<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA: SMTP Outbound Blocked in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-smtp-outbound-blocked/m-p/2293225#M342667</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you for all your help and replys. it ended up being my internet provider blocking the SMTP. i guess this is a good asa config to have here as an exmaple&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you ALL&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 23 Sep 2013 11:00:31 GMT</pubDate>
    <dc:creator>mohamedheyine</dc:creator>
    <dc:date>2013-09-23T11:00:31Z</dc:date>
    <item>
      <title>ASA: SMTP Outbound Blocked</title>
      <link>https://community.cisco.com/t5/network-security/asa-smtp-outbound-blocked/m-p/2293220#M342653</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i am having trouble with my outbound SMTP traffic. i have 5510 ASA with IPS module. i also have three interfaces configured the inside, DMZ, and outside. my incoming email pass with no problemes but my outgoing onse do not they get stuck in my DMZ with the follwing message &lt;STRONG&gt;No route to host . &lt;/STRONG&gt;from my email relay i can ping even telnet any other port of any server on the internet but when it comes to SNMP it gives me this error. also the same thing happens with the inside. the configuration hasen't changed i also did a packet trace witch gave the result allowed across the board. now i am really stuck and can't figure out what is going on here is my asa config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(1) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname dspasa2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address X.X.X.165 255.255.255.248 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.0.3 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;nameif dmz&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;ip address 10.0.0.101 255.255.255.240 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;shutdown&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt;nameif management&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CEST 1&lt;/P&gt;&lt;P&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;/P&gt;&lt;P&gt;object-group protocol TCPUDP&lt;/P&gt;&lt;P&gt;protocol-object udp&lt;/P&gt;&lt;P&gt;protocol-object tcp&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp host 192.168.0.1 any log disable inactive &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit udp host 192.168.0.1 any log disable inactive &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip host 192.168.0.4 any log disable &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp host 192.168.0.5 any log disable &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit udp host 192.168.0.5 any log disable &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp 192.168.0.0 255.255.255.0 any eq ftp-data log disable &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp 192.168.0.0 255.255.255.0 any eq ftp log disable &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit icmp 192.168.0.0 255.255.255.0 any log disable &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp 192.168.0.0 255.255.255.0 host 10.0.0.100 eq 8445 &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip 192.168.0.0 255.255.255.0 192.168.64.0 255.255.192.0 &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip 192.168.0.0 255.255.255.0 192.168.128.0 255.255.192.0 &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip 192.168.0.0 255.255.255.0 172.18.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip 192.168.0.0 255.255.255.0 172.18.2.0 255.255.255.192 &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit object-group TCPUDP host 192.168.0.201 host 81.80.56.164 log disable &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip 192.168.0.0 255.255.255.0 192.168.198.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.255.0 10.10.10.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.255.0 192.168.128.0 255.255.192.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.255.0 172.18.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.255.0 192.168.200.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.255.0 192.168.64.0 255.255.192.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.255.0 172.18.2.0 255.255.255.192 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.255.0 192.168.198.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any log disable &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit esp any any log disable &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ah any any log disable &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit udp any any eq isakmp &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host X.X.X.161 eq smtp &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host&amp;nbsp; X.X.X.161 eq 8445 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host X.X.X.161 eq https &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit object-group TCPUDP any host&amp;nbsp; X.X.X.164 &lt;/P&gt;&lt;P&gt;access-list dspgroup_splitTunnelAcl standard permit any &lt;/P&gt;&lt;P&gt;access-list dspgroup_splitTunnelAcl_1 standard permit any &lt;/P&gt;&lt;P&gt;access-list dspgroup_splitTunnelAcl_2 standard permit any &lt;/P&gt;&lt;P&gt;access-list snimndb extended permit ip 192.168.0.0 255.255.255.0 192.168.128.0 255.255.192.0 &lt;/P&gt;&lt;P&gt;access-list snimndb extended permit ip 192.168.0.0 255.255.255.0 172.18.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list snimndb extended permit ip 192.168.0.0 255.255.255.0 192.168.200.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list snimndb extended permit ip 192.168.0.0 255.255.255.0 192.168.64.0 255.255.192.0 &lt;/P&gt;&lt;P&gt;access-list snimndb extended permit ip 192.168.0.0 255.255.255.0 172.18.2.0 255.255.255.192 &lt;/P&gt;&lt;P&gt;access-list snimndb extended permit ip 192.168.0.0 255.255.255.0 192.168.198.