<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Trying to troubleshoot with Packet Trace in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/trying-to-troubleshoot-with-packet-trace/m-p/2335313#M343826</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes sorry about that, you were right the output in the CLI is much better &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yeah and your were right about the .1, my bad &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt; Feel stupid..&lt;/P&gt;&lt;P&gt;I tried with 10.10.10.10 to 192.168.190.27 and the packet was allowed &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the output from &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; # packet-tracer input inside tcp 10.10.10.10 12345 192.168.190.27 443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: CAPTURE&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.190.0&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So i see that its drop at Phase 5..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I added another rule on the inside interface&lt;/P&gt;&lt;P&gt;Allow packet from the guest network to 192.168.190.27 which is the https server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Get the output:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: CAPTURE&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.190.0&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group Outgoing in interface inside&lt;/P&gt;&lt;P&gt;access-list Outgoing extended permit tcp 10.10.10.0 255.255.255.0 host 192.168.190.27 object-group DM_INLINE_TCP_4&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_4 tcp&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT-EXEMPT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside 192.168.190.0 255.255.255.0 inside 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAT exempt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 1&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.190.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside 192.168.190.0 255.255.255.0 inside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,outside) x.x.x.x 192.168.190.27 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside host 192.168.190.27 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to x.x.x.x&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 739399, untranslate_hits = 2012692&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 11&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 36837297, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 12&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: output and adjacency&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;found next-hop 192.168.190.27 using egress ifc inside&lt;/P&gt;&lt;P&gt;adjacency Active&lt;/P&gt;&lt;P&gt;next-hop mac address 000c.2946.f8e5 hits 85&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 29 Aug 2013 07:19:35 GMT</pubDate>
    <dc:creator>Shane Riley</dc:creator>
    <dc:date>2013-08-29T07:19:35Z</dc:date>
    <item>
      <title>Trying to troubleshoot with Packet Trace</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-troubleshoot-with-packet-trace/m-p/2335310#M343823</link>
      <description>&lt;P&gt;Hi Folks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Having a bit of issues, i am trying to access a http/https server from the Guest interface (10.10.10.0/24) to the Inside interface (192.168.190.0/24)&lt;/P&gt;&lt;P&gt;I can ping the server, but when i try to access it with http/https.. no luck&lt;SPAN __jive_emoticon_name="cry" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So when i am on the 192.168.190.0/24 network i have no problem using http/https to the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Inside: &lt;/STRONG&gt;Security level 100&amp;nbsp; (VLAN1)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Guest:&lt;/STRONG&gt; Security level 40&amp;nbsp;&amp;nbsp;&amp;nbsp; (VLAN23)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ASA version:&lt;/STRONG&gt; 8.0(4)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ASDM version:&lt;/STRONG&gt; 6.1(5)57&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have attached an image when trying to troubleshoot the access list entry from the 10.10.10.1 to 192.168.190.1.&lt;/P&gt;&lt;P&gt;But for some reason the packet is dropped..So i am wondering if i am able to ping the server&amp;nbsp; when i am on the 10 network. Well then the rule shouldn't be wrong right? &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any tips and tricks, i prob missed something &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Shane&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:31:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-troubleshoot-with-packet-trace/m-p/2335310#M343823</guid>
      <dc:creator>Shane Riley</dc:creator>
      <dc:date>2019-03-12T02:31:56Z</dc:date>
    </item>
    <item>
      <title>Re: Trying to troubleshoot with Packet Trace</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-troubleshoot-with-packet-trace/m-p/2335311#M343824</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would much rather see the "packet-tracer" output taken from the CLI (or the CLI of the Tools menu in ASDM)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This gives a lot clearer output as the GUI doesnt show all the information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since the IP addresses you are using are both .1 , are they by any chance IP addresses of the ASA interfaces? If they are then this result is expected as ASA doesnt allow this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If they are the actual IP addresses of the devices on the network then they are ok to use naturally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In that case the output in the picture would seem to mean that you dont have an ACL rule allowing that traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The&amp;nbsp; &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; commands CLI format is&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input Guest tcp 10.10.10.1 12345 192.168.190.1 443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input Guest tcp 10.10.10.1 12345 192.168.190.1 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2013 06:28:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-troubleshoot-with-packet-trace/m-p/2335311#M343824</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-29T06:28:32Z</dc:date>
