<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Traceroute through ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/traceroute-through-asa/m-p/3827097#M31656</link>
    <description>&lt;P&gt;Hello RJI,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the headsup! Ahead of rule 10 there're only Allow rules; I moved it as rule no1&amp;amp;2 and I got the same output.&lt;/P&gt;&lt;P&gt;Review other causes:&lt;/P&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;SPAN&gt;1) ACL configured on an interface - ICMP permit on 1st position&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;SPAN&gt;2) ACL configured for AAA and AAA denied the user = no AAA policy&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;SPAN&gt;3) Thru-box traffic arriving at management-only ifc = not the case, traffic arrives on WAN interface&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;SPAN&gt;4) Unencrypted traffic arriving on a ipsec-enabled interface = no NAT or crypto policies are existing on this firewall; both are taken care upstream.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="pEx1_Example1"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;SPAN&gt;I will open a case to TAC next week and let you all know.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 27 Mar 2019 13:45:14 GMT</pubDate>
    <dc:creator>Florin Barhala</dc:creator>
    <dc:date>2019-03-27T13:45:14Z</dc:date>
    <item>
      <title>Traceroute through ASA</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-through-asa/m-p/3821835#M31637</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have this "common scenario" where ASA drops &lt;STRONG&gt;traceroute&lt;/STRONG&gt; traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;C:\Windows\system32&amp;gt;tracert -d 10.22.10.63&lt;/P&gt;
&lt;P&gt;Tracing route to 10.22.10.63 over a maximum of 30 hops&lt;/P&gt;
&lt;P&gt;1 &amp;lt;1 ms &amp;lt;1 ms &amp;lt;1 ms 10.22.20.254&lt;BR /&gt;2 2 ms 2 ms 2 ms 10.22.25.4&lt;BR /&gt;3 * * * Request timed out.&lt;BR /&gt;4 1 ms 1 ms 1 ms 10.22.10.63&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Obviously the * is on outside ASA interface. Here's the related config:&lt;/P&gt;
&lt;P&gt;1. Capture on ASA for dropped traffic&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;capture cap4 type asp-drop acl-drop [Capturing - 774 bytes] &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;match icmp any any&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;4: 10:37:09.632840 10.22.1.62 &amp;gt; 10.22.20.1: icmp: time exceeded in-transit Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;5: 10:37:13.346493 10.22.1.62 &amp;gt; 10.22.20.1: icmp: time exceeded in-transit Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;6: 10:37:17.346966 10.22.1.62 &amp;gt; 10.22.20.1: icmp: time exceeded in-transit Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. Interface config and acl-applied&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;show ip | i 10.22.1.62&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Port-channel1.90 outside 10.22.1.62 255.255.255.240 CONFIG&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;access-group outside_in in interface outside&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3. ACL config&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;sa outside_in | i icmp&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list outside_in line 10 extended permit icmp any4 any4 log disable (hitcnt=20821163) 0xb47d85da &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list outside_in line 12 extended permit icmp any4 any4 time-exceeded (hitcnt=0) 0xa0979724&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;4. ASA ICMP config&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;show run icmp &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;icmp unreachable rate-limit 10 burst-size 5&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt; show run policy-map | i icmp &lt;BR /&gt;inspect icmp &lt;BR /&gt;inspect icmp error&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any idea is welcome!&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2019 09:05:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-through-asa/m-p/3821835#M31637</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2019-03-19T09:05:37Z</dc:date>
    </item>
    <item>
      <title>Re: Traceroute through ASA</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-through-asa/m-p/3822293#M31639</link>
      <description>Are you trying to traceroute directly to the ASA (to-the-box) or through ASA?&lt;BR /&gt;10.22.10.62 is assigned to outside, and traceroute is initiated to 10.22.10.63, which is on the same subnet as outside.&lt;BR /&gt;If traceroute is intended to 10.22.10.63 and ASA supposed to route this traffic, then packet should come to outside and leave outside. If so, then this is a same-security-traffic intra-interface traffic, and it should be enabled. Otherwise please explain how traffic should flow.</description>
      <pubDate>Tue, 19 Mar 2019 18:57:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-through-asa/m-p/3822293#M31639</guid>
      <dc:creator>Ilkin</dc:creator>
      <dc:date>2019-03-19T18:57:18Z</dc:date>
    </item>
    <item>
      <title>Re: Traceroute through ASA</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-through-asa/m-p/3822651#M31642</link>
      <description>Hello,&lt;BR /&gt;Thanks for reviewing this. Here's my reply:&lt;BR /&gt; - outside uses 10.22.1.62 NOT 10.62. &lt;BR /&gt; - traffic goes THROUGH ASA&lt;BR /&gt; - traffic comes to ASA outside passes through moves to one of the inside interfaces and then reaches the host connected to the inside interface.</description>
      <pubDate>Wed, 20 Mar 2019 08:36:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-through-asa/m-p/3822651#M31642</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2019-03-20T08:36:26Z</dc:date>
    </item>
    <item>
