<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5520 Flow is Denied by Configured Rule in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214627#M349034</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Greetings again everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks to everyone for responding to my previous requests for help.&amp;nbsp; I worked with a Cisco TAC the last couple days to resolve this issue.&amp;nbsp; It turned out to be a NAT issue between the two vlans.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The original access-list for natting was this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list NoNAT extended permit ip 10.0.0.0 255.0.0.0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list NoNAT extended permit ip 10.0.0.0 255.0.0.0 172.16.0.0 255.240.0.0&lt;/P&gt;&lt;P&gt;access-list NoNAT extended permit ip 10.0.0.0 255.0.0.0 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list NoNAT extended permit ip 172.16.0.0 255.240.0.0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list NoNAT extended permit ip 172.16.0.0 255.240.0.0 172.16.0.0 255.240.0.0&lt;/P&gt;&lt;P&gt;access-list NoNAT extended permit ip 192.168.0.0 255.255.0.0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list NoNAT extended permit ip 192.168.0.0 255.255.0.0 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list NoNAT extended permit ip 10.0.0.0 255.255.240.0 10.51.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list NoNAT extended permit ip 10.21.0.0 255.255.240.0 10.51.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (WTA2COB) 0 access-list NoNAT&lt;/P&gt;&lt;P&gt;nat (WTA2COB) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (FACSURV) 0 access-list NoNAT&lt;/P&gt;&lt;P&gt;nat (FACSURV) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The revised configuration was this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list EXEMPT permit ip 192.168.150.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list EXEMPT permit ip 192.168.151.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (WTA2COB) 0 access-list EXEMPT&lt;/P&gt;&lt;P&gt;nat (WTA2COB) 1 192.168.150.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (FACSURV) 0 access-list EXEMPT&lt;/P&gt;&lt;P&gt;nat (FACSURV) 1 192.168.151.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From what I can tell, the 192.168 statement in the NoNAT access-list didn't work because it was for 192.168.0.0 /16, wherease the Exempt access-list applied for each subnet specifically.&amp;nbsp; Let me know if I'm correct in that assumption.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Long term I'd like to update the NoNAT to reflect the smaller subnets and then apply the access-list to these interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;J&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 12 Jun 2013 18:37:14 GMT</pubDate>
    <dc:creator>jeremyn</dc:creator>
    <dc:date>2013-06-12T18:37:14Z</dc:date>
    <item>
      <title>ASA 5520 Flow is Denied by Configured Rule</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214610#M349011</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;New to the forums and the Cisco ASA 5520.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am attempting to allow traffic from one vlan to another.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Vlan 1 is on Interface 0/2.vlan1&lt;/LI&gt;&lt;LI&gt;Vlan 2 is on int 0/3.vlan2&lt;/LI&gt;&lt;LI&gt;Each vlan can communicate inside it's own vlan, and the gateway on each responds to vlan specific clients&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My problem is that I am unable to communicate between the two vlans.&amp;nbsp; Using the ASDM packet tracer tool, I find that packets are denied by the default rule (on the second Access List lookup).&amp;nbsp; It appears as if the packet never reaches the other interface.&amp;nbsp; Any help is appreciated.&amp;nbsp; The access rules are set up to allow traffic from one vlan to another (inbound), on both interfaces.&amp;nbsp; Testing from either vlan to connect to the other fails.&amp;nbsp; Below are the accee-rules for each vlans.&amp;nbsp; Once I get basic connectivity working, I hope to clean it up.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list aVlan1; 3 elements; name hash: 0xadecbc34&lt;/P&gt;&lt;P&gt;access-list aVlan1 line 1 extended permit ip any 192.168.151.64 255.255.255.192 (hitcnt=0) 0xeb0a6bb8&lt;/P&gt;&lt;P&gt;access-list aVlan1 line 2 extended permit ip any 192.168.151.128 255.255.255.128 (hitcnt=0) 0x3a7dfade&lt;/P&gt;&lt;P&gt;access-list aVlan1 line 3 extended permit ip any 192.168.151.0 255.255.255.0 (hitcnt=0) 0x93302455&lt;/P&gt;&lt;P&gt;access-list aVlan2_access_in; 3 elements; name hash: 0x6dc9adc7&lt;/P&gt;&lt;P&gt;access-list aVlan2_access_in line 1 extended permit ip 192.168.151.64 255.255.255.192 192.168.150.0 255.255.255.240 (hitcnt=0) 0x054508b7&lt;/P&gt;&lt;P&gt;access-list aVlan2_access_in line 2 extended permit ip 192.168.151.128 255.255.255.128 192.168.150.0 255.255.255.240 (hitcnt=0) 0xc125c41e&lt;/P&gt;&lt;P&gt;access-list aVlan2_access_in line 3 extended permit ip host 192.168.151.3 192.168.150.0 255.255.255.240 (hitcnt=0) 0x4adc114c&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;J&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:50:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214610#M349011</guid>
      <dc:creator>jeremyn</dc:creator>
      <dc:date>2019-03-12T01:50:59Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 Flow is Denied by Configured Rule</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214611#M349012</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jeremy,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the security level for those interfaces?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try to add this command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like you to post the packet tracer if possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Eddy Duran&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 May 2013 00:24:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214611#M349012</guid>
      <dc:creator>Eddy Duran</dc:creator>
