<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Packet Tracer (Implicit Deny) issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354126#M306654</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ASA(config)# sh route&lt;/P&gt;&lt;P&gt;Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - candidate default, U - per-user static route, o - ODR&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; P - periodic downloaded static route&lt;/P&gt;&lt;P&gt;Gateway of last resort is 75.132.0.1 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;D&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.250.0 255.255.255.248 [90/28416] via 10.250.0.2, 38:50:54, inside&lt;BR /&gt;D&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.250.100.128 255.255.255.128 [90/28416] via 10.250.0.6, 38:50:44, DMZ&lt;BR /&gt;D&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.250.100.0 255.255.255.128 [90/28416] via 10.250.0.2, 38:50:54, inside&lt;BR /&gt;D&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.250.1.1 255.255.255.255 [90/130816] via 10.250.0.6, 38:50:44, DMZ&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.250.0.0 255.255.255.252 is directly connected, inside&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.250.0.4 255.255.255.252 is directly connected, DMZ&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 75.132.0.0 255.255.192.0 is directly connected, outside&lt;BR /&gt;d*&amp;nbsp;&amp;nbsp; 0.0.0.0 0.0.0.0 [1/0] via 75.132.0.1, outside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 01 Jan 2014 16:03:14 GMT</pubDate>
    <dc:creator>Kemal Zuko</dc:creator>
    <dc:date>2014-01-01T16:03:14Z</dc:date>
    <item>
      <title>Packet Tracer (Implicit Deny) issue</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354105#M306632</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to do a simple packet tracer&amp;nbsp; on my ASA and this is what I am getting&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; packet-tracer input DMZ tcp 10.250.0.5 2234 10.250.0.6 22 xml&lt;/P&gt;&lt;P&gt;&amp;lt;Phase&amp;gt;&lt;BR /&gt;&amp;lt;id&amp;gt;1&amp;lt;/id&amp;gt;&lt;BR /&gt;&amp;lt;type&amp;gt;ROUTE-LOOKUP&amp;lt;/type&amp;gt;&lt;BR /&gt;&amp;lt;subtype&amp;gt;input&amp;lt;/subtype&amp;gt;&lt;BR /&gt;&amp;lt;result&amp;gt;ALLOW&amp;lt;/result&amp;gt;&lt;BR /&gt;&amp;lt;config&amp;gt;&lt;BR /&gt;&amp;lt;/config&amp;gt;&lt;BR /&gt;&amp;lt;extra&amp;gt;&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 10.250.0.4&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.252 DMZ&lt;BR /&gt;&amp;lt;/extra&amp;gt;&lt;BR /&gt;&amp;lt;/Phase&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;Phase&amp;gt;&lt;BR /&gt;&amp;lt;id&amp;gt;2&amp;lt;/id&amp;gt;&lt;BR /&gt;&amp;lt;type&amp;gt;ACCESS-LIST&amp;lt;/type&amp;gt;&lt;BR /&gt;&amp;lt;subtype&amp;gt;&amp;lt;/subtype&amp;gt;&lt;BR /&gt;&amp;lt;result&amp;gt;DROP&amp;lt;/result&amp;gt;&lt;BR /&gt;&amp;lt;config&amp;gt;&lt;BR /&gt;Implicit Rule&lt;BR /&gt;&amp;lt;/config&amp;gt;&lt;BR /&gt;&amp;lt;extra&amp;gt;&lt;BR /&gt;&amp;lt;/extra&amp;gt;&lt;BR /&gt;&amp;lt;/Phase&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;result&amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;lt;input-interface&amp;gt;DMZ&amp;lt;/input-interface&amp;gt;&lt;BR /&gt;&amp;lt;input-status&amp;gt;up&amp;lt;/input-status&amp;gt;&lt;BR /&gt;&amp;lt;input-line-status&amp;gt;up&amp;lt;/input-line-status&amp;gt;&lt;BR /&gt;&amp;lt;output-interface&amp;gt;DMZ&amp;lt;/output-interface&amp;gt;&lt;BR /&gt;&amp;lt;output-status&amp;gt;up&amp;lt;/output-status&amp;gt;&lt;BR /&gt;&amp;lt;output-line-status&amp;gt;up&amp;lt;/output-line-status&amp;gt;&lt;BR /&gt;&amp;lt;action&amp;gt;drop&amp;lt;/action&amp;gt;&lt;BR /&gt;&amp;lt;drop-reason&amp;gt;(acl-drop) Flow is denied by configured rule&amp;lt;/drop-reason&amp;gt;&lt;BR /&gt;&amp;lt;/result&amp;gt;&lt;BR /&gt;ASA# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The 10.250.0.6 deve is a router directly connected to the DMZ interface 10.250.0.5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However I am getting the reason for droped packet as (Implicit Rule) which I can see is only on the global interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am permiting ip any any on that same interface as well. &lt;/P&gt;&lt;P&gt;How can I make this work?&lt;/P&gt;&lt;P&gt;The reson for this is I need my ASA to authenticate with TACACS server which is behind the 10.250.0.6 router &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:22:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354105#M306632</guid>
      <dc:creator>Kemal Zuko</dc:creator>
      <dc:date>2019-03-12T03:22:16Z</dc:date>
    </item>
    <item>
