<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Can you ping the Server from in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5512-does-no-packet-capture-on-an-inside-vlan-interface/m-p/2467707#M267967</link>
    <description>&lt;P&gt;Can you ping the Server from the ASA?&lt;/P&gt;&lt;P&gt;Why are u running TCP state bypass?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can u provide show run?&lt;/P&gt;</description>
    <pubDate>Mon, 31 Mar 2014 01:33:58 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2014-03-31T01:33:58Z</dc:date>
    <item>
      <title>ASA 5512 Does no Packet Capture on an Inside VLAN interface definitely mean the packet has not gone?</title>
      <link>https://community.cisco.com/t5/network-security/asa-5512-does-no-packet-capture-on-an-inside-vlan-interface/m-p/2467706#M267966</link>
      <description>&lt;P&gt;LAN traffic is going through the ASA5512 fine, onto a single switch and then to servers.&lt;/P&gt;&lt;P&gt;We are trying to NAT some internet IPs to VLANs, and the connections are timing out. The connection is built as below but the only packets captured on the vlan-100 interface are from the Packet Tracer (which states packet allowed).&lt;/P&gt;&lt;P&gt;Built TCP state-bypass connection 7121 from outside:x.x.x.x/56120 (x.x.x.x/56120) to vlan-100:172.16.100.10/3389 (5.x.x.166 /3389)&lt;/P&gt;&lt;P&gt;We are unsure if the problem is with the ASA or the Switch (a Cisco SG300-20, at L2 just mapping the VLAN to specific ports). The VLAN is up on the switch, but I have not yet figured out a way to verify if the traffic is getting there.&lt;/P&gt;&lt;P&gt;I can find no relevant asp drops fpr the VLAN connection on the ASA, so I was wondering whether there were any circumstances where the traffic could be going from the ASA to the switch, but not showing on a packet capture?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:00:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5512-does-no-packet-capture-on-an-inside-vlan-interface/m-p/2467706#M267966</guid>
      <dc:creator>ian_frank1</dc:creator>
      <dc:date>2019-03-12T04:00:38Z</dc:date>
    </item>
    <item>
      <title>Can you ping the Server from</title>
      <link>https://community.cisco.com/t5/network-security/asa-5512-does-no-packet-capture-on-an-inside-vlan-interface/m-p/2467707#M267967</link>
      <description>&lt;P&gt;Can you ping the Server from the ASA?&lt;/P&gt;&lt;P&gt;Why are u running TCP state bypass?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can u provide show run?&lt;/P&gt;</description>
      <pubDate>Mon, 31 Mar 2014 01:33:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5512-does-no-packet-capture-on-an-inside-vlan-interface/m-p/2467707#M267967</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2014-03-31T01:33:58Z</dc:date>
    </item>
    <item>
      <title>Thanks for your response.No,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5512-does-no-packet-capture-on-an-inside-vlan-interface/m-p/2467708#M267968</link>
      <description>&lt;P&gt;Thanks for your response.&lt;/P&gt;&lt;P&gt;No, I can't ping the server from the ASA, though I can ping the vlan-100 interface.&lt;/P&gt;&lt;P&gt;We are running TCP State Bypass as there will ultimately two ASAs from two separate internet feeds in a datacentre and we think response traffic could come via either ASA (Servers will be connected to both via separate switches).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;show run below (complete but a bit anonymised).. I tried making the 5-Internet interface a VLAN, but I had the same problem with that (i.e could not get through, with no packet capture traffic on the VLAN interface). 5-Internet is working fine as a physical interface going through the same switch.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.1(1)&lt;BR /&gt;!&lt;BR /&gt;hostname xxx-xxx-00004&lt;BR /&gt;enable password e3TOrE7HjNBQm75. encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;nameif 5-Internet&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 5.x.x.161 255.255.255.240&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0.100&lt;BR /&gt;&amp;nbsp;vlan 100&lt;BR /&gt;&amp;nbsp;nameif vlan-100&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 172.16.100.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 213.x.x.220 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.5.