      <dc:date>2013-05-30T00:24:48Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 Flow is Denied by Configured Rule</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214612#M349013</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Eddy,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your response.&amp;nbsp; Each subinterface has a security level of 30.&amp;nbsp; I need a day or so to determine if there will be any adverse effects of applying that rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Packet tracer and applicable rules below.&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/3/5/7/140753-vlan659to658packettrace.png" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/4/5/7/140754-vlan659to658aclrules.png" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the help,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;J&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 May 2013 15:31:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214612#M349013</guid>
      <dc:creator>jeremyn</dc:creator>
      <dc:date>2013-05-30T15:31:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 Flow is Denied by Configured Rule</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214613#M349014</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Having each local firewall interface on the same &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; at the moment means that they have no chance of communicating with eachother (even with ACLs configured) unless the above mentioned configuration command is inserted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you were to insert the command the following things might happened depending on your configurations&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;An interface which has no ACL attached would be able to initiate connections towards any of the other interfaces with the equal &lt;STRONG&gt;"security-level" &lt;/STRONG&gt;value.&lt;/LI&gt;&lt;LI&gt;An interface which has an ACL attached would be matched against its ACL rules and those would determine to which networks or hosts behind the other local interfaces the hosts behind this interface could connect to.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Generally if I would want to configure a setup where I have multiple local interfaces on the ASA and would want to rule out any traffic between them I would always use ACLs on each interface instead of using &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; value.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The way I would do it would be to&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Create an &lt;STRONG&gt;"object-group network"&lt;/STRONG&gt; which contains &lt;STRONG&gt;ALL&lt;/STRONG&gt; the local networks&lt;/LI&gt;&lt;LI&gt;Create an ACL for each interface which starts with a &lt;STRONG&gt;"deny ip any object-group &lt;CREATED object="" name=""&gt;"&lt;/CREATED&gt;&lt;/STRONG&gt; which would by default block all traffic from the behind that interface to ANY other network behind the ASAs local interfaces&lt;/LI&gt;&lt;LI&gt;Create a permitting statement for the local networks behind that interface to &lt;STRONG&gt;"any"&lt;/STRONG&gt; destination address which would essentially enable Internet bound traffic (as we have blocked all local networks before)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I would have to need to enable some traffic between local networks behind different interfaces I would simply add &lt;STRONG&gt;"permit"&lt;/STRONG&gt; statements at the TOP of the needed ACLs with a &lt;STRONG&gt;"remark"&lt;/STRONG&gt; describing what traffic is allowed. The existing &lt;STRONG&gt;"deny"&lt;/STRONG&gt; statement would still make sure that no other traffic between the local networks would be allowed unless I specifically allowed it in the top of the interface ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 May 2013 16:28:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214613#M349014</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-30T16:28:58Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 Flow is Denied by Configured Rule</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214614#M349017</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This does help, thanks Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ideally, I would like to implement what you suggest but I think it would take some careful planning.&amp;nbsp; In the mean time, I'd like to enable access between the two subinterfaces.&amp;nbsp; Would changing the security level of the subinterface where traffic would be intiated from to a higher security level solve this problem?&amp;nbsp; Alternatively I could drop the security level of the other subinterface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;J&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 May 2013 18:27:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214614#M349017</guid>
      <dc:creator>jeremyn</dc:creator>
      <dc:date>2013-05-30T18:27:39Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 Flow is Denied by Configured Rule</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214615#M349020</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Increasing the "security-level" of the source interface might be the best choice at this point. (As I have no knowledge of the rest of the setup)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you already have the ACL configured on the source interface, then increasing the "security-level" value of the interface wouldnt really change what traffic is allowed and what is not since the ACL will specify that. Changing the "security-level" would however get around the immidiate problem you are facing now which is that networks behind equal "security-level" interfaces cant communicate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you were to lower the "security-level" of the destination interface it might change the whole setup more. And I can only guess but to me it would seem that if you have several other local interfaces with value 30 without ACL and this destination was now changed to 29 for example then some traffic might start get allowed that you dont wish to be allowed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If one of the reply is the correct answer to your question, please do mark it as the correct answer. Also if you have found some information helpfull, please take the time to rate these replys &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally ask more and I will try to help out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 May 2013 18:34:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214615#M349020</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-30T18:34:48Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 Flow is Denied by Configured Rule</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214616#M349023</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will test this today and either mark as answered or follow up.