<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic The ACL does not have a deny in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-group-deny-tcp/m-p/2459885#M238608</link>
    <description>&lt;P&gt;The ACL does not have a deny statement in the configuration; only the implicit deny at the end of the ACL.&lt;/P&gt;</description>
    <pubDate>Mon, 12 May 2014 20:08:23 GMT</pubDate>
    <dc:creator>randydrobinson</dc:creator>
    <dc:date>2014-05-12T20:08:23Z</dc:date>
    <item>
      <title>access-group deny tcp</title>
      <link>https://community.cisco.com/t5/network-security/access-group-deny-tcp/m-p/2459883#M238604</link>
      <description>&lt;P&gt;Looking for direction on where to isolate why the source (a.a.a.a) is not able to establish http connection with dst. I see these entries in the logs on the ASA.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Apr 24 2014 18:12:10: %ASA-4-106023: Deny tcp src AHMCORP:a.a.a.a/47991 dst inside:172.16.19.32/80 by access-group "AHMCORP_acl" [0x0, 0x0]&lt;BR /&gt;&lt;BR /&gt;Apr 24 2014 18:23:54: %ASA-4-106023: Deny tcp src AHMCORP:a.a.a.a/50470 dst inside:172.16.19.33/80 by access-group "AHMCORP_acl" [0x0, 0x0]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please advise.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:10:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-group-deny-tcp/m-p/2459883#M238604</guid>
      <dc:creator>randydrobinson</dc:creator>
      <dc:date>2019-03-12T04:10:39Z</dc:date>
    </item>
    <item>
      <title>Hi ,</title>
      <link>https://community.cisco.com/t5/network-security/access-group-deny-tcp/m-p/2459884#M238605</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Do you have appropriate firewall rule for this source and destination on your access-list&amp;nbsp;&lt;SPAN style="font-size: 14px;"&gt;AHMCORP_acl , kindly verify your ACL , have you configured deny statement on your ACL ??&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;ensure permit rule is above your deny rule .&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Syslog message says below information , check on source machine any port scanning attempt is being done&amp;nbsp;&lt;/P&gt;
&lt;H3 class="p_H_Head2"&gt;&lt;SPAN class="content"&gt;&amp;nbsp;106023 &lt;/SPAN&gt;&lt;/H3&gt;

&lt;PRE&gt;
&lt;SPAN class="content"&gt;&lt;A name="wp4769023"&gt;&lt;/A&gt;&lt;SPAN class="pEM_ErrMsg"&gt;&lt;SPAN class="cBoldNormal"&gt;Error Message&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt; %PIX|ASA-4-106023: Deny &lt;SPAN style="color: black; font-style: oblique;"&gt;protocol &lt;/SPAN&gt;src 
[&lt;EM class="cEmphasis"&gt;interface_name&lt;/EM&gt;:&lt;EM class="cEmphasis"&gt;source_address/source_port&lt;/EM&gt;] dst 
&lt;EM class="cEmphasis"&gt;interface_name&lt;/EM&gt;:&lt;EM class="cEmphasis"&gt;dest_address/dest_port&lt;/EM&gt; [type {&lt;EM class="cEmphasis"&gt;string&lt;/EM&gt;}, code {&lt;EM class="cEmphasis"&gt;code&lt;/EM&gt;}] by&lt;B class="cBold"&gt; 
&lt;/B&gt;access_group &lt;EM class="cEmphasis"&gt;acl_ID
&lt;/EM&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;SPAN class="content"&gt;&lt;A name="wp4769026"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="pEE_ErrExp"&gt;&lt;SPAN class="content"&gt;&lt;SPAN class="cBoldNormal"&gt;Explanation&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt; A real IP packet was denied by the ACL. This message displays even if you do not have the &lt;B class="cBold"&gt;log&lt;/B&gt; option enabled for an ACL. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="content"&gt;&lt;A name="wp4769027"&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="pEA_ErrAct"&gt;&lt;SPAN class="content"&gt;&lt;SPAN class="cBoldNormal"&gt;Recommended Action&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt; If messages persist from the same source address, messages might indicate a foot-printing or port-scanning attempt. Contact the remote host administrators.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="pEA_ErrAct"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="pEA_ErrAct"&gt;&lt;SPAN class="content"&gt;HTH&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="pEA_ErrAct"&gt;&lt;SPAN class="content"&gt;sandy.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="pEA_ErrAct"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 May 2014 02:33:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-group-deny-tcp/m-p/2459884#M238605</guid>
