<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5510 8.2(5) Conn/Xlate in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-8-2-5-conn-xlate/m-p/2235876#M346281</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I Have a problem here.&lt;/P&gt;&lt;P&gt;Some times the connection from one ip "out of the firewall" to an ip behind a firewall stops, when it occurs, i send the commands "clear conn origin ip address" and clear xlate "origin ip &lt;SPAN style="font-size: 10pt;"&gt;address&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;", after that, the communication returns.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACL:&lt;/P&gt;&lt;P&gt;access-list acl_inside extended permit tcp host 172.17.2.116 host SPB-SGR-Producao eq 1414 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Conn:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;TCP dmz SPB-SGR-Producao:1414 inside 172.17.2.116:24811, idle 0:00:15, bytes 0, flags saA&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TCP dmz SPB-SGR-Producao:1414 inside 172.17.2.116:24756, idle 0:05:55, bytes 1056, flags UO&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Help?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Tks!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 02:13:13 GMT</pubDate>
    <dc:creator>Rafael Mendes</dc:creator>
    <dc:date>2019-03-12T02:13:13Z</dc:date>
    <item>
      <title>ASA 5510 8.2(5) Conn/Xlate</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-8-2-5-conn-xlate/m-p/2235876#M346281</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I Have a problem here.&lt;/P&gt;&lt;P&gt;Some times the connection from one ip "out of the firewall" to an ip behind a firewall stops, when it occurs, i send the commands "clear conn origin ip address" and clear xlate "origin ip &lt;SPAN style="font-size: 10pt;"&gt;address&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;", after that, the communication returns.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACL:&lt;/P&gt;&lt;P&gt;access-list acl_inside extended permit tcp host 172.17.2.116 host SPB-SGR-Producao eq 1414 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Conn:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;TCP dmz SPB-SGR-Producao:1414 inside 172.17.2.116:24811, idle 0:00:15, bytes 0, flags saA&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TCP dmz SPB-SGR-Producao:1414 inside 172.17.2.116:24756, idle 0:05:55, bytes 1056, flags UO&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Help?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Tks!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:13:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-8-2-5-conn-xlate/m-p/2235876#M346281</guid>
      <dc:creator>Rafael Mendes</dc:creator>
      <dc:date>2019-03-12T02:13:13Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 8.2(5) Conn/Xlate</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-8-2-5-conn-xlate/m-p/2235877#M346282</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I am not mistaken the first connections shown in the above output is a connection which the LAN host has tried to open. However the ASA has not seen any reply to the TCP connection forming so that connections is probably about to be teardown with the reason SYN Timeout.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The other seems to be a TCP connection that has fully formed. However there only seems to be outbound traffic and no data transmitted inbound.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jul 2013 12:47:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-8-2-5-conn-xlate/m-p/2235877#M346282</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-17T12:47:08Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 8.2(5) Conn/Xlate</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-8-2-5-conn-xlate/m-p/2235878#M346284</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But it connection was working before, some times the firewall "lock" the connection, and unlock only after i do clear conn and clear xlate commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It can be a bug?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jul 2013 12:55:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-8-2-5-conn-xlate/m-p/2235878#M346284</guid>
      <dc:creator>Rafael Mendes</dc:creator>
      <dc:date>2013-07-17T12:55:48Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 8.2(5) Conn/Xlate</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-8-2-5-conn-xlate/m-p/2235879#M346285</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The problem occurs with various origin ip address, host 172.17.2.116 it only a example.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jul 2013 12:57:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-8-2-5-conn-xlate/m-p/2235879#M346285</guid>
      <dc:creator>Rafael Mendes</dc:creator>
      <dc:date>2013-07-17T12:57:19Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 8.2(5) Conn/Xlate</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-8-2-5-conn-xlate/m-p/2235880#M346286</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think the issue may be somehow related to the application that runs on tcp/1414 in your case, and when you resetting the connection by using clear&amp;nbsp; conn, app just initiates it again and works for some time, until error&amp;nbsp; or whatewer it is (on application level) happens again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jul 2013 13:12:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-8-2-5-conn-xlate/m-p/2235880#M346286</guid>
      <dc:creator>Andrew Phirsov</dc:creator>
      <dc:date>2013-07-17T13:12:55Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 8.2(5) Conn/Xlate</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-8-2-5-conn-xlate/m-p/2235881#M346287</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Andrew,&lt;/P&gt;&lt;P&gt;I think the issue is a problem in the firewall, it application runs here for five years, and this problem occurs only a few months ago.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jul 2013 13:20:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-8-2-5-conn-xlate/m-p/2235881#M346287</guid>