    </item>
    <item>
      <title>Re: Trying to troubleshoot with Packet Trace</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-troubleshoot-with-packet-trace/m-p/2335312#M343825</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Think I put the wrong interface in the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; commands. I edited the above post with the correct interface name.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2013 06:43:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-troubleshoot-with-packet-trace/m-p/2335312#M343825</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-29T06:43:45Z</dc:date>
    </item>
    <item>
      <title>Re: Trying to troubleshoot with Packet Trace</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-troubleshoot-with-packet-trace/m-p/2335313#M343826</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes sorry about that, you were right the output in the CLI is much better &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yeah and your were right about the .1, my bad &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt; Feel stupid..&lt;/P&gt;&lt;P&gt;I tried with 10.10.10.10 to 192.168.190.27 and the packet was allowed &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the output from &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; # packet-tracer input inside tcp 10.10.10.10 12345 192.168.190.27 443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: CAPTURE&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.190.0&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So i see that its drop at Phase 5..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I added another rule on the inside interface&lt;/P&gt;&lt;P&gt;Allow packet from the guest network to 192.168.190.27 which is the https server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Get the output:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: CAPTURE&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.190.0&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group Outgoing in interface inside&lt;/P&gt;&lt;P&gt;access-list Outgoing extended permit tcp 10.10.10.0 255.255.255.0 host 192.168.190.27 object-group DM_INLINE_TCP_4&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_4 tcp&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT-EXEMPT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside 192.168.190.0 255.255.255.0 inside 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAT exempt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 1&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.190.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside 192.168.190.0 255.255.255.0 inside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,outside) x.x.x.x 192.168.190.27 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside host 192.168.190.27 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to x.x.x.x&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 739399, untranslate_hits = 2012692&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 11&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 36837297, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 12&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: output and adjacency&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;found next-hop 192.168.190.27 using egress ifc inside&lt;/P&gt;&lt;P&gt;adjacency Active&lt;/P&gt;&lt;P&gt;next-hop mac address 000c.2946.f8e5 hits 85&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2013 07:19:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-troubleshoot-with-packet-trace/m-p/2335313#M343826</guid>
      <dc:creator>Shane Riley</dc:creator>
      <dc:date>2013-08-29T07:19:35Z</dc:date>
    </item>
    <item>
      <title>Trying to troubleshoot with Packet Trace</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-troubleshoot-with-packet-trace/m-p/2335314#M343827</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think I put the wrong interface in the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; commands as I mentioned after my original reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The 10.10.10.10 is behind Guest interface to my understanding so it should be used in the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2013 07:23:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-troubleshoot-with-packet-trace/m-p/2335314#M343827</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-29T07:23:00Z</dc:date>
    </item>
    <item>
      <title>Re: Trying to troubleshoot with Packet Trace</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-troubleshoot-with-packet-trace/m-p/2335315#M343828</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes did the: &lt;/P&gt;&lt;P&gt;packet-tracer input Guest tcp 10.10.10.10 12345 192.168.190.27 443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.190.0&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group Guest_access_in in interface Guest&lt;/P&gt;&lt;P&gt;access-list Guest_access_in extended permit ip 10.10.10.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: NAT-EXEMPT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (Guest) 1 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip Guest 10.10.10.0 255.255.255.0 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (x.x.x.x [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 2933, untranslate_hits = 902&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.190.