      <dc:creator>SANTHOSHKUMAR SARAVANAN</dc:creator>
      <dc:date>2014-05-09T02:33:45Z</dc:date>
    </item>
    <item>
      <title>The ACL does not have a deny</title>
      <link>https://community.cisco.com/t5/network-security/access-group-deny-tcp/m-p/2459885#M238608</link>
      <description>&lt;P&gt;The ACL does not have a deny statement in the configuration; only the implicit deny at the end of the ACL.&lt;/P&gt;</description>
      <pubDate>Mon, 12 May 2014 20:08:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-group-deny-tcp/m-p/2459885#M238608</guid>
      <dc:creator>randydrobinson</dc:creator>
      <dc:date>2014-05-12T20:08:23Z</dc:date>
    </item>
    <item>
      <title>Hi Randy , Do a packet tracer</title>
      <link>https://community.cisco.com/t5/network-security/access-group-deny-tcp/m-p/2459886#M238611</link>
      <description>&lt;P&gt;Hi Randy ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;Do a packet tracer from specfied source and destinatin for further troubleshooting . Share me the output of your packet tracer output .&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa80/command/reference/cmd_ref/p.html#wp1878788"&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa80/command/reference/cmd_ref/p.html#wp1878788&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H2 class="pCRC_CmdRefCommand" style="font-size: 14px; color: rgb(51, 102, 102); font-weight: bold; font-family: Arial, Helvetica, sans-serif; margin: 14px 0em 7px -0.1in; line-height: normal;"&gt;packet-tracer&lt;/H2&gt;&lt;P&gt;&lt;A name="wp1878790" style="color: rgb(0, 0, 0); font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: normal; background-color: rgb(255, 255, 255);"&gt;&lt;/A&gt;&lt;A name="wpmkr1878789" style="color: rgb(0, 0, 0); font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: normal; background-color: rgb(255, 255, 255);"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P class="pB1_Body1" style="color: rgb(0, 0, 0); font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin: 1px 0em 6px; line-height: normal;"&gt;To enable packet tracing capabilities for packet sniffing and network fault isolation, use the&amp;nbsp;&lt;B class="cBold"&gt;packet-tracer&lt;/B&gt;&amp;nbsp;commandin privileged EXEC configuration mode. To disable packet capture capabilities, use the&amp;nbsp;&lt;B class="cBold"&gt;no&lt;/B&gt;&amp;nbsp;form of this command.&lt;/P&gt;&lt;P&gt;&lt;A name="wp1878791" style="color: rgb(0, 0, 0); font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: normal; background-color: rgb(255, 255, 255);"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P class="pCENB_CmdEnv_NoBold" style="color: rgb(0, 0, 0); font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin: 1px 0em 6px 0.5in; text-indent: -0.25in; line-height: normal;"&gt;&lt;B class="cCN_CmdName"&gt;packet-tracer&lt;/B&gt;&amp;nbsp;&lt;B class="cCN_CmdName"&gt;input&lt;/B&gt;&lt;EM class="cCi_CmdItalic"&gt;&amp;nbsp;&lt;/EM&gt;[&lt;EM class="cArgument"&gt;src_int&lt;/EM&gt;]&lt;EM class="cCi_CmdItalic"&gt;&amp;nbsp;protocol src_addr src_port dest_addr dest_port&amp;nbsp;&lt;/EM&gt;[&lt;B class="cCN_CmdName"&gt;detailed&lt;/B&gt;] [&lt;B class="cCN_CmdName"&gt;xml&lt;/B&gt;]&lt;/P&gt;&lt;P&gt;&lt;A name="wp1878792" style="color: rgb(0, 0, 0); font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: normal; background-color: rgb(255, 255, 255);"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P class="pCE_CmdEnv" style="color: rgb(0, 0, 0); font-family: Arial, Helvetica, sans-serif; font-size: 12px; font-weight: bold; margin: 1px 0em 6px 0.5in; text-indent: -0.25in; line-height: normal;"&gt;no&amp;nbsp;&lt;B class="cCN_CmdName"&gt;packet-tracer&lt;/B&gt;&lt;/P&gt;&lt;P&gt;&lt;A