      <title>Packet Tracer (Implicit Deny) issue</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354106#M306634</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kemal,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reading your post 2 things came in to my mind:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Why you use /30 mask on your firewall? With this mask you have only 2 &lt;SPAN style="font-size: 10pt;"&gt;useable &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;addresses. One you're going to use for the firewall interface IP, second one for the router.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;2. Packet tracer with specified same source and destination network will always fail even if you allow all the traffic and enable same security traffic. Devices communicating within the same subnet will not hit the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unless this is just a typo and &lt;SPAN style="font-size: 10pt;"&gt;you should just change the destination IP in the packet tracer? What is your TACACS IP ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mariusz&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Dec 2013 10:54:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354106#M306634</guid>
      <dc:creator>Mariusz Bochen</dc:creator>
      <dc:date>2013-12-27T10:54:52Z</dc:date>
    </item>
    <item>
      <title>Packet Tracer (Implicit Deny) issue</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354107#M306635</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; the reason I have a /30 between my ASA and my router is tat behind my router I have another IP scope for my LAN (10.250.100.128/25) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am douing dynamic pat on the asa and the router for the workstations to get out &lt;/P&gt;&lt;P&gt;the ip address of the tacacs server is 10.250.100.142 I am getting the same packet tracer resoult with the other IP as well&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Dec 2013 14:01:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354107#M306635</guid>
      <dc:creator>Kemal Zuko</dc:creator>
      <dc:date>2013-12-27T14:01:11Z</dc:date>
    </item>
    <item>
      <title>Packet Tracer (Implicit Deny) issue</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354108#M306636</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Would you be able to post the config fot us?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Dec 2013 15:35:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354108#M306636</guid>
      <dc:creator>Mariusz Bochen</dc:creator>
      <dc:date>2013-12-27T15:35:42Z</dc:date>
    </item>
    <item>
      <title>Packet Tracer (Implicit Deny) issue</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354109#M306637</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yes the config is below...&lt;/P&gt;&lt;P&gt;The tow router behing DMZ and INSIDE interfaces on the ASA are able to authenticate against the tacaacs server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 9.1(2) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ASA1&lt;/P&gt;&lt;P&gt;enable password Ev0iTru97MKu8IiT encrypted&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any4 any4&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any4 any6&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any6 any4&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any6 any6&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any4 any4 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any4 any6 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any6 any4 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any6 any6 eq domain&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.250.0.1 255.255.255.252 &lt;/P&gt;&lt;P&gt; authentication key eigrp 99 ********* key-id 99&lt;/P&gt;&lt;P&gt; authentication mode eigrp 99 md5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 75&lt;/P&gt;&lt;P&gt; ip address 10.250.0.5 255.255.255.252 &lt;/P&gt;&lt;P&gt; authentication key eigrp 99 ********* key-id 99&lt;/P&gt;&lt;P&gt; authentication mode eigrp 99 md5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/0&lt;/P&gt;&lt;P&gt; shutdown&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/1&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/3&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address dhcp setroute &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_2 tcp&lt;/P&gt;&lt;P&gt; port-object eq ssh&lt;/P&gt;&lt;P&gt; port-object eq telnet&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any4 any4 &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit tcp any4 any4 object-group DM_INLINE_TCP_2 &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit ip any4 any4 &lt;/P&gt;&lt;P&gt;access-list global_access extended permit ip any4 