<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ASA 5505 Rule in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-rule/m-p/2357969#M308290</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeah, Jouni is right, &lt;SPAN style="font-size: 10pt;"&gt;it is up to you if you want to XXXX part of the IP addressing but &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;without detailed outputs we can´t give you an answer, please post the packet-tracer, &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Value our effort and rate the assistance!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 26 Nov 2013 14:11:17 GMT</pubDate>
    <dc:creator>jumora</dc:creator>
    <dc:date>2013-11-26T14:11:17Z</dc:date>
    <item>
      <title>Cisco ASA 5505 Rule</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-rule/m-p/2357963#M308284</link>
      <description>&lt;P&gt;I have an ASA 5505 router. I have configured most of the rules, but have had assistance from online forums and outside consultants&lt;/P&gt;&lt;P&gt;configuring some rules. There is one in my configuration that I do not understand, and I do not remember entering it myself. The rule is blocking traffic&lt;/P&gt;&lt;P&gt;when a server on the private side tries to send http traffic to itself. Not sure what the purpose of the rule is or why it is there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I click on rule 35, it highlights both 35 and 36.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#&amp;nbsp;&amp;nbsp; Type&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source destination service interface address service DNS Rewrite Max TCP&amp;nbsp;&amp;nbsp; Ebbronic Limit Max UDP... Randomize Seq #&lt;/P&gt;&lt;P&gt;--- -------&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -------&amp;nbsp;&amp;nbsp;&amp;nbsp; ------------&amp;nbsp;&amp;nbsp;&amp;nbsp; --------&amp;nbsp;&amp;nbsp; ---------&amp;nbsp;&amp;nbsp;&amp;nbsp; -------&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---------- -------------&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -------------&amp;nbsp; ------------------- ---------------- ----------------&lt;/P&gt;&lt;P&gt;35 Dynamic any&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;blank&amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;blank&amp;gt;&amp;nbsp; inside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside&amp;nbsp;&amp;nbsp; &amp;lt;blank&amp;gt; &amp;lt;blank&amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Unlimited Unlimited&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Unlimited &amp;lt;checked&amp;gt;&lt;/P&gt;&lt;P&gt;36 &amp;lt;blank&amp;gt; &amp;lt;blank&amp;gt; &amp;lt;blank&amp;gt;&amp;nbsp;&amp;nbsp; &amp;lt;blank&amp;gt;&amp;nbsp; outside&amp;nbsp;&amp;nbsp;&amp;nbsp; outside &amp;lt;blank&amp;gt; &amp;lt;blank&amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Unlimited Unlimited&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Unlimited &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am hesitant to delete the rule until I know the purpose.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure but the rule below may be what is generatig it (I am not familiar withg command line commands):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 209.34.249.193 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone tell me whay this is for, or what it is doing?&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:09:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-rule/m-p/2357963#M308284</guid>
      <dc:creator>davealessi</dc:creator>
      <dc:date>2019-03-12T03:09:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5505 Rule</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-rule/m-p/2357964#M308285</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;just to make sure, you may want to schedule a maintenance window if you want to make changes on your FW ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;refer to comments on the said 2 lines.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&amp;nbsp;&amp;nbsp; &amp;lt;&amp;lt;&amp;lt; ACL with name "outside_access_in" is applied "inbound" on the "outside" interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 209.34.249.193 1&amp;nbsp;&amp;nbsp; &amp;lt;&amp;lt;&amp;lt; static default route towards the "outside" interface hops to IP 209.34.249.193 with metric/AD of 1. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Nov 2013 05:54:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-rule/m-p/2357964#M308285</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2013-11-26T05:54:42Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5505 Rule</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-rule/m-p/2357965#M308286</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I do not understand your response.&amp;nbsp; Can you explain the effect of these rules?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Nov 2013 11:27:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-rule/m-p/2357965#M308286</guid>
      <dc:creator>davealessi</dc:creator>
      <dc:date>2013-11-26T11:27:34Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 Rule</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-rule/m-p/2357966#M308287</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically what John said above, the below configurations do the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group outside_access_in in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route outside 0.0.0.0 0.0.0.0 209.34.249.193 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group outside_access_in in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tells the ASA to use an &lt;STRONG&gt;"access-list"&lt;/STRONG&gt; named&lt;STRONG&gt; "outside_access_in"&lt;/STRONG&gt; in your interface named &lt;STRONG&gt;"outside"&lt;/STRONG&gt;. As you can see the the direction is mentioned as &lt;STRONG&gt;"in"&lt;/STRONG&gt; so it controls traffic INCOMING to the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface. So it controls traffic coming from the Internet towards your ASA (and past it to your internal network if you have configured Static NAT for some host)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There should be no need to touch this command!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route outside 0.0.0.0 0.0.0.0 209.34.249.193 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tells the ASA the default route for any network that is not in your local network. It tells the ASA to send traffic to any destination address that it doesnt have better information to the ISP gateway which is the last IP address mentioned in the command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There should be no need to touch this command!