ACL line for them too in the same ACL. You can also narrow down the &lt;STRONG&gt;"permit ip"&lt;/STRONG&gt; to &lt;STRONG&gt;"permit tcp"&lt;/STRONG&gt; etc.&lt;/LI&gt;&lt;LI&gt;The configuration using the EXT ACL will catch any users traffic in this case as you we are capturing traffic from a Dynamic PAT IP address which all uses shar. That makes it more viable to use the capture in the internal IP address if there is a lot of users trying to access that destination IP address. But it might be good to take the EXT capture anyway.&lt;/LI&gt;&lt;LI&gt;In the capture configuraitons I have configured almost the maximum buffer memory for the capture. You can use a lower value if needed/required.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To view if any traffic has been capture you can use the command&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show capture&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To view the capture on the CLI you can use the command&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show capture &amp;lt;capture name&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To copy the capture to your computer with TFTP you can use the command&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;copy /pcap capture:&amp;lt;capture name&amp;gt; tftp://&amp;lt;host ip&amp;gt;/filename.pcap&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can then open the capture file on your computer with Wireshark for easier troubleshooting.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can remove the captures (and their data) with the command&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no capture &amp;lt;capture name&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You will have to remove the created ACLs separately.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 05 Aug 2014 20:31:17 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2014-08-05T20:31:17Z</dc:date>
    <item>
      <title>Cant Access epson.com via ASA</title>
      <link>https://community.cisco.com/t5/network-security/cant-access-epson-com-via-asa/m-p/2543346#M235910</link>
      <description>&lt;P&gt;This is an odd one and i'm really confused. &amp;nbsp;I'm hoping someone in the community can assist. &amp;nbsp;I installed an ASA 5510 on our network to replace an old AdTran. &amp;nbsp;The ASA has been up for a few months now with no issues. &amp;nbsp;All of the sudden we can no longer access epson.com. &amp;nbsp;I have no issues with nsloopup, tracert, icmp, back to epson.com&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; outside-fios&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-list inside_access_in extended permit ip any any&amp;nbsp;&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&amp;nbsp;&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&amp;nbsp;&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside) 1 192.168.254.0 255.255.255.0&lt;BR /&gt;&amp;nbsp; match ip inside 192.168.254.0 255.255.255.0 outside-fios any&lt;BR /&gt;&amp;nbsp; &amp;nbsp; dynamic translation to pool 1 (72.75.xxx.xxx [Interface PAT])&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 55089, untranslate_hits = 6539&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 192.168.254.145/80 to 72.75.xxx.xxx/416 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside) 1 192.168.254.0 255.255.255.0&lt;BR /&gt;&amp;nbsp; match ip inside 192.168.254.0 255.255.255.0 inside any&lt;BR /&gt;&amp;nbsp; &amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&amp;nbsp;&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&amp;nbsp;&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 128290, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside-fios&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ASA5510(config)#&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:34:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-access-epson-com-via-asa/m-p/2543346#M235910</guid>
      <dc:creator>dale.summers</dc:creator>
      <dc:date>2019-03-12T04:34:54Z</dc:date>
    </item>
    <item>
      <title>Hi, So are you saying that</title>
      <link>https://community.cisco.com/t5/network-security/cant-access-epson-com-via-asa/m-p/2543347#M235911</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So are you saying that the connectivity to the mentioned site worked just fine with the ASA and then suddenly stopped working? It would seem strange that the ASA would have anything to do with this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I guess I would personally first use the "nslookup" to determine the IP address to which the host is connecting and monitor that IP address through the ASDM of the ASA. I guess it might be required also that you simply monitor connections formed from your test host through the ASDM. You could them monitor the TCP connection &lt;STRONG&gt;"Teardown"&lt;/STRONG&gt; messages and see what the reason for the &lt;STRONG&gt;"Teardown"&lt;/STRONG&gt; is. If its &lt;STRONG&gt;TCP FINs&lt;/STRONG&gt; then it refers to normal connection close sequence. If its &lt;STRONG&gt;SYN Timeout&lt;/STRONG&gt; then it means that the TCP connection opening sequence didnt go through and the most usual reason is that the remote host does not reply or some other device in between blocks this. The result might also be &lt;STRONG&gt;TCP Reset-O&lt;/STRONG&gt; or &lt;STRONG&gt;TCP Reset-I&lt;/STRONG&gt; which are resets either from the less secure or more secure interface (inside/outside determine by the &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; value) Though the resets might be a bit harder to troubleshoot as you see them normally in browser based traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I guess this point I would perhaps try using different computers and browsers to test and also see that no software on the actual host could affect this. I doubt that there is any web filtering in use that you would not know about that could cause this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But as I said the ASDM real time logs should give us some idea on what the problem is.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can also take a traffic capture on the ASA on its internal interface and perhaps on the external interface too to confirm if there is any return traffic from the remote host (server) coming to your ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you want to configure traffic capture on the ASA you can use the following configurations&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list EPSON-EXT-CAP permit ip host &amp;lt;your external pat ip&amp;gt; host &amp;lt;epson.com ip&amp;gt;&lt;BR /&gt;access-list EPSON-EXT-CAP permit ip host &amp;lt;epson.com ip&amp;gt; host &amp;lt;your external pat ip&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list EPSON-INT-CAP permit ip host &amp;lt;your internal host ip&amp;gt; host &amp;lt;epson.com ip&amp;gt;&lt;BR /&gt;access-list EPSON-INT-CAP permit ip host &amp;lt;epson.com ip&amp;gt; host &amp;lt;your internal host ip&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;capture EPSON-EXT-CAP type raw-data packet-length 1522 access-list EPSON-EXT-CAP interface outside-fios buffer 33500000 circular-buffer&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;capture EPSON-INT-CAP type raw-data packet-length 1522 access-list EPSON-INT-CAP interface inside buffer 33500000 circular-buffer&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With regards to the above &lt;STRONG&gt;"access-list"&lt;/STRONG&gt;&amp;nbsp; and &lt;STRONG&gt;"capture"&lt;/STRONG&gt; configurations I would like to stress the following points&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The ACL tells what traffic to capture. So if there are multiple destination IP addresses or subnets then you can add ACL line for them too in the same ACL. You can also narrow down the &lt;STRONG&gt;"permit ip"&lt;/STRONG&gt; to &lt;STRONG&gt;"permit tcp"&lt;/STRONG&gt; etc.&lt;/LI&gt;&lt;LI&gt;The configuration using the EXT ACL will catch any users traffic in this case as you we are capturing traffic from a Dynamic PAT IP address which all uses shar. That makes it more viable to use the capture in the internal IP address if there is a lot of users trying to access that destination IP address. But it might be good to take the EXT capture anyway.&lt;/LI&gt;&lt;LI&gt;In the capture configuraitons I have configured almost the maximum buffer memory for the capture. You can use a lower value if needed/required.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To view if any traffic has been capture you can use the command&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show capture&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To view the capture on the CLI you can use the command&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show capture &amp;lt;capture name&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To copy the capture to your computer with TFTP you can use the command&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;copy /pcap capture:&amp;lt;capture name&amp;gt; tftp://&amp;lt;host ip&amp;gt;/filename.pcap&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can then open the capture file on your computer with Wireshark for easier troubleshooting.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can remove the captures (and their data) with the command&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no capture &amp;lt;capture name&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You will have to remove the created ACLs separately.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Aug 2014 20:31:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-access-epson-com-via-asa/m-p/2543347#M235911</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-08-05T20:31:17Z</dc:date>
    </item>
  </channel>
</rss>