any4 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging buffered informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) source dynamic any interface&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic any interface&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group DMZ_access_in in interface DMZ&lt;/P&gt;&lt;P&gt;access-group global_access global&lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;router eigrp 99&lt;/P&gt;&lt;P&gt; no auto-summary&lt;/P&gt;&lt;P&gt; eigrp router-id 10.250.0.5&lt;/P&gt;&lt;P&gt; network 10.250.0.0 255.255.255.252&lt;/P&gt;&lt;P&gt; network 10.250.0.4 255.255.255.252&lt;/P&gt;&lt;P&gt; passive-interface default&lt;/P&gt;&lt;P&gt; no passive-interface inside&lt;/P&gt;&lt;P&gt; no passive-interface DMZ&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa-server BiHTac protocol tacacs+&lt;/P&gt;&lt;P&gt; accounting-mode simultaneous&lt;/P&gt;&lt;P&gt;aaa-server BiHTac (DMZ) host 10.250.100.142&amp;nbsp; &amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt; Tacacs Server &lt;/P&gt;&lt;P&gt; key ********&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication http console BiHTac LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console BiHTac LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication enable console BiHTac LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication serial console BiHTac LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication telnet console BiHTac LOCAL&lt;/P&gt;&lt;P&gt;aaa authorization command BiHTac LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.250.100.140 255.255.255.255 DMZ&amp;nbsp;&amp;nbsp; &amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt; This is my Domain Controler &lt;/P&gt;&lt;P&gt;http 10.250.0.6 255.255.255.255 DMZ&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association pmtu-aging infinite&lt;/P&gt;&lt;P&gt;crypto ca trustpool policy&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 10.250.100.140 255.255.255.255 DMZ&amp;nbsp; &amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt; This is my Domain Controler &lt;/P&gt;&lt;P&gt;ssh 10.250.0.6 255.255.255.255 DMZ&lt;/P&gt;&lt;P&gt;ssh timeout 20&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;username blah password SDFGHJOLKJFCVHJGK. encrypted privilege 15&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination address http &lt;/P&gt;&lt;P&gt;&lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination address email &lt;/P&gt;&lt;P&gt;&lt;A href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:1e3912f897a34d901d4e60d69e1a3e05&lt;/P&gt;&lt;P&gt;: end&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;ASA Version 9.1(2) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ASA1&lt;/P&gt;&lt;P&gt;enable password Ev0iTru97MKu8IiT encrypted&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any4 any4&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any4 any6&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any6 any4&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any6 any6&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any4 any4 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any4 any6 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any6 any4 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any6 any6 eq domain&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.250.0.1 255.255.255.252 &lt;/P&gt;&lt;P&gt; authentication key eigrp 99 ********* key-id 99&lt;/P&gt;&lt;P&gt; authentication mode eigrp 99 md5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 75&lt;/P&gt;&lt;P&gt; ip address 10.250.0.5 255.255.255.252 &lt;/P&gt;&lt;P&gt; authentication key eigrp 99 ********* key-id 99&lt;/P&gt;&lt;P&gt; authentication mode eigrp 99 md5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/0&lt;/P&gt;&lt;P&gt; shutdown&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/1&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/3&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address dhcp setroute &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_2 tcp&lt;/P&gt;&lt;P&gt; port-object eq ssh&lt;/P&gt;&lt;P&gt; port-object eq telnet&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any4 any4 &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit tcp any4 any4 object-group DM_INLINE_TCP_2 &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit ip any4 any4 &lt;/P&gt;&lt;P&gt;access-list global_access extended permit ip any4 any4 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging buffered informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) source dynamic any interface&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic any interface&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group DMZ_access_in in interface