      <title>Re: Traceroute through ASA</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-through-asa/m-p/3823045#M31643</link>
      <description>&lt;P&gt;By default an ASA won't decrement the icmp ttl used by traceroute even if ICMP is otherwise allowed and inspected.&lt;/P&gt;
&lt;P&gt;To get the full functionality including the ASA reporting its interface address in the path, you need to add a line to class-default as follows:&lt;/P&gt;
&lt;PRE&gt;ciscoasa(config)# policy-map global_policy
ciscoasa(config-pmap)# class class-default
ciscoasa(config-pmap-c)# set connection decrement-ttl&lt;/PRE&gt;
&lt;P&gt;Source:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://packetu.com/2009/10/09/traceroute-through-the-asa/" target="_blank"&gt;https://packetu.com/2009/10/09/traceroute-through-the-asa/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2019 15:55:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-through-asa/m-p/3823045#M31643</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-03-20T15:55:16Z</dc:date>
    </item>
    <item>
      <title>Re: Traceroute through ASA</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-through-asa/m-p/3823068#M31645</link>
      <description>OK, if you want to see ASA in the output, you can enable decrementing TTL, as Marvin showed.</description>
      <pubDate>Wed, 20 Mar 2019 16:19:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-through-asa/m-p/3823068#M31645</guid>
      <dc:creator>Ilkin</dc:creator>
      <dc:date>2019-03-20T16:19:00Z</dc:date>
    </item>
    <item>
      <title>Re: Traceroute through ASA</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-through-asa/m-p/3823396#M31647</link>
      <description>&lt;P&gt;Thank you guys, but this is not about ASA showing up.&lt;/P&gt;
&lt;P&gt;On my original post I mentioned those * * * from traceroute are on the ASA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There's also the asp-drop acl-drop capture I also shared on the ASA. So the issue is that ASA drops the traceroute...&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2019 06:43:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-through-asa/m-p/3823396#M31647</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2019-03-21T06:43:21Z</dc:date>
    </item>
    <item>
      <title>Re: Traceroute through ASA</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-through-asa/m-p/3823492#M31649</link>
      <description>&lt;P&gt;The decrement-ttl will fix the * * * entries assuming everything else is configured correctly.&lt;/P&gt;
&lt;P&gt;Your original post shows the ACL entry permitting icmp inbound is currently disabled:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;access-list outside_in line 10 extended permit icmp any4 any4 log disable&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2019 09:51:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-through-asa/m-p/3823492#M31649</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-03-21T09:51:52Z</dc:date>
    </item>
    <item>
      <title>Re: Traceroute through ASA</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-through-asa/m-p/3823588#M31650</link>
      <description>&lt;P&gt;Marvin, I have to disagree: decrement-ttl is present, had it not been present then those * * * should not show up as ASA IP will not be shown. Anyway here's the config:&lt;BR /&gt;&lt;EM&gt;show run policy-map&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;policy-map type inspect dns preset_dns_map&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;parameters&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;message-length maximum client auto&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;message-length maximum 512&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no tcp-inspection&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;policy-map global_policy&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;class inspection_default&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect ip-options &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect netbios &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect rsh &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect rtsp &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect skinny &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect sqlnet &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect sunrpc &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect http &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect icmp &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect dns preset_dns_map &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect icmp error &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect tftp &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;class SFR&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;sfr fail-open&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;class global-class&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;flow-export event-type all destination 10.22.10.63&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;class class-default&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;user-statistics accounting&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;set connection decrement-ttl&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As for the ACL, the ACE is on aka ENABLED; it's only logging that's disabled.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Florin.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2019 11:58:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-through-asa/m-p/3823588#M31650</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2019-03-21T11:58:12Z</dc:date>
    </item>
    <item>
      <title>Re: Traceroute through ASA</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-through-asa/m-p/3825429#M31652</link>
      <description>Any idea guys?</description>