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network 5-Subnet&lt;BR /&gt;&amp;nbsp;subnet 5.x.x.160 255.255.255.240&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network 5-subnet&lt;BR /&gt;object network 213-DefaultGateway&lt;BR /&gt;&amp;nbsp;host 213.x.x.217&lt;BR /&gt;object service mcgsql&lt;BR /&gt;&amp;nbsp;service tcp source eq 1167 destination eq 1167&lt;BR /&gt;object service drac-console&lt;BR /&gt;&amp;nbsp;service tcp destination eq 5900&lt;BR /&gt;object network 172-16-100-10-host&lt;BR /&gt;&amp;nbsp;host 172.16.100.10&lt;BR /&gt;object network 172-16-100-Subnet&lt;BR /&gt;&amp;nbsp;subnet 172.16.100.0 255.255.255.0&lt;BR /&gt;object network 5-102-189-166-host&lt;BR /&gt;&amp;nbsp;host 5.x.x.166&lt;BR /&gt;object network blocked-85-195-114-0-24&lt;BR /&gt;&amp;nbsp;subnet 85.195.114.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;description Lot of traffic 28/03/2014&lt;BR /&gt;object network blocked-85-195-109-0-24&lt;BR /&gt;&amp;nbsp;subnet 85.195.109.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;description Lot of traffic 28/03/2014&lt;BR /&gt;object network blocked-193-8-246-25&lt;BR /&gt;&amp;nbsp;host 193.8.246.25&lt;BR /&gt;&amp;nbsp;description Lot of traffic 28/03/2014&lt;BR /&gt;object network blocked-192-168-1-0-24&lt;BR /&gt;&amp;nbsp;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;description Traffic 28/03/2014&lt;BR /&gt;object network blocked-77-68-44-42&lt;BR /&gt;&amp;nbsp;host 77.68.44.42&lt;BR /&gt;&amp;nbsp;description Traffic to 3389 on 28/03/2014&lt;BR /&gt;object network blocked-98-158-100-0-24&lt;BR /&gt;&amp;nbsp;subnet 98.158.100.0 255.255.255.0&lt;BR /&gt;object network 213-133-135-221-host&lt;BR /&gt;&amp;nbsp;host 213.x.x.221&lt;BR /&gt;object-group service rdp tcp&lt;BR /&gt;&amp;nbsp;description Remote Desktop&lt;BR /&gt;&amp;nbsp;port-object eq 3389&lt;BR /&gt;object-group network blocked&lt;BR /&gt;&amp;nbsp;description Blocked IP Addresses&lt;BR /&gt;&amp;nbsp;network-object object blocked-85-195-109-0-24&lt;BR /&gt;&amp;nbsp;network-object object blocked-193-8-246-25&lt;BR /&gt;&amp;nbsp;network-object object blocked-192-168-1-0-24&lt;BR /&gt;&amp;nbsp;network-object object blocked-77-68-44-42&lt;BR /&gt;&amp;nbsp;network-object object blocked-85-195-114-0-24&lt;BR /&gt;&amp;nbsp;network-object object blocked-98-158-100-0-24&lt;BR /&gt;access-list ACCESS-IN extended permit ip any any&lt;BR /&gt;access-list ACCESS-5 extended deny ip object-group blocked any4 log disable&lt;BR /&gt;access-list ACCESS-5 extended permit tcp any4 5.x.x.160 255.255.255.240 eq https&lt;BR /&gt;access-list ACCESS-5 extended permit tcp any4 5.x.x.160 255.255.255.240 eq www&lt;BR /&gt;access-list ACCESS-5 extended permit tcp any4 5.x.x.160 255.255.255.240 eq ftp&lt;BR /&gt;access-list ACCESS-5 extended permit tcp any4 5.x.x.160 255.255.255.240 object-group rdp&lt;BR /&gt;access-list ACCESS-5 extended permit object drac-console any4 5.x.x.160 255.255.255.240&lt;BR /&gt;access-list ACCESS-5 extended deny icmp any4 5.x.x.160 255.255.255.240 echo-reply&lt;BR /&gt;access-list ACCESS-5 extended deny icmp any4 5.x.x.160 255.255.255.240 source-quench&lt;BR /&gt;access-list ACCESS-5 extended deny icmp any4 5.x.x.160 255.255.255.240 unreachable&lt;BR /&gt;access-list ACCESS-5 extended deny icmp any4 5.x.x.160 255.255.255.240 time-exceeded&lt;BR /&gt;access-list ACCESS-5 extended permit tcp any4 172.16.100.0 255.255.255.0 eq https&lt;BR /&gt;access-list ACCESS-5 extended permit tcp any4 172.16.100.0 255.255.255.0 eq www&lt;BR /&gt;access-list ACCESS-5 extended permit tcp any4 172.16.100.0 255.255.255.0 eq ftp&lt;BR /&gt;access-list ACCESS-5 extended permit tcp any4 172.16.100.0 255.255.255.0 object-group rdp&lt;BR /&gt;access-list ACCESS-5 extended permit object drac-console any4 172.16.100.0 255.255.255.0&lt;BR /&gt;access-list ACCESS-5 extended permit ip 5.x.x.160 255.255.255.240 any4&lt;BR /&gt;access-list ACCESS-5 extended permit ip 172.16.100.0 255.255.255.0 any4&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging ftp-bufferwrap&lt;BR /&gt;logging ftp-server 213.x.x.222 / gds-00004 *****&lt;BR /&gt;mtu 5-Internet 1500&lt;BR /&gt;mtu vlan-100 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-711.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network 172-16-100-10-host&lt;BR /&gt;&amp;nbsp;nat (vlan-100,outside) static 5-102-189-166-host&lt;BR /&gt;!