DMZ&lt;/P&gt;&lt;P&gt;access-group global_access global&lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;router eigrp 99&lt;/P&gt;&lt;P&gt; no auto-summary&lt;/P&gt;&lt;P&gt; eigrp router-id 10.250.0.5&lt;/P&gt;&lt;P&gt; network 10.250.0.0 255.255.255.252&lt;/P&gt;&lt;P&gt; network 10.250.0.4 255.255.255.252&lt;/P&gt;&lt;P&gt; passive-interface default&lt;/P&gt;&lt;P&gt; no passive-interface inside&lt;/P&gt;&lt;P&gt; no passive-interface DMZ&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa-server BiHTac protocol tacacs+&lt;/P&gt;&lt;P&gt; accounting-mode simultaneous&lt;/P&gt;&lt;P&gt;aaa-server BiHTac (DMZ) host 10.250.100.142&amp;nbsp; &amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt; Tacacs Server &lt;/P&gt;&lt;P&gt; key ********&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication http console BiHTac LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console BiHTac LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication enable console BiHTac LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication serial console BiHTac LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication telnet console BiHTac LOCAL&lt;/P&gt;&lt;P&gt;aaa authorization command BiHTac LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.250.100.140 255.255.255.255 DMZ&amp;nbsp;&amp;nbsp; &amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt; This is my Domain Controler &lt;/P&gt;&lt;P&gt;http 10.250.0.6 255.255.255.255 DMZ&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association pmtu-aging infinite&lt;/P&gt;&lt;P&gt;crypto ca trustpool policy&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 10.250.100.140 255.255.255.255 DMZ&amp;nbsp; &amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt; This is my Domain Controler &lt;/P&gt;&lt;P&gt;ssh 10.250.0.6 255.255.255.255 DMZ&lt;/P&gt;&lt;P&gt;ssh timeout 20&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;username blah password SDFGHJOLKJFCVHJGK. encrypted privilege 15&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination address email &lt;/P&gt;&lt;P&gt;&lt;A href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:1e3912f897a34d901d4e60d69e1a3e05&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any suggestions?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Dec 2013 04:04:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354109#M306637</guid>
      <dc:creator>Kemal Zuko</dc:creator>
      <dc:date>2013-12-31T04:04:52Z</dc:date>
    </item>
    <item>
      <title>Packet Tracer (Implicit Deny) issue</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354110#M306638</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kemal,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry, but I have few more questions &lt;SPAN __jive_emoticon_name="happy"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Can you see the 10.250.100.128/25 network in the routing table (learned by eigrp)?&lt;/P&gt;&lt;P&gt;Are you able to ping the 10.250.100.142 from the ASA's DMZ interface?&lt;/P&gt;&lt;P&gt;Can you please post the result of &lt;/P&gt;&lt;P&gt; packet-tracer input DMZ tcp 10.250.0.5 2234 10.250.100.142 22 ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mariusz&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Dec 2013 11:38:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354110#M306638</guid>
      <dc:creator>Mariusz Bochen</dc:creator>
      <dc:date>2013-12-31T11:38:49Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Tracer (Implicit Deny) issue</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354111#M306639</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mariusz,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can see the 10.250.100.128/25 network in my routing table via EIGRP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here are the resoults you have asked for&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# sh route&lt;/P&gt;&lt;P&gt;Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - candidate default, U - per-user static route, o - ODR&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; P - periodic downloaded static route&lt;/P&gt;&lt;P&gt;Gateway of last resort is 75.132.0.1 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;D&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.250.0 255.255.255.248 [90/28416] via 10.250.0.2, 12:02:04, inside&lt;BR /&gt;D&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.250.100.128 255.255.255.128 [90/28416] via 10.250.0.6, 12:01:54, DMZ&lt;BR /&gt;D&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.250.100.0 255.255.255.128 [90/28416] via 10.250.0.2, 12:02:04, inside&lt;BR /&gt;D&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.250.1.1 255.255.255.255 [90/130816] via 10.250.0.6, 12:01:54, DMZ&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.250.0.0 255.255.255.252 is directly connected, inside&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.250.0.4 255.255.255.252 is directly connected, DMZ&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 75.11.11.0 255.255.192.0 is directly connected, outside&lt;BR /&gt;d*&amp;nbsp;&amp;nbsp; 0.0.0.0 0.0.0.0 [1/0] via 75.11.11.1, outside&lt;BR /&gt;ASA#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;ASA# ping 10.250.100.142&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 10.250.100.142, timeout is 2 seconds:&lt;BR /&gt;?????