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;J&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 May 2013 18:41:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214616#M349023</guid>
      <dc:creator>jeremyn</dc:creator>
      <dc:date>2013-05-30T18:41:14Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 Flow is Denied by Configured Rule</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214617#M349024</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi I changed the security level of the first interface higher and tested an ip packet from that subnet to the other (40/30).&amp;nbsp; It failed, citing the same default rule.&amp;nbsp; It appears to be blocked at that interface and never reaches the other interface.&amp;nbsp; Any other ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;J&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 May 2013 19:17:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214617#M349024</guid>
      <dc:creator>jeremyn</dc:creator>
      <dc:date>2013-05-30T19:17:38Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 Flow is Denied by Configured Rule</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214618#M349025</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure what exactly you are testing. I imagine its certain destination IP and TCP/UDP ports connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you perhaps try this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Go to&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;ASDM&lt;/LI&gt;&lt;LI&gt;Tools -menu&lt;/LI&gt;&lt;LI&gt;Command Line Interface&lt;/LI&gt;&lt;LI&gt;Insert the following command (while filling the information to match your connection test)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input &lt;NAMEIF&gt; &lt;PROTOCOL&gt; &lt;SOURCE ip=""&gt; &lt;SOURCE port=""&gt; &lt;DESTINATION ip=""&gt; &lt;DESTINATION port=""&gt;&lt;/DESTINATION&gt;&lt;/DESTINATION&gt;&lt;/SOURCE&gt;&lt;/SOURCE&gt;&lt;/PROTOCOL&gt;&lt;/NAMEIF&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;nameif&lt;/STRONG&gt; = Is the name of the interface where the source host for this connection test is located at. In other words the name of the interface from where the packet is "input"&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;protocol&lt;/STRONG&gt; = TCP or UDP&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;source ip&lt;/STRONG&gt; = Is the hosts IP address that is initiating the connection&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;source port&lt;/STRONG&gt; = Is the random source port for the connection attempt&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;destination ip&lt;/STRONG&gt; = Is the destination IP address&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;destination port&lt;/STRONG&gt; = Is the port on the destination host you are trying to reach&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use the Send button to send the command to the ASA and it will print out the CLI format of the Packet Tracer output. You can then copy/paste it here (minus any possible public IP address information incase something shows)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 May 2013 19:27:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214618#M349025</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-30T19:27:09Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 Flow is Denied by Configured Rule</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214619#M349026</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just to check, you have attached the ACLs to the interfaces right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If not then the output you are seeing might be possible also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use the command &lt;STRONG&gt;"show run access-group"&lt;/STRONG&gt; to view the ACL attached to the interfaces&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 May 2013 19:28:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214619#M349026</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-30T19:28:55Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 Flow is Denied by Configured Rule</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214620#M349027</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, no luck:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input wta2COB icmp 192.168.150.1 0 0 192.168.151.3&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.151.0&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; FACSURV&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: WTA2COB&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: FACSURV&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;access-group aWTA2COB in interface WTA2COB&lt;/P&gt;&lt;P&gt;access-group FACSURV_access_in in interface FACSURV&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the continued responses. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 May 2013 23:12:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214620#M349027</guid>
      <dc:creator>jeremyn</dc:creator>