&lt;BR /&gt;nat (outside,5-Internet) after-auto source static any any destination static 5-Subnet 5-Subnet no-proxy-arp&lt;BR /&gt;access-group ACCESS-5 in interface 5-Internet&lt;BR /&gt;access-group ACCESS-5 in interface vlan-100&lt;BR /&gt;access-group ACCESS-5 in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 213.x.x.217 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.5.0 255.255.255.0 management&lt;BR /&gt;http 213.x.x.180 255.255.255.255 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;sysopt noproxyarp 5-Internet&lt;BR /&gt;sysopt noproxyarp vlan-100&lt;BR /&gt;sysopt noproxyarp outside&lt;BR /&gt;sysopt noproxyarp management&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 213.x.x.180 255.255.255.255 outside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.5.2-192.168.5.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 129.6.15.29 source outside prefer&lt;BR /&gt;webvpn&lt;BR /&gt;&amp;nbsp;anyconnect-essentials&lt;BR /&gt;username xxxxxxxxx password yQYwRFnycPq37kzA encrypted&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;class-map tcp_bypass&lt;BR /&gt;&amp;nbsp;match access-list ACCESS-5&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;policy-map 5-policy&lt;BR /&gt;&amp;nbsp;class tcp_bypass&lt;BR /&gt;&amp;nbsp; set connection timeout idle 0:15:00&lt;BR /&gt;&amp;nbsp; set connection advanced-options tcp-state-bypass&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;service-policy 5-policy interface 5-Internet&lt;BR /&gt;service-policy 5-policy interface vlan-100&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:69aa7a13a6048cccb567f65f0fc785f2&lt;BR /&gt;: end&lt;BR /&gt;asdm image disk0:/asdm-711.bin&lt;BR /&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 31 Mar 2014 09:20:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5512-does-no-packet-capture-on-an-inside-vlan-interface/m-p/2467708#M267968</guid>
      <dc:creator>ian_frank1</dc:creator>
      <dc:date>2014-03-31T09:20:37Z</dc:date>
    </item>
    <item>
      <title>object network 172-16-100-10</title>
      <link>https://community.cisco.com/t5/network-security/asa-5512-does-no-packet-capture-on-an-inside-vlan-interface/m-p/2467709#M267969</link>
      <description>&lt;P&gt;object network 172-16-100-10-host&lt;BR /&gt;&amp;nbsp;nat (vlan-100,&lt;SPAN style="color:#FF0000;"&gt;outside&lt;/SPAN&gt;) static 5-102-189-166-host&lt;/P&gt;</description>
      <pubDate>Wed, 02 Apr 2014 09:45:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5512-does-no-packet-capture-on-an-inside-vlan-interface/m-p/2467709#M267969</guid>
      <dc:creator>JY109</dc:creator>
      <dc:date>2014-04-02T09:45:51Z</dc:date>
    </item>
    <item>
      <title>The nat to the outside</title>
      <link>https://community.cisco.com/t5/network-security/asa-5512-does-no-packet-capture-on-an-inside-vlan-interface/m-p/2467710#M267970</link>
      <description>&lt;P&gt;The nat to the outside interface is correct. We want to use some 5.x.x.x addresses directly, in which case 5-Internet is used, but when the VLAN is in use, we want to NAT the 5.x.x.x address directly to the 172.16.100.x address, which it seems to be doing, except the traffic is never getting there.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Apr 2014 15:31:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5512-does-no-packet-capture-on-an-inside-vlan-interface/m-p/2467710#M267970</guid>
      <dc:creator>ian_frank1</dc:creator>
      <dc:date>2014-04-03T15:31:49Z</dc:date>
    </item>
    <item>
      <title>I figured this out in the end</title>
      <link>https://community.cisco.com/t5/network-security/asa-5512-does-no-packet-capture-on-an-inside-vlan-interface/m-p/2467711#M267971</link>
      <description>&lt;P&gt;I figured this out in the end. The ASA was OK, it was the switch that was wrong. I had not included the port that the ASA was connected to in VLAN 100.&lt;/P&gt;&lt;P&gt;Therefore the traffic was presumably leaving the ASA, but then was getting bounced by the switch.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Apr 2014 16:47:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5512-does-no-packet-capture-on-an-inside-vlan-interface/m-p/2467711#M267971</guid>
      <dc:creator>ian_frank1</dc:creator>
      <dc:date>2014-04-03T16:47:04Z</dc:date>
    </item>
  </channel>
</rss>

