<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA ACL issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-acl-issue/m-p/2459096#M267332</link>
    <description>&lt;P&gt;Good morning - I have a strange issue, and I know it's something simple. I have an ASA running 8.6(1)2 that has a vpn tunnel established to our MPLS provider. &amp;nbsp;I have 3 inside interfaces configured:&amp;nbsp;&lt;/P&gt;&lt;P&gt;Inside - 10.1.1.0/24, Inside-2 - 10.1.2.0/24, and Inside-3 - 10.1.3.0/24. &amp;nbsp;Each interface is plugged into a Cisco 2960 switch port. The Inside subnet talks to our remote networks as intended, ACL's, NAT - everything is configured properly and talks across the MPLS network happily.&lt;/P&gt;&lt;P&gt;Inside-2 and Inside-3 subnets do not talk, so I performed a packet-trace from the CLI from both the Inside and Inside-2 subnets to stare and compare; below are the results:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Working subnet&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;MyFirewall(config)# packet-tracer input inside icmp 10.1.1.1 1 1 172.16.1.1&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; outside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-list inside_access_in extended permit ip any any&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) source static Inside-Network Inside-Network destination static DM_INLINE_NETWORK_1 DM_INLINE_NETWORK_1 no-proxy-arp route-lookup&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 10.1.1.1/0 to 110.1.1.1/0&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: encrypt&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 13213742, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;B&gt;Non-working subnet&lt;/B&gt;&lt;/P&gt;&lt;P&gt;MyFirewall(config)# packet-tracer input inside-2 icmp 10.1.2.1 1 1 172.16.1.1&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; outside&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside-2_access_in in interface inside-2&lt;BR /&gt;access-list inside-2_access_in extended permit ip any any&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside-2,outside) source static Inside-Network2 Inside-Network2 destination static DM_INLINE_NETWORK_4 DM_INLINE_NETWORK_4&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 10.1.2.1/0 to 10.1.2.1/0&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: encrypt&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside-2&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;------------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;Here are the acl's:&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended deny ip any any&amp;nbsp;&lt;BR /&gt;access-list global_access extended permit object-group DM_INLINE_SERVICE_4 any any&amp;nbsp;&lt;BR /&gt;access-list outside_cryptomap_1 extended permit ip object-group DM_INLINE_NETWORK_3 object-group DM_INLINE_NETWORK_2&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended deny tcp any any range 1024 65535&amp;nbsp;&lt;BR /&gt;access-list inside-2_access_in extended permit ip any any&amp;nbsp;&lt;BR /&gt;access-list inside-2_access_in extended permit icmp any any&amp;nbsp;&lt;BR /&gt;access-list inside-2_access_in extended deny ip any any inactive&amp;nbsp;&lt;BR /&gt;access-list outside_cryptomap_2 extended permit ip 10.1.2.0 255.255.255.0 object-group DM_INLINE_NETWORK_6&amp;nbsp;&lt;BR /&gt;access-list inside-3_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;-------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;Am I missing something here? I'm certain there is a better way to configure this, but I can't take the network down to reconfigure anything....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 04:07:01 GMT</pubDate>
    <dc:creator>Joel Fox</dc:creator>
    <dc:date>2019-03-12T04:07:01Z</dc:date>
    <item>
      <title>ASA ACL issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-issue/m-p/2459096#M267332</link>
      <description>&lt;P&gt;Good morning - I have a strange issue, and I know it's something simple. I have an ASA running 8.6(1)2 that has a vpn tunnel established to our MPLS provider. &amp;nbsp;I have 3 inside interfaces configured:&amp;nbsp;&lt;/P&gt;&lt;P&gt;Inside - 10.1.1.0/24, Inside-2 - 10.1.2.0/24, and Inside-3 - 10.1.3.0/24. &amp;nbsp;Each interface is plugged into a Cisco 2960 switch port. The Inside subnet talks to our remote networks as intended, ACL's, NAT - everything is configured properly and talks across the MPLS network happily.