name="wp1878826" style="color: rgb(0, 0, 0); font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: normal; background-color: rgb(255, 255, 255);"&gt;&lt;/A&gt;&lt;/P&gt;&lt;H3 class="pCRSD_CmdRefSynDesc" style="font-size: 12px; color: rgb(0, 0, 0); font-weight: bold; font-family: Arial, Helvetica, sans-serif; margin: 7px 0em 7px -0.1in; line-height: normal;"&gt;Syntax Description&lt;/H3&gt;&lt;DIV align="left" style="color: rgb(0, 0, 0); font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: normal;"&gt;&lt;TABLE border="1" bordercolor="#808080" cellpadding="3" cellspacing="0" id="wp1878795table1878793" width="80%"&gt;&lt;CAPTION style="margin: 14px 0em 0px 0in; text-align: left; text-indent: 0em;"&gt;&amp;nbsp;&lt;/CAPTION&gt;&lt;TBODY&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;A name="wp1878795"&gt;&lt;/A&gt;&lt;P class="pB1_Body1" style="font-size: 12px; margin: 1px 0em 6px; text-indent: 0em;"&gt;&lt;B class="cCN_CmdName"&gt;input&lt;/B&gt;&lt;B class="cBold"&gt;&amp;nbsp;&lt;/B&gt;&lt;EM class="cArgument"&gt;src_int&lt;/EM&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;A name="wp1878797"&gt;&lt;/A&gt;&lt;P class="pB1_Body1" style="font-size: 12px; margin: 1px 0em 6px; text-indent: 0em;"&gt;Specifies the source interface for the packet trace.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;A name="wp1878799"&gt;&lt;/A&gt;&lt;P class="pB1_Body1" style="font-size: 12px; margin: 1px 0em 6px; text-indent: 0em;"&gt;&lt;EM class="cArgument"&gt;protocol&lt;/EM&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;A name="wp1878801"&gt;&lt;/A&gt;&lt;P class="pB1_Body1" style="font-size: 12px; margin: 1px 0em 6px; text-indent: 0em;"&gt;Specifies the protocol type for the packet trace. Available protocol type keywords are&amp;nbsp;&lt;EM class="cArgument"&gt;icmp&lt;/EM&gt;,&amp;nbsp;&lt;EM class="cArgument"&gt;rawip&lt;/EM&gt;,&amp;nbsp;&lt;EM class="cArgument"&gt;tcp&lt;/EM&gt;&amp;nbsp;or&amp;nbsp;&lt;EM class="cArgument"&gt;udp&lt;/EM&gt;.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;A name="wp1878803"&gt;&lt;/A&gt;&lt;P class="pB1_Body1" style="font-size: 12px; margin: 1px 0em 6px; text-indent: 0em;"&gt;&lt;EM class="cCi_CmdItalic"&gt;src_addr&lt;/EM&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;A name="wp1878805"&gt;&lt;/A&gt;&lt;P class="pB1_Body1" style="font-size: 12px; margin: 1px 0em 6px; text-indent: 0em;"&gt;Specifies the source address for the packet trace.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;A name="wp1878807"&gt;&lt;/A&gt;&lt;P class="pB1_Body1" style="font-size: 12px; margin: 1px 0em 6px; text-indent: 0em;"&gt;&lt;EM class="cCi_CmdItalic"&gt;src_port&lt;/EM&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;A name="wp1878809"&gt;&lt;/A&gt;&lt;P class="pB1_Body1" style="font-size: 12px; margin: 1px 0em 6px; text-indent: 0em;"&gt;Specifies the source port for the packet trace.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;A name="wp1878811"&gt;&lt;/A&gt;&lt;P class="pB1_Body1" style="font-size: 12px; margin: 1px 0em 6px; text-indent: 0em;"&gt;&lt;EM class="cCi_CmdItalic"&gt;dest_addr&lt;/EM&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;A name="wp1878813"&gt;&lt;/A&gt;&lt;P class="pB1_Body1" style="font-size: 12px; margin: 1px 0em 6px; text-indent: 0em;"&gt;Specifies the destination address for the packet trace.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;A name="wp1878815"&gt;&lt;/A&gt;&lt;P class="pB1_Body1" style="font-size: 12px; margin: 1px 0em 6px; text-indent: 0em;"&gt;&lt;EM class="cCi_CmdItalic"&gt;dest_port&lt;/EM&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;A name="wp1878817"&gt;&lt;/A&gt;&lt;P class="pB1_Body1" style="font-size: 12px; margin: 1px 0em 6px; text-indent: 0em;"&gt;Specifies the destination port for the packet trace.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;A name="wp1878819"&gt;&lt;/A&gt;&lt;P class="pB1_Body1" style="font-size: 12px; margin: 1px 0em 6px; text-indent: 0em;"&gt;&lt;B class="cCN_CmdName"&gt;detailed&lt;/B&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;A name="wp1878821"&gt;&lt;/A&gt;&lt;P class="pB1_Body1" style="font-size: 12px; margin: 1px 0em 6px; text-indent: 0em;"&gt;(Optional) Provides detailed packet trace information.