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside 192.168.190.0 255.255.255.0 Guest any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,outside) x.x.x.x 192.168.190.27 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside host 192.168.190.27 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to x.x.x.x&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 739558, untranslate_hits = 2013350&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 36862249, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 11&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: output and adjacency&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;found next-hop 192.168.190.27 using egress ifc inside&lt;/P&gt;&lt;P&gt;adjacency Active&lt;/P&gt;&lt;P&gt;next-hop mac address 000c.2946.f8e5 hits 553&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: Guest&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2013 07:28:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-troubleshoot-with-packet-trace/m-p/2335315#M343828</guid>
      <dc:creator>Shane Riley</dc:creator>
      <dc:date>2013-08-29T07:28:15Z</dc:date>
    </item>
    <item>
      <title>Trying to troubleshoot with Packet Trace</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-troubleshoot-with-packet-trace/m-p/2335316#M343829</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would seem to me that the traffic is allowed through the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It doesnt seem to list any NAT that is actually applied to the traffic. Or perhaps the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface has a NAT0 configuration for traffic between the 2 networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you made sure that there is nothing on the actual host/server blocking the connection? Like some software firewall? It would seem the defatult gateway configurations and such are correct as you can ping the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you checked on the actual server that its listening on ports TCP/80 and TCP/443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If its a Windows machine I think you can use the following command in the command prompt&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;netstat -a&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2013 07:42:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-troubleshoot-with-packet-trace/m-p/2335316#M343829</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-29T07:42:56Z</dc:date>
    </item>
    <item>
      <title>Re: Trying to troubleshoot with Packet Trace</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-troubleshoot-with-packet-trace/m-p/2335317#M343830</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes it seems that way &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well i checked with the firewall on the windows server and it should allow the connection.. I also turned off the firewall and tried, but still no luck..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did the netstat -a&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is some output..the state is syn_received?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TCP&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.190.27:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.10.10.139:61808&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SYN_RECEIVED&lt;/P&gt;&lt;P&gt;TCP&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.190.27:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.10.10.176:53373&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SYN_RECEIVED&lt;/P&gt;&lt;P&gt;TCP&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.190.27:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.10.10.176:53374&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SYN_RECEIVED&lt;/P&gt;&lt;P&gt;TCP&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.190.27:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.10.10.185:62246&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SYN_RECEIVED&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also when i check the log on the asa..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Teardown TCP connection 37034091 for Guest:10.10.10.139/61838 to inside:192.168.190.27/443 duration 0:00:00 bytes 0 TCP Reset-O&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2013 11:19:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-troubleshoot-with-packet-trace/m-p/2335317#M343830</guid>
      <dc:creator>Shane Riley</dc:creator>
      <dc:date>2013-08-29T11:19:48Z</dc:date>
    </item>
    <item>
      <title>Trying to troubleshoot with Packet Trace</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-troubleshoot-with-packet-trace/m-p/2335318#M343831</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Reset-O would seem to indicate that the host behind the lower &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; has sent a TCP Reset for the connection. Don't know why though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2013 12:09:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-troubleshoot-with-packet-trace/m-p/2335318#M343831</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-29T12:09:32Z</dc:date>
    </item>
    <item>
      <title>Re: Trying to troubleshoot with Packet Trace</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-troubleshoot-with-packet-trace/m-p/2335319#M343832</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hmm ok, i will troubleshoot some more &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; Thanks for your help buddy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Shane&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Aug 2013 11:12:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-troubleshoot-with-packet-trace/m-p/2335319#M343832</guid>
      <dc:creator>Shane Riley</dc:creator>
      <dc:date>2013-08-30T11:12:49Z</dc:date>
    </item>
    <item>