&lt;BR /&gt;Success rate is 0 percent (0/5)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ASA# ping DMZ 10.250.100.142&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 10.250.100.142, timeout is 2 seconds:&lt;BR /&gt;?????&lt;BR /&gt;Success rate is 0 percent (0/5)&lt;BR /&gt;ASA# &lt;BR /&gt;ASA# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA#&amp;nbsp; traceroute 10.250.100.142&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;BR /&gt;Tracing the route to 10.250.100.142&lt;/P&gt;&lt;P&gt;1&amp;nbsp;&amp;nbsp; *&amp;nbsp; *&amp;nbsp; * &lt;BR /&gt;2&amp;nbsp;&amp;nbsp; *&amp;nbsp; *&amp;nbsp; * &lt;BR /&gt;3&amp;nbsp;&amp;nbsp; *&amp;nbsp; * &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# &lt;/P&gt;&lt;P&gt;ASA# packet-tracer input dmZ tcp 10.250.0.5 2234 10.250.100.142 22&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 10.250.100.128&amp;nbsp; 255.255.255.128 DMZ&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Result:&lt;BR /&gt;input-interface: DMZ&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: DMZ&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;ASA#&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I go to my ASDM and Under MOnitoring/Properties/AAA Servers I see the Tacacs Server configured but under status it says Failed. &lt;/P&gt;&lt;P&gt;here are some of the statistics of that screen&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;BiHTac&lt;/TD&gt;&lt;TD&gt;TACACS+&lt;/TD&gt;&lt;TD&gt;10.250.100.142&lt;/TD&gt;&lt;TD&gt;Failed&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Server port:&amp;nbsp; 49&lt;/P&gt;&lt;P&gt;Number of pending requests&amp;nbsp; 0&lt;/P&gt;&lt;P&gt;Average round trip time&amp;nbsp;&amp;nbsp; 0ms&lt;/P&gt;&lt;P&gt;Number of authentication requests 12&lt;/P&gt;&lt;P&gt;Number of authorization requests 19&lt;/P&gt;&lt;P&gt;Number of accounting requests&amp;nbsp; 0&lt;/P&gt;&lt;P&gt;Number of retransmissions&amp;nbsp; 0&lt;/P&gt;&lt;P&gt;Number of accepts&amp;nbsp;&amp;nbsp; 0&lt;/P&gt;&lt;P&gt;Number of rejects&amp;nbsp;&amp;nbsp; 0&lt;/P&gt;&lt;P&gt;Number of challenges&amp;nbsp;&amp;nbsp; 0&lt;/P&gt;&lt;P&gt;Number of malformed responses&amp;nbsp; 0&lt;/P&gt;&lt;P&gt;Number of bad authenticators&amp;nbsp; 0&lt;/P&gt;&lt;P&gt;Number of timeouts&amp;nbsp;&amp;nbsp; 31&lt;/P&gt;&lt;P&gt;Number of unrecognized responses 0&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also it would be worth mentioning that I can ping 10.250.0.5 (DMZ interface) of the ASA from the Tacacs Server &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;C:\Users\aaa&amp;gt;ping 10.250.0.5&lt;/P&gt;&lt;P&gt;Pinging 10.250.0.5 with 32 bytes of data:&lt;BR /&gt;Reply from 10.250.0.5: bytes=32 time=1ms TTL=254&lt;BR /&gt;Reply from 10.250.0.5: bytes=32 time=1ms TTL=254&lt;BR /&gt;Reply from 10.250.0.5: bytes=32 time=1ms TTL=254&lt;BR /&gt;Reply from 10.250.0.5: bytes=32 time=1ms TTL=254&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ping statistics for 10.250.0.5:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),&lt;BR /&gt;Approximate round trip times in milli-seconds:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Minimum = 1ms, Maximum = 1ms, Average = 1ms&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;C:\Users\aaa&amp;gt;tracert 10.250.0.5&lt;/P&gt;&lt;P&gt;Tracing route to 10.250.0.5 over a maximum of 30 hops&lt;/P&gt;&lt;P&gt;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp; 10.250.100.129&lt;BR /&gt;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp; 10.250.0.5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Trace complete.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Dec 2013 13:20:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354111#M306639</guid>
      <dc:creator>Kemal Zuko</dc:creator>
      <dc:date>2013-12-31T13:20:30Z</dc:date>
    </item>
    <item>
      <title>Packet Tracer (Implicit Deny) issue</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354112#M306640</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We can see that an ACL is dropping the traffic. Can you do another packet-tracer with detail?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; packet-tracer input DMZ udp 10.250.0.5 2234 10.250.100.142 49 detail&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Jan 2014 03:30:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354112#M306640</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2014-01-01T03:30:00Z</dc:date>