      <pubDate>Mon, 25 Mar 2019 10:30:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-through-asa/m-p/3825429#M31652</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2019-03-25T10:30:14Z</dc:date>
    </item>
    <item>
      <title>Re: Traceroute through ASA</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-through-asa/m-p/3825856#M31654</link>
      <description>&lt;P&gt;Hi Florin,&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;"time exceeded in-transit Drop-reason: &lt;STRONG&gt;(acl-drop) Flow is denied by configured rule&lt;/STRONG&gt;"&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As per this &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/show_asp_drop/show_asp_drop.html" target="_self"&gt;document:-&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="pEx1_Example1"&gt;&lt;SPAN&gt;Name: &lt;EM&gt;&lt;STRONG&gt;acl-drop&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="pEx1_Example1"&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;A name="pgfId-261380" target="_blank"&gt;&lt;/A&gt;Flow is denied by configured rule:&lt;/STRONG&gt;&lt;/EM&gt;&lt;/DIV&gt;
&lt;DIV class="pEx1_Example1"&gt;&lt;SPAN&gt;&lt;A name="pgfId-261381" target="_blank"&gt;&lt;/A&gt; This counter is incremented when a drop rule is hit by the packet and gets dropped. This rule could be a default rule created when the box comes up, when various features are turned on or off, when an acl is applied to interface or any other feature etc. Apart from default rule drops, a packet could be dropped because of:&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="pEx1_Example1"&gt;&lt;SPAN&gt;&lt;A name="pgfId-261382" target="_blank"&gt;&lt;/A&gt;1) ACL configured on an interface&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="pEx1_Example1"&gt;&lt;SPAN&gt;&lt;A name="pgfId-261383" target="_blank"&gt;&lt;/A&gt; 2) ACL configured for AAA and AAA denied the user&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="pEx1_Example1"&gt;&lt;SPAN&gt;&lt;A name="pgfId-261384" target="_blank"&gt;&lt;/A&gt; 3) Thru-box traffic arriving at management-only ifc&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="pEx1_Example1"&gt;&lt;SPAN&gt;&lt;A name="pgfId-261385" target="_blank"&gt;&lt;/A&gt; 4) Unencrypted traffic arriving on a ipsec-enabled interface&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="pEx1_Example1"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="pEx1_Example1"&gt;&lt;SPAN&gt;Your output of configuration are for rules line #10 and #12, could there be a rule above these rules blocking anything from the IP address you are expecting to see traffic from?&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="pEx1_Example1"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="pEx1_Example1"&gt;&lt;SPAN&gt;Have you tried creating/moving the icmp rule to rule position #1 and re-testing?&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="pEx1_Example1"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="pEx1_Example1"&gt;&lt;SPAN&gt;HTH&lt;/SPAN&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 25 Mar 2019 21:02:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-through-asa/m-p/3825856#M31654</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-03-25T21:02:38Z</dc:date>
    </item>
    <item>
      <title>Re: Traceroute through ASA</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-through-asa/m-p/3827097#M31656</link>
      <description>&lt;P&gt;Hello RJI,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the headsup! Ahead of rule 10 there're only Allow rules; I moved it as rule no1&amp;amp;2 and I got the same output.&lt;/P&gt;&lt;P&gt;Review other causes:&lt;/P&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;SPAN&gt;1) ACL configured on an interface - ICMP permit on 1st position&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;SPAN&gt;2) ACL configured for AAA and AAA denied the user = no AAA policy&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;SPAN&gt;3) Thru-box traffic arriving at management-only ifc = not the case, traffic arrives on WAN interface&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;SPAN&gt;4) Unencrypted traffic arriving on a ipsec-enabled interface = no NAT or crypto policies are existing on this firewall; both are taken care upstream.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="pEx1_Example1"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;SPAN&gt;I will open a case to TAC next week and let you all know.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Mar 2019 13:45:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-through-asa/m-p/3827097#M31656</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2019-03-27T13:45:14Z</dc:date>
    </item>
    <item>
      <title>Re: Traceroute through ASA</title>
      <link>https://community.cisco.com/t5/network-security/traceroute-through-asa/m-p/3827185#M31657</link>
      <description>&lt;BR /&gt;4: 10:37:09.632840 10.22.1.62 &amp;gt; 10.22.20.1: icmp: time exceeded in-transit Drop-reason: (acl-drop) Flow is denied by configured rule&lt;BR /&gt;5: 10:37:13.346493 10.22.1.62 &amp;gt; 10.22.20.1: icmp: time exceeded in-transit Drop-reason: (acl-drop) Flow is denied by configured rule&lt;BR /&gt;6: 10:37:17.346966 10.22.1.62 &amp;gt; 10.22.20.1: icmp: time exceeded in-transit Drop-reason: (acl-drop) Flow is denied by configured rule&lt;BR /&gt;It is interesting that ICMP time exceed packets that are generated from Port-channel1.90 are dropped on ASP due to acl-drop, as if the packets are leaving the box and apparently coming back. Can you please check asp-drop capture with detail option to see what are the source and destination MAC addresses on these packets?</description>
      <pubDate>Wed, 27 Mar 2019 15:09:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traceroute-through-asa/m-p/3827185#M31657</guid>
      <dc:creator>Ilkin</dc:creator>
      <dc:date>2019-03-27T15:09:27Z</dc:date>
    </item>
  </channel>
</rss>