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list SPIL standard permit 192.168.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list QOS extended permit ip 192.168.0.0 255.255.255.0 192.168.64.0 255.255.192.0 &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list dmz-in extended permit icmp any any &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list dmz-in extended permit tcp host 10.0.0.100 any eq https &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list dmz-in extended permit tcp host 10.0.0.100 any eq www &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list dmz-in extended permit udp host 10.0.0.100 any eq domain &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list dmz-in extended permit tcp host 10.0.0.100 any eq smtp &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;ip local pool VPNPOOL 10.10.10.1-10.10.10.20 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface inside&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (outside) 1 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 1 192.168.0.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,dmz) 192.168.0.0 192.168.0.0 netmask 255.255.255.0 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (dmz,outside)&amp;nbsp; X.X.X.161 10.0.0.100 netmask 255.255.255.255 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (outside,inside) 192.168.0.201&amp;nbsp; X.X.X.164 netmask 255.255.255.255 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group outside_access_in in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group inside_access_in in interface inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group dmz-in in interface dmz&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0&amp;nbsp; X.X.X..166 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication enable console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication serial console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;aaa authorization command LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.0.0 255.255.0.0 management&lt;/P&gt;&lt;P&gt;http 192.168.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;snmp-server location DSP&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set myset esp-aes esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set pfs group1&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 match address snimndb&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set peer X.X.X.X &lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set transform-set myset&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set security-association lifetime seconds 1800&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 1&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption 3des&lt;/P&gt;&lt;P&gt;hash md5&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 1800&lt;/P&gt;&lt;P&gt;crypto isakmp ipsec-over-tcp port 10000 &lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh 192.168.64.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh 192.168.0.0 255.255.0.0 management&lt;/P&gt;&lt;P&gt;ssh timeout 60&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;priority-queue outside&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics port&lt;/P&gt;&lt;P&gt;threat-detection statistics protocol&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P&gt;ntp server 192.168.0.4 source management&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;group-policy dspgroup internal&lt;/P&gt;&lt;P&gt;group-policy dspgroup attributes&lt;/P&gt;&lt;P&gt;dns-server value 192.168.0.4 192.168.64.47&lt;/P&gt;&lt;P&gt;split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt;split-tunnel-network-list value SPIL&lt;/P&gt;&lt;P&gt;default-domain value dsp.snim.com&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;isakmp keepalive threshold 10 retry 2&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup ppp-attributes&lt;/P&gt;&lt;P&gt;authentication pap&lt;/P&gt;&lt;P&gt;authentication ms-chap-v2&lt;/P&gt;&lt;P&gt;authentication eap-proxy&lt;/P&gt;&lt;P&gt;tunnel-group X.X.X.X type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group X.X.X.X ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group RAPARIS type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group RAPARIS general-attributes&lt;/P&gt;&lt;P&gt;address-pool VPNPOOL&lt;/P&gt;&lt;P&gt;default-group-policy dspgroup&lt;/P&gt;&lt;P&gt;tunnel-group RAPARIS ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;class-map voix&lt;/P&gt;&lt;P&gt;match dscp ef &lt;/P&gt;&lt;P&gt;class-map IPS&lt;/P&gt;&lt;P&gt;match any&lt;/P&gt;&lt;P&gt;class-map QOS&lt;/P&gt;&lt;P&gt;match access-list QOS&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;class-map inspection_defautl&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;policy-map voix&lt;/P&gt;&lt;P&gt;class voix&lt;/P&gt;&lt;P&gt;&amp;nbsp; priority&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;class IPS&lt;/P&gt;&lt;P&gt;&amp;nbsp; ips promiscuous fail-open&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;service-policy voix interface outside&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:bb43480221ed20aafc3e397fd7432bc3&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is an ouput of the Packet Tracer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dspasa2# packet-tracer input dmz tcp 10.0.0.100 234 173.194.79.26 25&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group dmz-in in interface dmz&lt;BR /&gt;access-list dmz-in extended permit tcp host 10.0.0.100 any eq smtp &lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IDS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map IPS&lt;BR /&gt;match any&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class IPS&lt;BR /&gt;&amp;nbsp; ips