    </item>
    <item>
      <title>Packet Tracer (Implicit Deny) issue</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354113#M306641</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Sure.. It looks like that it gets dropped by the Implicit Deny rule under Global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# packet-tracer input DMZ udp 10.250.0.5 2234 10.250.100.142 49 detail&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x5774bbf0, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=39042567, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=DMZ, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 10.250.100.128&amp;nbsp; 255.255.255.128 DMZ&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Result: DROP&amp;nbsp; &lt;BR /&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Implicit Rule &lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x5775fdc0, priority=500, domain=permit, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1, user_data=0x6, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=10.250.0.5, mask=255.255.255.255, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=DMZ, output_ifc=any&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: DMZ&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: DMZ&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Jan 2014 04:20:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354113#M306641</guid>
      <dc:creator>Kemal Zuko</dc:creator>
      <dc:date>2014-01-01T04:20:17Z</dc:date>
    </item>
    <item>
      <title>Packet Tracer (Implicit Deny) issue</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354114#M306642</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What are you seeing in the logs on your TACACS server? Do you see authentication attempts fromthe ASA?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Jan 2014 04:37:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354114#M306642</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2014-01-01T04:37:06Z</dc:date>
    </item>
    <item>
      <title>Packet Tracer (Implicit Deny) issue</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354115#M306643</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; No I dont see any requests from the 10.250.0.5 (DMZ) to the TACACS Server &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here are the only two logs I see on my Tacacs &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;94&amp;gt; 2014-01-01 08:11:58 [10.250.100.129:36682] New client connection opened for 10.250.100.15:13334 TID:11&lt;/P&gt;&lt;P&gt;&amp;lt;94&amp;gt; 2014-01-01 08:18:46 [10.250.100.15:13334] New client connection opened for 10.250.100.15:59242 TID:12&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The 10.250.100.15 router is behind the 10.250.0.1 (inside interface) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a packet tracer for that interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# packet-tracer input inside udp 10.250.100.15 2234 10.250.100.142 49 de$&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 10.250.100.128&amp;nbsp; 255.255.255.128 DMZ&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-list inside_access_in extended permit ip any4 any4 &lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x5828c890, priority=13, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=27554, user_data=0x53100dc0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x56e6b410, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=13320, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x57717078, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=28028, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x56e6b410, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=13322, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x57751878, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=18130, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=DMZ, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 56599, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Result:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: DMZ&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And here is the traceroute from 10.250.100.15 to 10.250.100.142&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WLAN_AP&amp;gt;traceroute 10.250.100.142&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;BR /&gt;Tracing the route to 10.250.100.142&lt;/P&gt;&lt;P&gt;&amp;nbsp; 1 10.250.100.1 0 msec 0 msec 0 msec&lt;BR /&gt;&amp;nbsp; 2 10.250.0.6 0 msec 0 msec 0 msec&lt;BR /&gt;&amp;nbsp; 3 10.250.100.142 8 msec 0 msec 0 msec&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am puzzeld on how the above device can talk to the Tacacs Server but my ASA DMZ interface cant even Ping it. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Jan 2014 14:33:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354115#M306643</guid>
