<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Direction of ACL traffic flow in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/direction-of-acl-traffic-flow/m-p/2349168#M343720</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please provide the packet-tracer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;packet-tracer input Test tcp 172.16.x.x 12345 172.24.x.x 443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Harvey&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 31 Aug 2013 04:47:58 GMT</pubDate>
    <dc:creator>Harvey Ortiz</dc:creator>
    <dc:date>2013-08-31T04:47:58Z</dc:date>
    <item>
      <title>Direction of ACL traffic flow</title>
      <link>https://community.cisco.com/t5/network-security/direction-of-acl-traffic-flow/m-p/2349163#M343705</link>
      <description>&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hi Everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Need to confirm below that log &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;%ASA-6-106100: access-list Test_access_in denied tcp Test/172.24.x.x(443) -&amp;gt; Test/172.16.x.x(53310) hit-cnt 1 first hit [0x55b05541, 0x7c3c1e84]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this mean that traffic from interface Test on port 443&amp;nbsp;&amp;nbsp; to interface Test1 of ASA is denied as there is no acl to allow trafic from 172.24&amp;nbsp; to 172.16?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or is this other way around?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:32:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/direction-of-acl-traffic-flow/m-p/2349163#M343705</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2019-03-12T02:32:46Z</dc:date>
    </item>
    <item>
      <title>Direction of ACL traffic flow</title>
      <link>https://community.cisco.com/t5/network-security/direction-of-acl-traffic-flow/m-p/2349164#M343708</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems to me that its not the typical Deny message related to ACLs. It might be that you have some ACL configuration with the &lt;STRONG&gt;"log"&lt;/STRONG&gt; parameter configured at the end.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It still doesnt explain why this was Denied.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems to me to be return traffic for some HTTPS connection but I am not sure why the firewall would block it. Unless we are possinly talking about Asymmetric Routing where the firewall blocks the a return packet for some connection that the ASA in question hasnt seen.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a link to the above mentioned Syslog ID 106100 information/explanation:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/syslog-guide/logmsgs.html#wp4769049"&gt;http://www.cisco.com/en/US/docs/security/asa/syslog-guide/logmsgs.html#wp4769049&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Aug 2013 18:02:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/direction-of-acl-traffic-flow/m-p/2349164#M343708</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-30T18:02:27Z</dc:date>
    </item>
    <item>
      <title>Re: Direction of ACL traffic flow</title>
      <link>https://community.cisco.com/t5/network-security/direction-of-acl-traffic-flow/m-p/2349165#M343711</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are absolutely correct that log was created due to asymmetric routing issue.&lt;/P&gt;&lt;P&gt;I fixed the routing issue and all is well now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But for my understanding need to learn what does log mean here.&lt;/P&gt;&lt;P&gt;Traffic to destination was going via interface &lt;SPAN style="color: #ff0000;"&gt;Test1 &lt;/SPAN&gt;and when return traffic comes back to this firewall it was coming on&lt;/P&gt;&lt;P&gt;interface &lt;SPAN style="color: #ff0000;"&gt;Test.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After routing issue fixed return traffic was coming back on interface &lt;SPAN style="color: #ff0000;"&gt;Test1&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so now&amp;nbsp; if we look at log again&lt;/P&gt;&lt;P&gt;%ASA-6-106100: access-list Test_access_in denied tcp &lt;SPAN style="color: #ff0000;"&gt;Test1&lt;/SPAN&gt;/172.24.x.x(443) -&amp;gt;&lt;SPAN style="color: #ff0000;"&gt; Test&lt;/SPAN&gt;/172.16.x.x(53310) hit-cnt 1 first hit [0x55b05541, 0x7c3c1e84]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can we conclude that traffic is coming&amp;nbsp; on interface &lt;SPAN style="color: #ff0000;"&gt;Test &lt;/SPAN&gt;and is trying to go to&amp;nbsp; interface &lt;SPAN style="color: #ff0000;"&gt;Test1&lt;/SPAN&gt;&amp;nbsp; of the same ASA?&lt;/P&gt;&lt;P&gt;Source is 172.16&amp;nbsp; and destination is 172.24?&lt;/P&gt;&lt;P&gt;It did not allow traffic from interface Test to &lt;SPAN style="color: #ff0000;"&gt;Test1 &lt;/SPAN&gt;because there is no ACL&amp;nbsp; to allow traffic from interface &lt;SPAN style="color: #ff0000;"&gt;Test to Test1&lt;/SPAN&gt;?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: mahesh parmar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Aug 2013 18:21:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/direction-of-acl-traffic-flow/m-p/2349165#M343711</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-08-30T18:21:38Z</dc:date>
    </item>
    <item>
      <title>Direction of ACL traffic flow</title>