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, I am not sure what the original output refers to. It looks to me something that you have perhaps gotten from the ASDM GUI? The graphical interface used to manage the ASA? I don't personally use it myself so I would prefer to see the same on the CLI format&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They seem to be some configurations that utilize the interface IP addresses of &lt;STRONG&gt;"inside"&lt;/STRONG&gt; and &lt;STRONG&gt;"outside"&lt;/STRONG&gt; in the translations. The 35 seems to be some sort of Dynamic PAT probably. Not sure of the other one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could probably find the CLI format output with the commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run global&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run nat&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run static&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Nov 2013 11:47:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-rule/m-p/2357966#M308287</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-11-26T11:47:49Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 Rule</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-rule/m-p/2357967#M308288</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I used Packet Tracer (a GUI tool) to determine which NAT rule was blocking the traffic I am trying to allow.&amp;nbsp; It was rule 35 &amp;amp; 36 as shown in my original post.&amp;nbsp; I attempted to correlate the gui rule to the cli.&amp;nbsp; I don't know if i picked the correct cli rule or not.&amp;nbsp; That is why I showed both of them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since rule 35 is dynamic, I tried:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show run dynamic"&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set pfs group1&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This rule is part of the VPN setup I think, which would make sense because I had a consultant set it up for me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show run global"&lt;/P&gt;&lt;P&gt;global (inside) 1 interface&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;global (outside) 199 xxx.xxx.249.200&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 199 access-list Mail&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;Result of the command: "show run static"&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp xxx.xxx.235.13 ftp 192.168.1.20 ftp netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp xxx.xxx.249.200 smtp 192.168.1.119 smtp netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp xxx.xxx.249.196 www 192.168.1.100 www netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp xxx.xxx.249.197 www 192.168.1.101 www netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp xxx.xxx.249.198 www 192.168.1.102 www netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp xxx.xxx.249.199 www 192.168.1.103 www netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp xxx.xxx.235.1 https 192.168.1.109 https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp xxx.xxx.235.2 https 192.168.1.110 https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp xxx.xxx.235.3 https 192.168.1.111 https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp xxx.xxx.235.4 https 192.168.1.112 https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp xxx.xxx.235.5 https 192.168.1.113 https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp xxx.xxx.235.6 https 192.168.1.114 https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp xxx.xxx.235.7 https 192.168.1.115 https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp xxx.xxx.235.8 https 192.168.1.116 https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp xxx.xxx.235.9 https 192.168.1.117 https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp xxx.xxx.235.10 https 192.168.1.118 https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp xxx.xxx.235.11 https 192.168.1.119 https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp xxx.xxx.235.12 https 192.168.1.120 https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp xxx.xxx.235.13 https 192.168.1.121 https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp xxx.xxx.235.13 www 192.168.1.121 www netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp xxx.xxx.235.14 ftp 192.168.1.122 ftp netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp xxx.xxx.235.14 ftp-data 192.168.1.122 ftp-data netmask 255.255.255.255 &lt;BR /&gt;static (inside,inside) tcp xxx.xxx.235.6 1443 192.168.1.40 1443 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp xxx.xxx.235.5 1443 192.168.1.40 1443 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp xxx.xxx.249.197 1080 access-list Nat1 &lt;BR /&gt;static (inside,outside) tcp xxx.xxx.249.198 1080 access-list Nat2 &lt;BR /&gt;static (inside,outside) tcp xxx.xxx.249.198 2080 access-list Nat4 &lt;BR /&gt;static (inside,outside) tcp xxx.xxx.249.197 2080 access-list Nat3 &lt;BR /&gt;static (inside,outside) tcp xxx.xxx.249.199 1080 access-list Nat5 &lt;BR /&gt;static (inside,outside) tcp xxx.xxx.249.199 2080 access-list Nat6 &lt;BR /&gt;static (outside,inside) 192.168.1.50 xxx.xxx.249.200 netmask 255.255.255.255 &lt;BR /&gt;static (inside,inside) xxx.xxx.249.197 192.168.1.50 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 199 access-list Mail&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I included other cli but changes the ip addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to allow my server behind the firewall to send http traffic to itself.&amp;nbsp; Currently blocked by rule 35&amp;amp;36 in the gui.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Nov 2013 12:24:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-rule/m-p/2357967#M308288</guid>
      <dc:creator>davealessi</dc:creator>
      <dc:date>2013-11-26T12:24:06Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 Rule</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-rule/m-p/2357968#M308289</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why does the server need to connect to itself and why would that traffic go through the firewall when it connects to itself?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you mean that the server is actually connecting to the public IP address of the server while the server locally has a private IP address?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If that is the situation then we would need the output of the following &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside tcp &lt;SERVER local="" ip=""&gt; 12345 &lt;SERVER public="" ip=""&gt; &lt;DESTINATION port=""&gt;&lt;/DESTINATION&gt;&lt;/SERVER&gt;&lt;/SERVER&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the server needs to send traffic to the public IP address then you would need a NAT between &lt;STRONG&gt;"inside"&lt;/STRONG&gt; and &lt;STRONG&gt;"inside" &lt;/STRONG&gt;interface. You actually seem to have one such configuration at the end of the listing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,inside) &lt;PUBLIC ip=""&gt; &lt;LOCAL ip=""&gt; netmask 255.255.255.255&lt;/LOCAL&gt;&lt;/PUBLIC&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Nov 2013 13:10:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-rule/m-p/2357968#M308289</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-11-26T13:10:46Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 Rule</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-rule/m-p/2357969#M308290</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeah, Jouni is right, &lt;SPAN style="font-size: 10pt;"&gt;it is up to you if you want to XXXX part of the IP addressing but &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;without detailed outputs we can´t give you an answer, please post the packet-tracer, &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Value our effort and rate the assistance!