      <dc:creator>Kemal Zuko</dc:creator>
      <dc:date>2014-01-01T14:33:51Z</dc:date>
    </item>
    <item>
      <title>Packet Tracer (Implicit Deny) issue</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354116#M306644</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you try this-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remove-&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;aaa-server BiHTac (DMZ) host 10.250.100.142&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Add-&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;aaa-server BiHTac (inside) host 10.250.100.142 &lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;key ********&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Jan 2014 14:44:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354116#M306644</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2014-01-01T14:44:12Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Tracer (Implicit Deny) issue</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354117#M306645</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Negative &lt;/P&gt;&lt;P&gt;I now cant even log in using my local database &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server BiHTac protocol tacacs+&lt;/P&gt;&lt;P&gt;accounting-mode simultaneous&lt;/P&gt;&lt;P&gt;aaa-server BiHTac (inside) host 10.250.100.142&lt;/P&gt;&lt;P&gt;key *****&lt;/P&gt;&lt;P&gt;aaa authentication http console BiHTac LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console BiHTac LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication enable console BiHTac LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication serial console BiHTac LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication telnet console BiHTac LOCAL&lt;/P&gt;&lt;P&gt;aaa authorization command BiHTac LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.250.100.140 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;http 10.250.0.2 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssh 10.250.100.140 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;ssh 10.250.0.2 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;ssh timeout 20&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Jan 2014 15:07:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354117#M306645</guid>
      <dc:creator>Kemal Zuko</dc:creator>
      <dc:date>2014-01-01T15:07:11Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Tracer (Implicit Deny) issue</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354118#M306646</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When it was set to (DMZ) you were also using local creds to get in correct?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Jan 2014 15:12:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354118#M306646</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2014-01-01T15:12:02Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Tracer (Implicit Deny) issue</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354119#M306647</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;correct,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now I cant get in via ssh or http on inside interface &lt;/P&gt;&lt;P&gt;The only access I have is via console &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I removed the ssh and http configuration for DMZ &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Jan 2014 15:13:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354119#M306647</guid>
      <dc:creator>Kemal Zuko</dc:creator>
      <dc:date>2014-01-01T15:13:42Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Tracer (Implicit Deny) issue</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354120#M306648</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Go ahead and change it back to (DMZ). Can you enable debug for TACACS and post some of the debug?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Jan 2014 15:28:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354120#M306648</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2014-01-01T15:28:10Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Tracer (Implicit Deny) issue</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354121#M306649</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you mean to enable tacacs debug on the ASA?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Jan 2014 15:31:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354121#M306649</guid>
