<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5516-X blocking all inward access in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5516-x-blocking-all-inward-access/m-p/3926476#M24589</link>
    <description>&lt;P&gt;As promised - updating on this issue. Yes it was indeed the ARP cache that needed clearing. I ended up power cycling the connecting switches and upstream ISP router and inward access and NAT started working. &lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;span class="lia-unicode-emoji" title=":beaming_face_with_smiling_eyes:"&gt;😁&lt;/span&gt;&lt;span class="lia-unicode-emoji" title=":winking_face_with_tongue:"&gt;😜&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks a lot GRANT3779 and bhargavdesai for your assistance.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 18 Sep 2019 17:42:33 GMT</pubDate>
    <dc:creator>AirspanIT</dc:creator>
    <dc:date>2019-09-18T17:42:33Z</dc:date>
    <item>
      <title>ASA 5516-X blocking all inward access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-x-blocking-all-inward-access/m-p/3922409#M24554</link>
      <description>&lt;P&gt;Hi experts. I recently got a 5516-X as an upgrade over our existing ASA 5510. I have configured everything on the 5516-X as per the 5510 ie NATs, static routes, access list implemented on the outside interface for allowing access to servers on specific ports, andeverything else I can think of. The issue is that 5516-X still does not permit any inward access ie I cannot access our Exchange server from outside using browser. On the ASA 5510 it works perfectly with the same configuration. Is there any new hardened security on the 5516-X or do I need to add any additional configuration to make it work. Just banging my head really as I am out of ideas as to why it wont allow inward. Outwards access eg users browsing the Interent and all our VPN access both ways is working fine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks for your input.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2019 11:35:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-x-blocking-all-inward-access/m-p/3922409#M24554</guid>
      <dc:creator>AirspanIT</dc:creator>
      <dc:date>2019-09-11T11:35:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5516-X blocking all inward access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-x-blocking-all-inward-access/m-p/3922420#M24559</link>
      <description>&lt;P&gt;Off the top of my head and just something to check. Is the Firewall sending traffic to a firepower module with default config?&lt;/P&gt;&lt;P&gt;What is output from&lt;/P&gt;&lt;P&gt;Sh run policy-map&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2019 11:56:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-x-blocking-all-inward-access/m-p/3922420#M24559</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-09-11T11:56:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5516-X blocking all inward access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-x-blocking-all-inward-access/m-p/3922426#M24562</link>
      <description>&lt;P&gt;With lack of configuration details for NAT and Access-list I would say run "packet-tracer" to find out where the traffic is blocking.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2019 11:58:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-x-blocking-all-inward-access/m-p/3922426#M24562</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-09-11T11:58:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5516-X blocking all inward access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-x-blocking-all-inward-access/m-p/3922429#M24564</link>
      <description>&lt;P&gt;Thanks GRANT3779. How would I know if the firewall is sending traffic to the Firepower module? It has the same route outside static route for default and route inside routes for our inside servers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the output from sh run policy-map&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect icmp&lt;BR /&gt;inspect icmp error&lt;BR /&gt;inspect pptp&lt;BR /&gt;class CM-HTTPS-TIMEOUT&lt;BR /&gt;set connection timeout half-closed 0:30:00&lt;BR /&gt;!&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2019 12:01:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-x-blocking-all-inward-access/m-p/3922429#M24564</guid>
      <dc:creator>AirspanIT</dc:creator>
      <dc:date>2019-09-11T12:01:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5516-X blocking all inward access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-x-blocking-all-inward-access/m-p/3922432#M24566</link>
      <description>&lt;P&gt;Thanks bhargavdesai. I have run packet-tracer with source interface outside and a random public IP and destination IP as the public IP of our Natted server. That all turns out to be allowed.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2019 12:04:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-x-blocking-all-inward-access/m-p/3922432#M24566</guid>
      <dc:creator>AirspanIT</dc:creator>
      <dc:date>2019-09-11T12:04:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5516-X blocking all inward access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-x-blocking-all-inward-access/m-p/3922434#M24567</link>