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;A name="wp1878823"&gt;&lt;/A&gt;&lt;P class="pB1_Body1" style="font-size: 12px; margin: 1px 0em 6px; text-indent: 0em;"&gt;&lt;B class="cCN_CmdName"&gt;xml&lt;/B&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;A name="wp1878825"&gt;&lt;/A&gt;&lt;P class="pB1_Body1" style="font-size: 12px; margin: 1px 0em 6px; text-indent: 0em;"&gt;(Optional) Displays the trace capture in XML format.&lt;/P&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;sandy.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 13 May 2014 11:09:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-group-deny-tcp/m-p/2459886#M238611</guid>
      <dc:creator>SANTHOSHKUMAR SARAVANAN</dc:creator>
      <dc:date>2014-05-13T11:09:39Z</dc:date>
    </item>
    <item>
      <title>I believe the source host(s)</title>
      <link>https://community.cisco.com/t5/network-security/access-group-deny-tcp/m-p/2459887#M238614</link>
      <description>&lt;P&gt;I believe the source host(s)/network IPs are missing from the object-group.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Here is unsuccessful packet-tracer output:&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;asa5545-v8.6(1)2# packet-tracer input AHMCORP tcp x.x.x.x 80 x.x.x.x 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network obj-172.16.19.33-(inside-AHMCORP)&lt;BR /&gt;&amp;nbsp;nat (inside,AHMCORP) static x.x.x.x&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate x.x.x.x/80 to 172.16.19.33/80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7ffec8aed620, priority=11, domain=permit, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=29172452, user_data=0x5, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=AHMCORP, output_ifc=any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: AHMCORP&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;asa5545-v8.6(1)2#&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Here is successful packet-tracer output:&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;asa5545-v8.6(1)2# packet-tracer input AHMCORP tcp x.x.x.x 80 x.x.x.x 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network obj-172.16.19.32-(inside-AHMCORP)&lt;BR /&gt;&amp;nbsp;nat (inside,AHMCORP) static x.x.x.x&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate x.x.x.x/80 to 172.16.19.32/80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group AHMCORP_acl in interface AHMCORP&lt;BR /&gt;access-list AHMCORP_acl extended permit tcp object-group corpahm object-group virtwebs object-group prodsvcs log&lt;BR /&gt;object-group network corpahm&lt;BR /&gt;&amp;nbsp;&lt;EM&gt;&amp;lt;removed - source IP of the unsuccessful packet-tracer is not contained in the object-group&amp;gt;&lt;/EM&gt;&lt;BR /&gt;object-group network virtwebs&lt;BR /&gt;&amp;nbsp;network-object host 172.16.19.32&lt;BR /&gt;&amp;nbsp;network-object host 172.16.19.33&lt;BR /&gt;object-group service prodsvcs tcp&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;&amp;nbsp;port-object eq 446&lt;BR /&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 3&lt;BR /&gt;Type: CONN-SETTINGS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 5&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;object network obj-172.16.19.32-(inside-AHMCORP)&lt;BR /&gt;&amp;nbsp;nat (inside,AHMCORP) static x.x.x.x&lt;BR /&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 8&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 505119575, packet dispatched to next module&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result:&lt;BR /&gt;input-interface: AHMCORP&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;asa5545-v8.6(1)2#&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 May 2014 21:38:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-group-deny-tcp/m-p/2459887#M238614</guid>
      <dc:creator>randydrobinson</dc:creator>
      <dc:date>2014-05-23T21:38:31Z</dc:date>
    </item>
  </channel>
</rss>