      <dc:date>2013-05-30T23:12:43Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 Flow is Denied by Configured Rule</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214621#M349028</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jeremy,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the update.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you post the show access-list command from the unit? If possible a show run from the unit?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Eddy Duran&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 May 2013 02:39:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214621#M349028</guid>
      <dc:creator>Eddy Duran</dc:creator>
      <dc:date>2013-05-31T02:39:53Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 Flow is Denied by Configured Rule</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214622#M349029</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "packet-tracer" code is incorrect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are testing ICMP with it and basicly inserting a ICMP Echp reply (Type 0 Code 0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to use this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input wta2COB icmp 192.168.150.1 &lt;SPAN style="color: #ff0000;"&gt;8 0&lt;/SPAN&gt; 192.168.151.3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which is ICMP Echp (Type 8 Code 0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 May 2013 03:36:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214622#M349029</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-31T03:36:32Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 Flow is Denied by Configured Rule</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214623#M349030</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I worked on this some more today, testing with some additional rules.&amp;nbsp; The ASA is acting like it doesn't see my rules:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Added NAT statements:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (FACSURV) 0 access-list NoNAT&lt;/P&gt;&lt;P&gt;nat (FACSURV) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (WTA2COB) 0 access-list NoNAT&lt;/P&gt;&lt;P&gt;nat (WTA2COB) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access rules below:&lt;/P&gt;&lt;P&gt;access-list aWTA2COB; 5 elements; name hash: 0xadecbc34&lt;/P&gt;&lt;P&gt;access-list aWTA2COB line 1 extended permit ip any 192.168.151.64 255.255.255.192 (hitcnt=0) 0xeb0a6bb8&lt;/P&gt;&lt;P&gt;access-list aWTA2COB line 2 extended permit ip any 192.168.151.128 255.255.255.128 (hitcnt=0) 0x3a7dfade&lt;/P&gt;&lt;P&gt;access-list aWTA2COB line 3 extended permit ip any 192.168.151.0 255.255.255.0 (hitcnt=0) 0x93302455&lt;/P&gt;&lt;P&gt;access-list aWTA2COB line 4 remark test&lt;/P&gt;&lt;P&gt;access-list aWTA2COB line 5 extended permit ip any any (hitcnt=0) 0xdbfec94c&lt;/P&gt;&lt;P&gt;access-list aWTA2COB line 6 remark test&lt;/P&gt;&lt;P&gt;access-list aWTA2COB line 7 extended permit icmp any any (hitcnt=0) 0x2cece62d&lt;/P&gt;&lt;P&gt;access-list FACSURV_access_in; 5 elements; name hash: 0x6dc9adc7&lt;/P&gt;&lt;P&gt;access-list FACSURV_access_in line 1 extended permit ip 192.168.151.64 255.255.255.192 192.168.150.0 255.255.255.240 (hitcnt=0) 0x054508b7&lt;/P&gt;&lt;P&gt;access-list FACSURV_access_in line 2 extended permit ip 192.168.151.128 255.255.255.128 192.168.150.0 255.255.255.240 (hitcnt=0) 0xc125c41e&lt;/P&gt;&lt;P&gt;access-list FACSURV_access_in line 3 extended permit ip host 192.168.151.3 192.168.150.0 255.255.255.240 (hitcnt=0) 0x4adc114c&lt;/P&gt;&lt;P&gt;access-list FACSURV_access_in line 4 extended permit ip any any (hitcnt=9) 0x9fedc480&lt;/P&gt;&lt;P&gt;access-list FACSURV_access_in line 5 remark test&lt;/P&gt;&lt;P&gt;access-list FACSURV_access_in line 6 extended permit icmp any any (hitcnt=0) 0xd74c33b6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Packet Tracer result:&lt;/P&gt;&lt;P&gt;packet-tracer input wta2COB icmp 192.168.150.1 8 0 192.168.151.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.151.0&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; FACSURV&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: WTA2COB&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: FACSURV&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will open a TAC case today.&amp;nbsp; If you have any further input, I'm willing to test.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;J&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 May 2013 18:55:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214623#M349030</guid>
      <dc:creator>jeremyn</dc:creator>
      <dc:date>2013-05-31T18:55:26Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 Flow is Denied by Configured Rule</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214624#M349031</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would you be willing to share the complete configuration?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want you can share it through a PM (private message) on the forums. (That is if you dont want to share it in this post I mean)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would give a chance to go through the problem better.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 May 2013 18:59:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214624#M349031</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-31T18:59:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 Flow is Denied by Configured Rule</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214625#M349032</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I won't be able to share the full config.&amp;nbsp; I am in training this week and will be unable to follow up on this ticket.&amp;nbsp; I'd like to follow this up next week if possible.&amp;nbsp; I may open up a TAC case here pretty soon, and will definitely follow up with the answer if I get it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;J&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Jun 2013 19:34:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214625#M349032</guid>
      <dc:creator>jeremyn</dc:creator>