      <description>It is not there, so not that.&lt;BR /&gt;&lt;BR /&gt;We'd really need to see the config and NATs etc. On the previous Firewall what version of Software was running as there was a big change in NAT format from 8.3 onwards. Also, the interface numbering may be different from the 5510 to the 5516 so I assume a copy and paste wasn't done and rather a detailed analysis of the config before applying to new firewall.&lt;BR /&gt;&lt;BR /&gt;I'm sure we can point you in right direction if we can see more info.</description>
      <pubDate>Wed, 11 Sep 2019 12:07:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-x-blocking-all-inward-access/m-p/3922434#M24567</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-09-11T12:07:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5516-X blocking all inward access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-x-blocking-all-inward-access/m-p/3922449#M24569</link>
      <description>&lt;P&gt;GRANT3779: It is running ASA ver 9.8 and I was using 9.2 before so the NAT commands are the same. Interfaces yes I have changed accordingly and it wasnt a copy and paste job.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am copying some relevant information (changed some values) so hope that can give some insight. If you need any other particular configuration then please let me know.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/1&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 100.1.1.1&amp;nbsp; 255.0.0.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.16.1.2 255.255.255.240&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network obj_any&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network EXG-SER&lt;BR /&gt;nat (inside,outside) static 100.1.1.15&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list access_in extended permit tcp any4 object EXG-SER eq https&lt;BR /&gt;access-list access_in extended permit tcp any4 object EXG-SER eq 995&lt;BR /&gt;access-list access_in extended permit tcp any4 object EXG-SER eq 587&lt;BR /&gt;access-list access_in extended permit tcp any4 object EXG-SER eq pop3&lt;BR /&gt;access-list access_in extended permit tcp any4 object EXG-SER eq www&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-group access_in in interface outside&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2019 12:18:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-x-blocking-all-inward-access/m-p/3922449#M24569</guid>
      <dc:creator>AirspanIT</dc:creator>
      <dc:date>2019-09-11T12:18:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5516-X blocking all inward access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-x-blocking-all-inward-access/m-p/3922453#M24571</link>
      <description>Have the upstream ISP devices cleared their ARP Cache at all. Was this put in next to the other and then just "switch" old ASA off? I have seen issues with static NATs when swapping out ASA like for like due to ARP entries needing cleared on ISP kit. I ended up rebooting their local device but only due to it being late at night..</description>
      <pubDate>Wed, 11 Sep 2019 12:26:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-x-blocking-all-inward-access/m-p/3922453#M24571</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-09-11T12:26:01Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5516-X blocking all inward access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-x-blocking-all-inward-access/m-p/3922460#M24572</link>
      <description>&lt;P&gt;If Packet-Tracer is showing allowed so&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;As earlier mentioned ARP cache may be an issue hence clear ARP cache in adjacent devices.&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;You should also check the NAT sequence as well by running "sh nat" command.&lt;/LI&gt;&lt;LI&gt;Run logging on the ASA to see that you are receiving request on the ASA for particular Server. and if that is successful,&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;You can also check at the server as well that it is receiving request or not.&amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2019 12:40:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-x-blocking-all-inward-access/m-p/3922460#M24572</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-09-11T12:40:51Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5516-X blocking all inward access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-x-blocking-all-inward-access/m-p/3922463#M24574</link>
      <description>&lt;P&gt;Yes it was the matter of switching the old ASA off and put in the inside and outside cables in to the new one and switch it on. And boom no inwards access works. We have an ISP router at our premises to which the outside cable goes to but I don not have any admin acces to it. So do you think restarting it would clear the ARP cache and just make things work?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2019 12:43:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-x-blocking-all-inward-access/m-p/3922463#M24574</guid>
      <dc:creator>AirspanIT</dc:creator>
      <dc:date>2019-09-11T12:43:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5516-X blocking all inward access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-x-blocking-all-inward-access/m-p/3922466#M24577</link>
