<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic INBOUND ACL in 8.6 code in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/inbound-acl-in-8-6-code/m-p/2240306#M346819</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are still using the local IP address the destination.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "packet-tracer" is meant to simulate the actual packet entering the ASA interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you are testing traffic from the Internet then you will have to use the public NAT IP address as the destination naturally. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the ACLs ofcourse the destination IP address is the local IP address because of the NAT and ACL format changes in the new software.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully this clears things up &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do remember to mark a reply as the correct answer if it answered your question&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ask more if needed naturally&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 08 Jul 2013 19:44:39 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-07-08T19:44:39Z</dc:date>
    <item>
      <title>INBOUND ACL in 8.6 code</title>
      <link>https://community.cisco.com/t5/network-security/inbound-acl-in-8-6-code/m-p/2240300#M346812</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I am not so familliar with 8.6 code and I am trying to give an outside host access to another host in the DMZ. I have have a NAT set for the host in the DMZ and in the ACL on the outside interface, i have used the local IP(192.168.x.x) in the ACL. I have defied my services(isakmp,esp,gre,ipsec).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When i do a show local host 192.168.x.x, i can see that there is an isakmp connection established&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;local host: &amp;lt;192.16x.2x.22&amp;gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; TCP flow count/limit = 0/unlimited&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; TCP embryonic count to host = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; TCP intercept watermark = unlimited&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; UDP flow count/limit = 2/unlimited&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Conn:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; UDP outside 2x.2xx.x24.19x:500 dmz 192.16x.2x.22:&lt;SPAN style="color: #333333;"&gt;&lt;STRONG&gt;500,&lt;/STRONG&gt;&lt;/SPAN&gt; idle 0:00:01, bytes 488, flags -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; UDP outside 20x.9x.2xx.132:500 dmz 192.16X.2X.22&lt;STRONG&gt;:500&lt;/STRONG&gt;, idle 0:00:00, bytes 1152, flags -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But adminstrator in the other end, keeps telling the tunnel is up! Packet-tracer also shows the packet drop after passing the NAT. But the output above shows&amp;nbsp; isakmp connection in port 500. I also tried to test the port by telnet to the IP follow by the port number(192.16x.2x.22 500) with no luck.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There packet-tracer information as well... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.16.200.0&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group from_outside in interface outside&lt;/P&gt;&lt;P&gt;access-list from_outside extended permit object-group Long_vpn_ser object-group DM_INLINE_NETWORK_4 object Long_vpn&lt;/P&gt;&lt;P&gt;object-group service Longview_vpn_ser&lt;/P&gt;&lt;P&gt; description: Services for Long VPN access&lt;/P&gt;&lt;P&gt; service-object gre&lt;/P&gt;&lt;P&gt; service-object esp&lt;/P&gt;&lt;P&gt; service-object ah&lt;/P&gt;&lt;P&gt; service-object udp destination eq isakmp&lt;/P&gt;&lt;P&gt; service-object tcp destination eq ssh&lt;/P&gt;&lt;P&gt; service-object object IPSEC&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_4&lt;/P&gt;&lt;P&gt; network-object host 2x.9x.2xx.13x&lt;/P&gt;&lt;P&gt; network-object host 21x.2xx.2x4.19x&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: FOVER&lt;/P&gt;&lt;P&gt;Subtype: standby-update&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: VPN&lt;/P&gt;&lt;P&gt;Subtype: ipsec-tunnel-flow&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (dmz,outside) source static Long_vpn Long_pub&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: dmz&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help will be greatly appreciate,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:09:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-acl-in-8-6-code/m-p/2240300#M346812</guid>
      <dc:creator>Jean Paul Enerst</dc:creator>
      <dc:date>2019-03-12T02:09:02Z</dc:date>
    </item>
    <item>
      <title>INBOUND ACL in 8.6 code</title>
      <link>https://community.cisco.com/t5/network-security/inbound-acl-in-8-6-code/m-p/2240301#M346813</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are probably using the real IP address as the destination IP address of the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command and that is why the ASA tells you that the simulated connection would fail the RPF check. Since on the way it doesnt hit any NAT rule but on the back out it hits a NAT rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; output with the public IP address if you want to accurately simulate the incoming packet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jul 2013 19:13:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-acl-in-8-6-code/m-p/2240301#M346813</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-08T19:13:48Z</dc:date>
    </item>
    <item>
      <title>INBOUND ACL in 8.6 code</title>
      <link>https://community.cisco.com/t5/network-security/inbound-acl-in-8-6-code/m-p/2240302#M346815</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I did figured this part out, but i still don't understans why the other end of the tunnel is up when in my ASA it shows up! Also as i mentioned above, i cannot test port 500 via telnet.Obivious something is wrong but the configuration so simple!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Eddy&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jul 2013 19:25:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-acl-in-8-6-code/m-p/2240302#M346815</guid>
      <dc:creator>Jean Paul Enerst</dc:creator>
      <dc:date>2013-07-08T19:25:19Z</dc:date>
    </item>
    <item>
      <title>INBOUND ACL in 8.6 code</title>
      <link>https://community.cisco.com/t5/network-security/inbound-acl-in-8-6-code/m-p/2240303#M346816</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is strange about the tunnel being up if everything is allowed and the reason the "packet-tracer" was failing was because the wrong IP address was used?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You cant test ISAKMP / UDP500 with Telnet as telnet is TCP and not UDP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jul 2013 19:30:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-acl-in-8-6-code/m-p/2240303#M346816</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-08T19:30:19Z</dc:date>
    </item>
    <item>
      <title>INBOUND ACL in 8.6 code</title>
      <link>https://community.cisco.com/t5/network-security/inbound-acl-in-8-6-code/m-p/2240304#M346817</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for help, and did not realized that can't test UDP with this test. Although, i made the same test for ssh and still no access. Please see below in regards to the packet-tracer and result&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jul 2013 19:39:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-acl-in-8-6-code/m-p/2240304#M346817</guid>
      <dc:creator>Jean Paul Enerst</dc:creator>
      <dc:date>2013-07-08T19:39:46Z</dc:date>
    </item>
    <item>
      <title>INBOUND ACL in 8.6 code</title>
      <link>https://community.cisco.com/t5/network-security/inbound-acl-in-8-6-code/m-p/2240305#M346818</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/9/4/8/144849-long_trace.PNG" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jul 2013 19:41:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-acl-in-8-6-code/m-p/2240305#M346818</guid>
      <dc:creator>Jean Paul Enerst</dc:creator>
      <dc:date>2013-07-08T19:41:00Z</dc:date>
    </item>
    <item>
      <title>INBOUND ACL in 8.6 code</title>
      <link>https://community.cisco.com/t5/network-security/inbound-acl-in-8-6-code/m-p/2240306#M346819</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are still using the local IP address the destination.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "packet-tracer" is meant to simulate the actual packet entering the ASA interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you are testing traffic from the Internet then you will have to use the public NAT IP address as the destination naturally. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the ACLs ofcourse the destination IP address is the local IP address because of the NAT and ACL format changes in the new software.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully this clears things up &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do remember to mark a reply as the correct answer if it answered your question&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ask more if needed naturally&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jul 2013 19:44:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-acl-in-8-6-code/m-p/2240306#M346819</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-08T19:44:39Z</dc:date>
    </item>
  </channel>
</rss>