      <link>https://community.cisco.com/t5/network-security/direction-of-acl-traffic-flow/m-p/2349166#M343714</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not quite sure about the situation. It seems to me that the initial connection would have come from Test to Test1 looking at the ports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would probably best to see the&lt;STRONG&gt; "packet-tracer" &lt;/STRONG&gt;output for this same connection&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input Test tco 172.16.x.x 12345 172.24.x.x 443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Perhaps also the output of&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run access-group&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Aug 2013 19:39:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/direction-of-acl-traffic-flow/m-p/2349166#M343714</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-30T19:39:40Z</dc:date>
    </item>
    <item>
      <title>Re: Direction of ACL traffic flow</title>
      <link>https://community.cisco.com/t5/network-security/direction-of-acl-traffic-flow/m-p/2349167#M343716</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Packettracer does not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Return traffic comes from interface Test to Test1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group Test_access_in in interface Test1&lt;/P&gt;&lt;P&gt;access-group Test in interface Test&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Aug 2013 19:50:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/direction-of-acl-traffic-flow/m-p/2349167#M343716</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-08-30T19:50:03Z</dc:date>
    </item>
    <item>
      <title>Re: Direction of ACL traffic flow</title>
      <link>https://community.cisco.com/t5/network-security/direction-of-acl-traffic-flow/m-p/2349168#M343720</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please provide the packet-tracer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;packet-tracer input Test tcp 172.16.x.x 12345 172.24.x.x 443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Harvey&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 31 Aug 2013 04:47:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/direction-of-acl-traffic-flow/m-p/2349168#M343720</guid>
      <dc:creator>Harvey Ortiz</dc:creator>
      <dc:date>2013-08-31T04:47:58Z</dc:date>
    </item>
    <item>
      <title>Direction of ACL traffic flow</title>
      <link>https://community.cisco.com/t5/network-security/direction-of-acl-traffic-flow/m-p/2349169#M343722</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; should work. Just make sure you insert the actual IP addresses to the command instead of the ones with the &lt;STRONG&gt;"x.x"&lt;/STRONG&gt; since you didnt mention the full IP addresses in your posts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 31 Aug 2013 05:07:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/direction-of-acl-traffic-flow/m-p/2349169#M343722</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-31T05:07:36Z</dc:date>
    </item>
    <item>
      <title>Re: Direction of ACL traffic flow</title>
      <link>https://community.cisco.com/t5/network-security/direction-of-acl-traffic-flow/m-p/2349170#M343725</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I&amp;nbsp; found this from ASA -syslog message pdf&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Error Message %ASA-4-106100: access-list acl_ID {permitted | denied | est-allowed}&lt;/P&gt;&lt;P&gt;protocol interface_name/source_address(source_port) (idfw_user, sg_info)&lt;/P&gt;&lt;P&gt;interface_name/dest_address(dest_port) (idfw_user, sg_info) hit-cnt number&lt;/P&gt;&lt;P&gt;({first hit | number-second interval}) hash codes&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Times-Roman; "&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So as per this the source is Test1 interface and going to Destination interface Test.The reason it was denied due to Asymmetric route.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also from Cisco site&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Times-Roman; "&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P align="left"&gt;For&lt;/P&gt;&lt;P align="left"&gt;example, if an ACK packet is received on the ASA (for which no TCP connection exists in the&lt;/P&gt;&lt;P align="left"&gt;connection table), the ASA might generate message 106100, indicating that the packet was&lt;/P&gt;&lt;P align="left"&gt;permitted; however, the packet is later correctly dropped because of no matching connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Times-Roman; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Times-Roman; "&gt; &lt;/SPAN&gt;so due to above reason the packet was dropped.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Times-Roman; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Times-Roman; "&gt;Best regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: Times-Roman; "&gt; &lt;/SPAN&gt;Mahesh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Sep 2013 19:59:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/direction-of-acl-traffic-flow/m-p/2349170#M343725</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-09-06T19:59:02Z</dc:date>
    </item>
  </channel>
</rss>