      <dc:date>2013-06-03T19:34:48Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 Flow is Denied by Configured Rule</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214626#M349033</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess if you arent able to share the configuration (even through PM) then there is not much that we can do at this point.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will simply have to go through this with TAC (to which you probably have to provide the configuration perhaps) and see what the problem is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Usually when the "packet-tracer" output tells that you that the packet has been denied by an ACL-DROP then its most likely due to some global setting that is wrong or there is no ACL attached to an interface (though it seems that in your case the ACLs are attached)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Every now and then I run into these situation myself and have to scratch my head for a bit as the "packet-tracer" really doesnt give any help with its output.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Jun 2013 19:44:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214626#M349033</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-03T19:44:33Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 Flow is Denied by Configured Rule</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214627#M349034</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Greetings again everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks to everyone for responding to my previous requests for help.&amp;nbsp; I worked with a Cisco TAC the last couple days to resolve this issue.&amp;nbsp; It turned out to be a NAT issue between the two vlans.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The original access-list for natting was this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list NoNAT extended permit ip 10.0.0.0 255.0.0.0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list NoNAT extended permit ip 10.0.0.0 255.0.0.0 172.16.0.0 255.240.0.0&lt;/P&gt;&lt;P&gt;access-list NoNAT extended permit ip 10.0.0.0 255.0.0.0 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list NoNAT extended permit ip 172.16.0.0 255.240.0.0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list NoNAT extended permit ip 172.16.0.0 255.240.0.0 172.16.0.0 255.240.0.0&lt;/P&gt;&lt;P&gt;access-list NoNAT extended permit ip 192.168.0.0 255.255.0.0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list NoNAT extended permit ip 192.168.0.0 255.255.0.0 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list NoNAT extended permit ip 10.0.0.0 255.255.240.0 10.51.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list NoNAT extended permit ip 10.21.0.0 255.255.240.0 10.51.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (WTA2COB) 0 access-list NoNAT&lt;/P&gt;&lt;P&gt;nat (WTA2COB) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (FACSURV) 0 access-list NoNAT&lt;/P&gt;&lt;P&gt;nat (FACSURV) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The revised configuration was this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list EXEMPT permit ip 192.168.150.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list EXEMPT permit ip 192.168.151.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (WTA2COB) 0 access-list EXEMPT&lt;/P&gt;&lt;P&gt;nat (WTA2COB) 1 192.168.150.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (FACSURV) 0 access-list EXEMPT&lt;/P&gt;&lt;P&gt;nat (FACSURV) 1 192.168.151.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From what I can tell, the 192.168 statement in the NoNAT access-list didn't work because it was for 192.168.0.0 /16, wherease the Exempt access-list applied for each subnet specifically.&amp;nbsp; Let me know if I'm correct in that assumption.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Long term I'd like to update the NoNAT to reflect the smaller subnets and then apply the access-list to these interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;J&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Jun 2013 18:37:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214627#M349034</guid>
      <dc:creator>jeremyn</dc:creator>
      <dc:date>2013-06-12T18:37:14Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 Flow is Denied by Configured Rule</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214628#M349035</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In general the NAT0 access-lists should ONLY contain the specific networks your are doing the NAT0 for. Especially when you are using smaller subnets of the larger network all around your network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have run into such problem in a hospital environment where someone had inserted NAT0 rules that basicly included all the 3 private IP address networks and this seemed to mess up the traffic forwarding completely. The "packet-tracer" output in this case didnt help at all and it was only when I played with the NAT configurations I was able to correct the situation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have never managed to cause such problems myself though as I always configure NAT rules using the specific network because its a quick way to cause problems with traffic forwarding, especially on the new software.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We didnt see your NAT0 ACL configuration before so didnt even think about NAT causing this problem. If it truly did.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Jun 2013 18:47:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214628#M349035</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-12T18:47:49Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 Flow is Denied by Configured Rule</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214629#M349036</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My apologies for not sharing the full config. It looks like you are correct in that being the root issue and I will go through and reconfigure the access-list to be more specific.&amp;nbsp; I'll mark your reply as the correct answer as it is helpful in finalizing the configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Jun 2013 21:52:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-flow-is-denied-by-configured-rule/m-p/2214629#M349036</guid>
      <dc:creator>jeremyn</dc:creator>
      <dc:date>2013-06-12T21:52:58Z</dc:date>
    </item>
  </channel>
</rss>