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Nov 2013 14:11:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-rule/m-p/2357969#M308290</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-26T14:11:17Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 Rule</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-rule/m-p/2357970#M308291</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;BR /&gt; Also post the version that you are running on the ASA, if this is hair pining then we would suggest the commands that you need. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Value our effort and rate the assistance!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Nov 2013 14:13:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-rule/m-p/2357970#M308291</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-26T14:13:18Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 Rule</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-rule/m-p/2357971#M308292</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="margin: 0cm; margin-bottom: .0001pt;"&gt;From the post you have the next that helps with hair pining configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt; background-color: white; background-position: initial initial; background-repeat: initial initial;"&gt;global (inside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt; background-color: white; background-position: initial initial; background-repeat: initial initial;"&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;As Jouni said there are a couple of NAT commands that have the (inside,inside) defined that could be related to the destination IP that your local server needs to reach.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;I don´t see the next command on your post that needs to be added for traffic to be allowed to U turn.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;Value our effort and rate the assistance!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Nov 2013 14:18:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-rule/m-p/2357971#M308292</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-26T14:18:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5505 Rule</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-rule/m-p/2357972#M308293</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Both the ASDM Copy/paste the the current NAT configuration already tell us that its software level 8.2 or something below it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The command needed for U-turn traffic would be&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;same-security-traffic permit intra-interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current settings can be viewed with&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run same-security-traffic&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But as stated, there is not enough information for us to determine what the problem is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would need to know the source and destination IP address and services. The &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; would tell us all that information (or it could be mentioned separately) and the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; would also tell us where the traffic fails.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are a few configurations that point to a setup U-turn setup already but we can be sure when we dont know the IP addresses related to the connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Nov 2013 14:27:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-rule/m-p/2357972#M308293</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-11-26T14:27:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5505 Rule</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-rule/m-p/2357973#M308294</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I´m not sure how you determined that, static nat and pat configuration are the same from 7.0 to 8.2 and packet-tracer is allowed since 7.2, the reason that I ask is if he posts the version and the correct configuration and it does not work we can lookup bugs&lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Value our effort and rate the assistance!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Nov 2013 14:48:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-rule/m-p/2357973#M308294</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-26T14:48:50Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 Rule</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-rule/m-p/2357974#M308295</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry Jouni, it seems that I don´t know how to read, you indicated 8.2 or under so I said the same thing thinking that you where indicating that it was running 8.2, but yeah, I asked the code just in case we need to lookup bugs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorryyyyyyyyyyyyyyy&lt;SPAN __jive_emoticon_name="cry" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Nov 2013 05:05:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-rule/m-p/2357974#M308295</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-27T05:05:31Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 Rule</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-rule/m-p/2357975#M308296</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The server is sending an http request to the public facing url, which gets dns resolved to an outside address that gets nat'ed to this server.&amp;nbsp; If I put 192.168.1.40 =&amp;gt; 192.168.1.40 in the packet tracer, it fails on rule 35/36.&amp;nbsp; If I put 192.168.1.40 =&amp;gt; &lt;PUBLICIP&gt; it works in the packet tracer.&amp;nbsp; It doesn't however work.&amp;nbsp; If I go to my browser (on the target server) and try and hit the web site it doesn't pass.&lt;/PUBLICIP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sounds like a "u-turn" rule is needed in the router.&amp;nbsp; Is this possible?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another consideration here is that I must hit the pulic url, not the ip.&amp;nbsp; For example, this server hosts many web sites, and uses host header to resolve which site is being accessed. For example, site1.myserver.com, and site2.myserver.com.&amp;nbsp; Both on same IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to configure a rule to do the u-turn?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Nov 2013 11:36:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-rule/m-p/2357975#M308296</guid>
      <dc:creator>davealessi</dc:creator>
      <dc:date>2013-11-27T11:36:18Z</dc:date>
    </item>
  </channel>
</rss>