&lt;/P&gt;&lt;P&gt;Inside-2 and Inside-3 subnets do not talk, so I performed a packet-trace from the CLI from both the Inside and Inside-2 subnets to stare and compare; below are the results:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Working subnet&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;MyFirewall(config)# packet-tracer input inside icmp 10.1.1.1 1 1 172.16.1.1&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; outside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-list inside_access_in extended permit ip any any&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) source static Inside-Network Inside-Network destination static DM_INLINE_NETWORK_1 DM_INLINE_NETWORK_1 no-proxy-arp route-lookup&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 10.1.1.1/0 to 110.1.1.1/0&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: encrypt&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 13213742, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;B&gt;Non-working subnet&lt;/B&gt;&lt;/P&gt;&lt;P&gt;MyFirewall(config)# packet-tracer input inside-2 icmp 10.1.2.1 1 1 172.16.1.1&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; outside&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside-2_access_in in interface inside-2&lt;BR /&gt;access-list inside-2_access_in extended permit ip any any&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside-2,outside) source static Inside-Network2 Inside-Network2 destination static DM_INLINE_NETWORK_4 DM_INLINE_NETWORK_4&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 10.1.2.1/0 to 10.1.2.1/0&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: encrypt&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside-2&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;------------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;Here are the acl's:&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended deny ip any any&amp;nbsp;&lt;BR /&gt;access-list global_access extended permit object-group DM_INLINE_SERVICE_4 any any&amp;nbsp;&lt;BR /&gt;access-list outside_cryptomap_1 extended permit ip object-group DM_INLINE_NETWORK_3 object-group DM_INLINE_NETWORK_2&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended deny tcp any any range 1024 65535&amp;nbsp;&lt;BR /&gt;access-list inside-2_access_in extended permit ip any any&amp;nbsp;&lt;BR /&gt;access-list inside-2_access_in extended permit icmp any any&amp;nbsp;&lt;BR /&gt;access-list inside-2_access_in extended deny ip any any inactive&amp;nbsp;&lt;BR /&gt;access-list outside_cryptomap_2 extended permit ip 10.1.2.0 255.255.255.0 object-group DM_INLINE_NETWORK_6&amp;nbsp;&lt;BR /&gt;access-list inside-3_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;-------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;Am I missing something here? I'm certain there is a better way to configure this, but I can't take the network down to reconfigure anything....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:07:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-issue/m-p/2459096#M267332</guid>
      <dc:creator>Joel Fox</dc:creator>
      <dc:date>2019-03-12T04:07:01Z</dc:date>
    </item>
    <item>
      <title>Only one cryptomap can be</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-issue/m-p/2459097#M267333</link>
      <description>&lt;P&gt;Only one cryptomap can be active on a given site-site VPN. You appear to have outside_cryptomap_1 active and working.&lt;/P&gt;&lt;P&gt;Inside 2 would appear to use outside_cryptomap_2. Is it going to a different peer?&lt;/P&gt;</description>
      <pubDate>Thu, 24 Apr 2014 13:18:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-issue/m-p/2459097#M267333</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-04-24T13:18:45Z</dc:date>
    </item>
    <item>
      <title>It is not, I forgot to remove</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-issue/m-p/2459098#M267334</link>
      <description>&lt;P&gt;It is not, I forgot to remove that. However, after removing outside-cryptomap_2, I still get the same result with an acl causing the traffic to drop.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Apr 2014 13:43:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-issue/m-p/2459098#M267334</guid>
      <dc:creator>Joel Fox</dc:creator>
      <dc:date>2014-04-24T13:43:24Z</dc:date>
    </item>
    <item>
      <title>OK, so we need to know the</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-issue/m-p/2459099#M267335</link>
      <description>&lt;P&gt;OK, so we need to know the definitions of the&amp;nbsp;&lt;SPAN style="font-size: 14px;"&gt;DM_INLINE_NETWORK_3 and&amp;nbsp;DM_INLINE_NETWORK_2 objects you created with ASDM to verify that they have the necessary source and destination networks in them. If they are OK, we should next check the IPSec SAs in the active VPN (show cry ipsec sa) and look for the local and remote network pairs along with encaps and decaps of interesting traffic.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;I also notice that for the working network you are translating from 10.1.1.x to 110.1.1.x. Is this not necessary for your non-working connection from 10.1.2.x?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Apr 2014 13:57:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-issue/m-p/2459099#M267335</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-04-24T13:57:44Z</dc:date>
