<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5505 Blocking Return Traffic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-blocking-return-traffic/m-p/3929508#M31041</link>
    <description>&lt;P&gt;Thank you for the heads up, I forgot to copy that part into the post. I did have those ports open and forwarded to the phone system. However, the exigent link you included had a small bit of information that I had not seen as of yet. It was the default sip inspection that was killing the traffic. Once that was disabled, the traffic became what was expected. So the real resolution was:&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;no inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the heads up! ! !&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 24 Sep 2019 15:37:44 GMT</pubDate>
    <dc:creator>deca24</dc:creator>
    <dc:date>2019-09-24T15:37:44Z</dc:date>
    <item>
      <title>ASA 5505 Blocking Return Traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-blocking-return-traffic/m-p/3928946#M31039</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am having a bit of an issue here. I am also basically a beginner at working on enterprise level firewalls. I am trying to get a VOIP phone system working with one of the systems features that allow mobile phones to connect and make and receive calls. I have included all the access ports in an ACL that allow and forward to the VOIP server.&lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended permit udp any4 object Allworx eq 2088&lt;BR /&gt;access-list Outside_access_in extended permit object-group TCPUDP any4 object Allworx eq sip&lt;BR /&gt;access-list Outside_access_in extended permit udp any object Allworx range 15000 15511&lt;BR /&gt;access-list Outside_access_in extended permit tcp any object Allworx eq 8081&lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended permit tcp any4 object Allworx eq sip&lt;BR /&gt;access-list Outside_access_in extended permit udp any4 object Allworx eq sip&lt;BR /&gt;access-list Outside_access_in extended permit udp any object Allworx range 16384 32767&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have also created the NAT translations:&lt;/P&gt;&lt;P&gt;object network Allworx&lt;BR /&gt;nat (inside,outside) static interface service udp sip sip&lt;/P&gt;&lt;P&gt;object network Allworx2&lt;BR /&gt;nat (inside,outside) static interface service tcp 8081 8081&lt;BR /&gt;object network Allworx3&lt;BR /&gt;nat (inside,outside) static interface service tcp sip sip&lt;BR /&gt;object network Allworx4&lt;BR /&gt;nat (inside,outside) static interface service udp 2088 2088&lt;/P&gt;&lt;P&gt;object service Allworx-V-Ports&lt;BR /&gt;service tcp destination range 15000 15511&lt;BR /&gt;object service Allworx-V-Ports2&lt;BR /&gt;service tcp destination range 16384 32767&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am not sure why, but the return traffic seems to be stopped by this rule:&lt;/P&gt;&lt;P&gt;nat (inside,outside) after-auto source dynamic any interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It seems to work except for the voice ports. The ASA is blocking the return voice traffic on ports 16384-32767 for sure.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One thing I am curious about is if I remove the line 'nat (inside,outside) after-auto source dynamic any interface', how does that impact the rest of the network?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hopefully someone can help me with this issue and help me understand what I am doing wrong.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you in advance! !&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2019 20:44:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-blocking-return-traffic/m-p/3928946#M31039</guid>
      <dc:creator>deca24</dc:creator>
      <dc:date>2019-09-23T20:44:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Blocking Return Traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-blocking-return-traffic/m-p/3929103#M31040</link>
      <description>&lt;P&gt;I am not expert with VOIP. But i saw that your configuration does not have PAT (range 15000 15511 and range 16384 32767) statement for all the ports configured in ACL Outside_access_in&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would request you first look at the below links to configure PAT for necessary ports (Which I am not sure beyond SIP)&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.petenetlive.com/KB/Article/0001111" target="_blank"&gt;https://www.petenetlive.com/KB/Article/0001111&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.exigent.net/blog/troubleshooting/how-to-configure-a-cisco-asa-5505-for-voip/" target="_blank"&gt;https://www.exigent.net/blog/troubleshooting/how-to-configure-a-cisco-asa-5505-for-voip/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can also do a Static NAT IP to IP and then control ports through access list in Outside_access_in.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;### RATE ALL HELPFUL RESPONSES ###&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2019 05:33:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-blocking-return-traffic/m-p/3929103#M31040</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-09-24T05:33:07Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Blocking Return Traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-blocking-return-traffic/m-p/3929508#M31041</link>
      <description>&lt;P&gt;Thank you for the heads up, I forgot to copy that part into the post. I did have those ports open and forwarded to the phone system. However, the exigent link you included had a small bit of information that I had not seen as of yet. It was the default sip inspection that was killing the traffic. Once that was disabled, the traffic became what was expected. So the real resolution was:&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;no inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the heads up! ! !&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2019 15:37:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-blocking-return-traffic/m-p/3929508#M31041</guid>
      <dc:creator>deca24</dc:creator>
      <dc:date>2019-09-24T15:37:44Z</dc:date>
    </item>
  </channel>
</rss>