      <description>&lt;P&gt;Thanks. So the sequence of natting is&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;At top I have the no-nat configurations for VPN tunnels.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then there is the PAT for all Internet traffic.&lt;/P&gt;&lt;P&gt;then there is the server specifin NAT.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is how I had it configured previously as well.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Eg&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static subnet1 subnet1 destination static subnet2 subnet2 no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;object network EXG-SVR&lt;BR /&gt;nat (inside,outside) static 100.1.1.20&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need to schedule a downtime for restarting the ISP router to clear the ARP cache but just want to know if there is anything else that could be causing this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thansk a lot&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2019 12:48:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-x-blocking-all-inward-access/m-p/3922466#M24577</guid>
      <dc:creator>AirspanIT</dc:creator>
      <dc:date>2019-09-11T12:48:27Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5516-X blocking all inward access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-x-blocking-all-inward-access/m-p/3922471#M24578</link>
      <description>&lt;P&gt;You can also check that "sh nat" and "sh access-list" has any hit count or not.&lt;/P&gt;&lt;P&gt;Furthermore,&amp;nbsp;Have checked that the traffic is reaching to the ASA by looking at logs?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Even your server is receiving it and responding to it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would go like this,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Am I getting request for my server on the ASA?&lt;/P&gt;&lt;P&gt;Does it hit the right access list?&lt;/P&gt;&lt;P&gt;Does it hit the right NAT rule?&lt;/P&gt;&lt;P&gt;Does it forward it to the server?&lt;/P&gt;&lt;P&gt;Does my server receive the request?&lt;/P&gt;&lt;P&gt;Does my server respond to the request?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2019 12:55:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-x-blocking-all-inward-access/m-p/3922471#M24578</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-09-11T12:55:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5516-X blocking all inward access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-x-blocking-all-inward-access/m-p/3922477#M24581</link>
      <description>&lt;P&gt;Thanks. I will try these in the next scheduled downtime and update.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2019 13:05:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-x-blocking-all-inward-access/m-p/3922477#M24581</guid>
      <dc:creator>AirspanIT</dc:creator>
      <dc:date>2019-09-11T13:05:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5516-X blocking all inward access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-x-blocking-all-inward-access/m-p/3922489#M24584</link>
      <description>I'm wondering if you can amend the 5516 Outside Interface to the NAT'd address temporarily , e.g 100.1.1.15 (or whatever the actual static NAT address is) so it will then send a Gratuitous Arp for its Outside Interface. Then amend it back to normal Outside address 100.1.1.1 and upstream devices should have ARP entries for the Static NAT IP.&lt;BR /&gt;&lt;BR /&gt;You would need to do this while the 5510 is unplugged from Network so there is no conflict.&lt;BR /&gt;&lt;BR /&gt;The issue you have is the ASA won't GratArp for addresses used for static NAT.&lt;BR /&gt;&lt;BR /&gt;Just a thought and depends on how much disruption you are allowed to cause..</description>
      <pubDate>Wed, 11 Sep 2019 13:31:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-x-blocking-all-inward-access/m-p/3922489#M24584</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-09-11T13:31:03Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5516-X blocking all inward access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-x-blocking-all-inward-access/m-p/3922496#M24586</link>
      <description>&lt;P&gt;GRANT3779. Thanks a lot.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will add this to my list of things to try in the next scheduled downtime. Hopefully I can get it work this time after two failed downtime attempts where I was only focused on the ASA 5516-X's configuration.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2019 13:38:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-x-blocking-all-inward-access/m-p/3922496#M24586</guid>
      <dc:creator>AirspanIT</dc:creator>
      <dc:date>2019-09-11T13:38:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5516-X blocking all inward access</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-x-blocking-all-inward-access/m-p/3926476#M24589</link>
      <description>&lt;P&gt;As promised - updating on this issue. Yes it was indeed the ARP cache that needed clearing. I ended up power cycling the connecting switches and upstream ISP router and inward access and NAT started working. &lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;span class="lia-unicode-emoji" title=":beaming_face_with_smiling_eyes:"&gt;😁&lt;/span&gt;&lt;span class="lia-unicode-emoji" title=":winking_face_with_tongue:"&gt;😜&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks a lot GRANT3779 and bhargavdesai for your assistance.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Sep 2019 17:42:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-x-blocking-all-inward-access/m-p/3926476#M24589</guid>
      <dc:creator>AirspanIT</dc:creator>
      <dc:date>2019-09-18T17:42:33Z</dc:date>
    </item>
  </channel>
</rss>