      <title>Re: Trying to troubleshoot with Packet Trace</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-troubleshoot-with-packet-trace/m-p/2335320#M343833</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi shane,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please provide:&lt;/P&gt;&lt;P&gt;show run nat-control&lt;/P&gt;&lt;P&gt;sh run nat&lt;/P&gt;&lt;P&gt;sh run global&lt;/P&gt;&lt;P&gt;sh run interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see that you have this access list:&lt;/P&gt;&lt;P&gt;access-list Guest_access_in extended permit ip 10.10.10.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But if Nat control is enabled, you would need to configure a nat rule for this connection.&lt;/P&gt;&lt;P&gt;Please provide those outputs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Harvey.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 31 Aug 2013 04:31:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-troubleshoot-with-packet-trace/m-p/2335320#M343833</guid>
      <dc:creator>Harvey Ortiz</dc:creator>
      <dc:date>2013-08-31T04:31:44Z</dc:date>
    </item>
    <item>
      <title>Re: Trying to troubleshoot with Packet Trace</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-troubleshoot-with-packet-trace/m-p/2335321#M343834</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#sh run nat-control &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no nat-control&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#sh run nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list NoNAT&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.190.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.191.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (dmz) 0 access-list NoNAT_DMZ&lt;/P&gt;&lt;P&gt;nat (dmz) 1 192.168.192.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (Tele) 0 access-list Tele_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (Guest) 0 access-list Guest_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (Guest) 1 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#sh run global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#sh run interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.190.2 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address x.x.x.x 255.255.255.240 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.192.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan13&lt;/P&gt;&lt;P&gt; nameif Tele&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.0.0.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan23&lt;/P&gt;&lt;P&gt; nameif Guest&lt;/P&gt;&lt;P&gt; security-level 40&lt;/P&gt;&lt;P&gt; ip address 10.10.10.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; switchport access vlan 23&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; switchport trunk allowed vlan 1,3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; switchport access vlan 13&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; switchport access vlan 3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; switchport access vlan 3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Sep 2013 06:19:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-troubleshoot-with-packet-trace/m-p/2335321#M343834</guid>
      <dc:creator>Shane Riley</dc:creator>
      <dc:date>2013-09-02T06:19:22Z</dc:date>
    </item>
    <item>
      <title>Trying to troubleshoot with Packet Trace</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-troubleshoot-with-packet-trace/m-p/2335322#M343835</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you configured NAT0 between Guest/inside interfaces? As we cant see the ACL configuration used in the NAT0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have any&lt;STRONG&gt; "static"&lt;/STRONG&gt; configurations? You can use the command &lt;STRONG&gt;"show run static"&lt;/STRONG&gt; to list them. We could try Static Identity NAT unless one is already configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would&amp;nbsp; be&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,Guest) 192.168.190.0 192.168.190.0 netmask 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Sep 2013 06:25:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-troubleshoot-with-packet-trace/m-p/2335322#M343835</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-09-02T06:25:52Z</dc:date>
    </item>
    <item>
      <title>Trying to troubleshoot with Packet Trace</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-troubleshoot-with-packet-trace/m-p/2335323#M343836</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#sh run static&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) x.x.x.x 192.168.190.27 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (dmz,outside) x.x.x.x pfdsesrv05 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (dmz,outside) x.x.x.x x.x.x.x netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) x.x.x.x 192.168.190.73 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So i added the static entry:&lt;/P&gt;&lt;P&gt;&lt;STRONG style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;static (inside,Guest) 192.168.190.0 192.168.190.0 netmask 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Sep 2013 08:44:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-troubleshoot-with-packet-trace/m-p/2335323#M343836</guid>
      <dc:creator>Shane Riley</dc:creator>
      <dc:date>2013-09-09T08:44:12Z</dc:date>
    </item>
    <item>
      <title>Trying to troubleshoot with Packet Trace</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-troubleshoot-with-packet-trace/m-p/2335324#M343837</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Folks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still having the problem, getting alot of TCP Reset-0 messages in the log. What can be the cause?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers &lt;/P&gt;&lt;P&gt;Shane&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Oct 2013 07:07:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-troubleshoot-with-packet-trace/m-p/2335324#M343837</guid>
      <dc:creator>Shane Riley</dc:creator>
      <dc:date>2013-10-02T07:07:52Z</dc:date>
    </item>
  </channel>
</rss>