promiscuous fail-open&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW &lt;BR /&gt;Config:&lt;BR /&gt;static (dmz,outside) X.X.X.161 10.0.0.100 netmask 255.255.255.255 &lt;BR /&gt;&amp;nbsp; match ip dmz host 10.0.0.100 outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to X.X.X.161&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 3540, untranslate_hits = 920&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 10.0.0.100/0 to 81.80.56.161/0 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (dmz,outside) X.X.X.161 10.0.0.100 netmask 255.255.255.255 &lt;BR /&gt;&amp;nbsp; match ip dmz host 10.0.0.100 outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to X.X.X.161&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 3540, untranslate_hits = 920&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 8470, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: dmz&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please help&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:41:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-smtp-outbound-blocked/m-p/2293220#M342653</guid>
      <dc:creator>mohamedheyine</dc:creator>
      <dc:date>2019-03-12T02:41:48Z</dc:date>
    </item>
    <item>
      <title>ASA: SMTP Outbound Blocked</title>
      <link>https://community.cisco.com/t5/network-security/asa-smtp-outbound-blocked/m-p/2293221#M342656</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I bealeve that you must to edit your policy map and add to your default inspection the smtp traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12.222222328186035px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG&gt;policy-map global_policy&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12.222222328186035px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG&gt;class inspection_default&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12.222222328186035px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG&gt;&amp;nbsp; inspect smtp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Because your dmz is more trustable than the outside interface, I think you must include this type of traffic to the global inspection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take care man.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 21 Sep 2013 23:21:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-smtp-outbound-blocked/m-p/2293221#M342656</guid>
      <dc:creator>Antonio Simoes</dc:creator>
      <dc:date>2013-09-21T23:21:17Z</dc:date>
    </item>
    <item>
      <title>ASA: SMTP Outbound Blocked</title>
      <link>https://community.cisco.com/t5/network-security/asa-smtp-outbound-blocked/m-p/2293222#M342659</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thankx Antonio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;that didn't help because i had on before and removed in case it was giving me trouble along with an IPS class that i had under global_policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you Antonio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Sep 2013 11:29:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-smtp-outbound-blocked/m-p/2293222#M342659</guid>
      <dc:creator>mohamedheyine</dc:creator>
      <dc:date>2013-09-22T11:29:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASA: SMTP Outbound Blocked</title>
      <link>https://community.cisco.com/t5/network-security/asa-smtp-outbound-blocked/m-p/2293223#M342663</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mohamed,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please post the full log message(s) which point(s) to the SMTP communication problem&amp;nbsp; ?&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also please get the SMTP captures at the dmz and outside:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture dmz-smtp interface dmz match tcp host 10.0.0.100&amp;nbsp;&amp;nbsp;&amp;nbsp; any eq 25&lt;/P&gt;&lt;P&gt;capture out-smtp interface outside match tcp host X.X.X.161&amp;nbsp;&amp;nbsp; any eq 25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then initiate SMTP flow from the server&amp;nbsp; and get the following :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show cap dmz-smtp&lt;/P&gt;&lt;P&gt;show cap out-smtp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;Regards&lt;BR /&gt;Mashal Shboul&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Sep 2013 15:23:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-smtp-outbound-blocked/m-p/2293223#M342663</guid>
      <dc:creator>malshbou</dc:creator>
      <dc:date>2013-09-22T15:23:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA: SMTP Outbound Blocked</title>
      <link>https://community.cisco.com/t5/network-security/asa-smtp-outbound-blocked/m-p/2293224#M342666</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can u try &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Sep 2013 18:51:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-smtp-outbound-blocked/m-p/2293224#M342666</guid>
      <dc:creator>pranesh deshpande</dc:creator>
      <dc:date>2013-09-22T18:51:53Z</dc:date>
    </item>
    <item>
      <title>Re: ASA: SMTP Outbound Blocked</title>
      <link>https://community.cisco.com/t5/network-security/asa-smtp-outbound-blocked/m-p/2293225#M342667</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you for all your help and replys. it ended up being my internet provider blocking the SMTP. i guess this is a good asa config to have here as an exmaple&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you ALL&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Sep 2013 11:00:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-smtp-outbound-blocked/m-p/2293225#M342667</guid>
      <dc:creator>mohamedheyine</dc:creator>
      <dc:date>2013-09-23T11:00:31Z</dc:date>
    </item>
  </channel>
</rss>