      <dc:creator>Rafael Mendes</dc:creator>
      <dc:date>2013-07-17T13:20:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 8.2(5) Conn/Xlate</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-8-2-5-conn-xlate/m-p/2235882#M346288</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Then, if the problem occurs frequently enough, try to run capture on ASA for traffic between some client and the server, so u'll be able to see, why the connection stops working.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jul 2013 13:32:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-8-2-5-conn-xlate/m-p/2235882#M346288</guid>
      <dc:creator>Andrew Phirsov</dc:creator>
      <dc:date>2013-07-17T13:32:37Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 8.2(5) Conn/Xlate</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-8-2-5-conn-xlate/m-p/2235883#M346291</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only real way to tell what is happening is taking captures on the internal and external firewall interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could then compare them with eachother and also look at the capture from the time that this problem occurs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Only way I imagine the clear conn/xlate might affect this situation is that the host has the connection to the remote host and when you clear the connection and xlate the host will send more data to the existing connection (which the ASA doesnt have anymore) and the ASA in that case might probably send a TCP Reset to the host. At this point the host will probably form a new connection that corrects the situation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Otherwise I dont think the ASA has any affect on the actual host reinitiating the connection since the only situation where the ASA should send anything to the actual client in the internal network should be when it sees a outboud connection that is not allowed. Then the ASA should send a TCP Reset to my understanding.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But as you showed above the 2 connections in the ASAs connection table, the other one is clearly a connection from the Internal network towards the remote host in which the host has sent the TCP SYN but has not received anything back from the remote host. This would again point to a problem at the remote side.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But without doing the captures and seeing/monitoring logs we can only guess what the actual cause of the problem is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jul 2013 13:44:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-8-2-5-conn-xlate/m-p/2235883#M346291</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-17T13:44:10Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 8.2(5) Conn/Xlate</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-8-2-5-conn-xlate/m-p/2235884#M346293</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just to give you an example of the capture configuration format&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-CAP permit ip host &lt;INTERNAL host=""&gt; host &lt;REMOTE host=""&gt;&lt;/REMOTE&gt;&lt;/INTERNAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-CAP permit ip host &lt;REMOTE host=""&gt; host &lt;INTERNAL host=""&gt;&lt;/INTERNAL&gt;&lt;/REMOTE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;capture INSIDE-CAP type raw-data access-list INSIDE-CAP interface inside buffer 33500000 circular-buffer&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-CAP permit ip host &lt;INTERNAL host=""&gt; host &lt;REMOTE host=""&gt;&lt;/REMOTE&gt;&lt;/INTERNAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-CAP permit ip host &lt;REMOTE host=""&gt; host &lt;INTERNAL host=""&gt;&lt;/INTERNAL&gt;&lt;/REMOTE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;capture DMZ-CAP type raw-data access-list DMZ-CAP interface dmz buffer 33500000 circular-buffer&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you could use the following command to confirm that traffic is getting captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show capture&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could use the following command to show the capture contents on the CLI (I prefer to download the capture contents to a host)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show capture INSIDE-CAP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show capture DMZ-CAP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can copy the capture as a .pcap file to a local host and open it with Wireshark to make the analyzing easier&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;copy /pcap capture:INSIDE-CAP t&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="ftp://x.x.x.x/INSIDE-CAP.pcap"&gt;ftp://x.x.x.x/INSIDE-CAP.pcap&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;copy /pcap capture:DMZ-CAP t&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="ftp://x.x.x.x/DMZ-CAP.pcap"&gt;ftp://x.x.x.x/DMZ-CAP.pcap&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And you can remove the captures with the following commands when you dont have any more use for them. (ACLs will have to be removed separately)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no capture INSIDE-CAP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no capture DMZ-CAP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jul 2013 14:29:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-8-2-5-conn-xlate/m-p/2235884#M346293</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-17T14:29:48Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 8.2(5) Conn/Xlate</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-8-2-5-conn-xlate/m-p/2235885#M346294</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tks.&lt;/P&gt;&lt;P&gt;When the problem occurs again, i will capture the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jul 2013 14:43:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-8-2-5-conn-xlate/m-p/2235885#M346294</guid>
      <dc:creator>Rafael Mendes</dc:creator>
      <dc:date>2013-07-17T14:43:38Z</dc:date>
    </item>
  </channel>
</rss>