    </item>
    <item>
      <title>Ah, the translation was just</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-issue/m-p/2459100#M267336</link>
      <description>&lt;P&gt;Ah, the translation was just a typo on my part, I was just using a generic subnet in this example to protect the innocent :).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px"&gt;DM_INLINE_NETWORK_3 is an object group that represents the three local subnets protected via our vpn tunnel.&amp;nbsp; DM_INLINE_NETWORK_2 an object group consisting of the trusted subnets on the MPLS cloud.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Apr 2014 14:14:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-issue/m-p/2459100#M267336</guid>
      <dc:creator>Joel Fox</dc:creator>
      <dc:date>2014-04-24T14:14:43Z</dc:date>
    </item>
    <item>
      <title>OK - so  check the IPSec SAs</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-issue/m-p/2459101#M267337</link>
      <description>&lt;P&gt;OK - so&amp;nbsp;&lt;SPAN style="font-size: 14px;"&gt;&amp;nbsp;check the IPSec SAs in the active VPN (show cry ipsec sa) and look for the local and remote network pairs along with encaps and decaps of interesting traffic.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Apr 2014 19:06:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-issue/m-p/2459101#M267337</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-04-24T19:06:10Z</dc:date>
    </item>
    <item>
      <title>When I show the ipsec sa, it</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-issue/m-p/2459102#M267338</link>
      <description>&lt;P&gt;When I show the ipsec sa, it verifies that I am using access-list outside_cryptomap_1. This contains an object-group with 3 subnets; 10.1.1.0,10.1.2.0, and 10.1.3.0.&amp;nbsp; The interesting traffic also contains 3 subnets. However, below is what is listed:&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_1 extended permit ip 10.1.1.0 255.255.255.0 192.168.0.0 255.240.0.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; local ident (addr/mask/prot/port): (10.1.1.0/255.255.255.0/0/0)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; remote ident (addr/mask/prot/port): (192.168.0.0/255.240.0.0/0/0)&lt;/P&gt;&lt;P&gt;What I find interesting is it lists this 3 times, once for each subnet listed as interesting traffic.&amp;nbsp; According to this access-list, should I not see the the same thing for the other 2 local subnets? (10.1.2.0, 10.1.3.0)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Apr 2014 14:13:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-issue/m-p/2459102#M267338</guid>
      <dc:creator>Joel Fox</dc:creator>
      <dc:date>2014-04-25T14:13:29Z</dc:date>
    </item>
    <item>
      <title>I'd ask your provider to have</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-issue/m-p/2459103#M267339</link>
      <description>&lt;P&gt;I'd ask your provider to have &amp;nbsp;a close look at their end's cryptomap. If they don't have the second and third subnet included that could result in the observed behavior.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Apr 2014 14:39:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-issue/m-p/2459103#M267339</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-04-25T14:39:36Z</dc:date>
    </item>
    <item>
      <title>They match; when I do a</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-issue/m-p/2459104#M267340</link>
      <description>&lt;P&gt;They match; when I do a capture I can see incoming pings from my laptop ip, but no return ip. When I try to send a ping from the router sourcing that interface (10.1.2.254) it times out. I know traffic is getting there, but it isn't leaving for some reason.&amp;nbsp; On the router, they have a default route of 10.1.1.254, which is the inside interface of the firewall.&amp;nbsp; This has always been the same default route on the router, and at one time, with the configuration as it is now, I could ping that router interface 10.1.2.254 from my laptop.&amp;nbsp; Nothing has changed, at least on my end, so I'm really confused.&amp;nbsp; I would think that if it was something from the provider that I wouldn't see my ping request from a capture.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can't really blow the config away and reconfigure it since the network is in production unfortunately.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Apr 2014 15:15:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-issue/m-p/2459104#M267340</guid>
      <dc:creator>Joel Fox</dc:creator>
      <dc:date>2014-04-25T15:15:45Z</dc:date>
    </item>
  </channel>
</rss>