      <dc:creator>Kemal Zuko</dc:creator>
      <dc:date>2014-01-01T15:31:19Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Tracer (Implicit Deny) issue</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354122#M306650</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Yes, sorry.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Jan 2014 15:32:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354122#M306650</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2014-01-01T15:32:15Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Tracer (Implicit Deny) issue</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354123#M306651</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;here is what I see&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;%ASA-4-409023: Attempting AAA Fallback method LOCAL for Authentication request for user kzuko : Auth-server group BiHTac unreachable&lt;/P&gt;&lt;P&gt;%ASA-6-113015: AAA user authentication Rejected : reason = Invalid password : local database : user = kzuko&lt;/P&gt;&lt;P&gt;%ASA-6-611102: User authentication failed: Uname: kzuko&lt;/P&gt;&lt;P&gt;%ASA-6-611102: User authentication failed: Uname: kzuko&lt;/P&gt;&lt;P&gt;%ASA-6-315011: SSH session from 10.250.0.6 on interface DMZ for user "kzuko" disconnected by SSH server, reason: "Internal error" (0x00) &lt;/P&gt;&lt;P&gt;%ASA-6-302014: Teardown TCP connection 61690 for DMZ:10.250.0.6/54569 to identity:10.250.0.5/22 duration 0:00:07 bytes 1347 TCP FINs&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Jan 2014 15:45:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354123#M306651</guid>
      <dc:creator>Kemal Zuko</dc:creator>
      <dc:date>2014-01-01T15:45:02Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Tracer (Implicit Deny) issue</title>
      <link>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354124#M306652</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Sorry Wrong log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here is the debug&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;%ASA-6-302013: Built outbound TCP connection 61851 for inside:10.250.100.142/49 (10.250.100.142/49) to identity:10.250.0.1/31091 (10.250.0.1/31091)&lt;BR /&gt;%ASA-6-110003: Routing failed to locate next hop for TCP from identity:10.250.0.1/31091 to inside:10.250.100.142/49&lt;BR /&gt;mk_pkt - type: 0x2, session_id: 315&lt;BR /&gt;mkpkt - authorize user: bihadmin&lt;BR /&gt;cmd=no&lt;BR /&gt;cmd-arg=logging cmd-arg=console&amp;nbsp; Tacacs packet sent &lt;BR /&gt;%ASA-6-302014: Teardown TCP connection 61851 for inside:10.250.100.142/49 to identity:10.250.0.1/31091 duration 0:00:00 bytes 0 No valid adjacency&lt;BR /&gt;Sending TACACS Authorization message. Session id: 315, seq no:1 &lt;BR /&gt;%ASA-6-302013: Built outbound TCP connection 61852 for inside:10.250.100.142/49 (10.250.100.142/49) to identity:10.250.0.1/52801 (10.250.0.1/52801)&lt;BR /&gt;TACACS Request timed out &lt;BR /&gt;TACACS Session finished. Session id: 315, seq no: 1&lt;/P&gt;&lt;P&gt;mk_pkt - type: 0x2, session_id: 316&lt;BR /&gt;mkpkt - authorize user: bihadmin&lt;BR /&gt;cmd=no&lt;BR /&gt;%ASA-6-302014: Teardown TCP connection 61852 for inside:10.250.100.142/49 to identity:10.250.0.1/52801 duration 0:00:00 bytes 0 No valid adjacency&lt;BR /&gt;cmd-arg=logging cmd-arg=console&amp;nbsp; Tacacs packet sent &lt;BR /&gt;Sending TACACS Authorization message. Session id: 316, seq no:1 &lt;BR /&gt;%ASA-6-302013: Built outbound TCP connection 61853 for inside:10.250.100.142/49 (10.250.100.142/49) to identity:10.250.0.1/28448 (10.250.0.1/28448)&lt;BR /&gt;TACACS Request timed out &lt;BR /&gt;TACACS Session finished. Session id: 316, seq no: 1&lt;/P&gt;&lt;P&gt;mk_pkt - type: 0x2, session_id: 317&lt;BR /&gt;mkpkt - authorize user: bihadmin&lt;BR /&gt;cmd=no&lt;BR /&gt;cmd-arg=logging %ASA-6-302014: Teardown TCP connection 61853 for inside:10.250.100.142/49 to identity:10.250.0.1/28448 duration 0:00:00 bytes 0 No valid adjacency&lt;BR /&gt;cmd-arg=console&amp;nbsp; Tacacs packet sent &lt;BR /&gt;Sending TACACS Authorization message. Session id: 317, seq no:1 &lt;BR /&gt;%ASA-2-113022: AAA Marking TACACS+ server 10.250.100.142 in aaa-server group BiHTac as FAILED&lt;BR /&gt;BIHASA(config)# TACACS Request timed out &lt;BR /&gt;TACACS Session finished. Session id: 317, seq no: 1&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Jan 2014 15:48:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-tracer-implicit-deny-issue/m-p/2354124#M306652</guid>
      <dc:creator>Kemal Zuko</dc:creator>
      <dc:date>2014-01-01T15:48:03Z</dc:date>
    </item>
  </channel>
</rss>

