<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Packet treatment by asa in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/packet-treatment-by-asa/m-p/2259417#M349706</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Apostolos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By default the ASA will deny traffic that comes from Interface "X" and needs to go out that same interface "X" some sort of split-horizon rule that you might override using the same-security-traffic permit intra-interface command,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Remember to rate all of the helpful posts&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio Carvajal &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 21 May 2013 23:40:30 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2013-05-21T23:40:30Z</dc:date>
    <item>
      <title>Packet treatment by asa</title>
      <link>https://community.cisco.com/t5/network-security/packet-treatment-by-asa/m-p/2259416#M349705</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have the following question. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a 5525-X and in one DMZ a couple of ISA servers&amp;nbsp; with load balancing in unicast mode (that means that both ISA server have the same MAC).&lt;/P&gt;&lt;P&gt;When another machine (in the same DMZ)&amp;nbsp; tries to send a packet destined to ISA, the packet is flooded on local switch .&lt;/P&gt;&lt;P&gt;ASA receives the packet and sends a RST back.&lt;/P&gt;&lt;P&gt;Is this the normal behavior? How ASA handles packets that&lt;/P&gt;&lt;P&gt;How asa is treating packets that arriving in its&amp;nbsp; interface and the packet is not destined or must go through the asa?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apostolos&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:45:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-treatment-by-asa/m-p/2259416#M349705</guid>
      <dc:creator>olympicair</dc:creator>
      <dc:date>2019-03-12T01:45:12Z</dc:date>
    </item>
    <item>
      <title>Packet treatment by asa</title>
      <link>https://community.cisco.com/t5/network-security/packet-treatment-by-asa/m-p/2259417#M349706</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Apostolos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By default the ASA will deny traffic that comes from Interface "X" and needs to go out that same interface "X" some sort of split-horizon rule that you might override using the same-security-traffic permit intra-interface command,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Remember to rate all of the helpful posts&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio Carvajal &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 May 2013 23:40:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-treatment-by-asa/m-p/2259417#M349706</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-05-21T23:40:30Z</dc:date>
    </item>
    <item>
      <title>Packet treatment by asa</title>
      <link>https://community.cisco.com/t5/network-security/packet-treatment-by-asa/m-p/2259418#M349707</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Julio, I don't think the ASA sends a RST if the same-security-traffic is not enabled, I think it just silently drops the packet.&lt;/P&gt;&lt;P&gt;Since both the machine and ISA are on the same subnet, the ASA should not interfere with the traffic (assuming the ASA is in routed mode not transparent)...&lt;/P&gt;&lt;P&gt;are you matching an ASA inspection policy that has reset as action?&lt;/P&gt;&lt;P&gt;are you running IPS in promiscuous and using TCP resets? you might be matching one of the IPS signatures...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Patrick&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 May 2013 03:07:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-treatment-by-asa/m-p/2259418#M349707</guid>
      <dc:creator>Patrick Moubarak</dc:creator>
      <dc:date>2013-05-22T03:07:39Z</dc:date>
    </item>
    <item>
      <title>Packet treatment by asa</title>
      <link>https://community.cisco.com/t5/network-security/packet-treatment-by-asa/m-p/2259419#M349708</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Patrick,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I agree with you, Traffic on the same LAN should never reach the default-gateway as this is only LAN traffic...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And also agree on the fact that not having the same-security-traffic command will not generate a reset... In fact we will see on the ASP captures on the ASA an ACL drop for that.&lt;/P&gt;&lt;P&gt;The client or server machines will never know about that....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now what it confuses me is the following statement:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;the packet is flooded on local switch .ASA receives the packet and sends a RST back.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do you mean Apostolos by packet is flooded on local switch?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only way that this could happen would be if the packet is a broadcast/multicast (without CGMP,IGMP Snooping) or an unknown unicast packet) so I would ask for more information on this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 May 2013 16:56:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-treatment-by-asa/m-p/2259419#M349708</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-05-22T16:56:21Z</dc:date>
    </item>
    <item>
      <title>Packet treatment by asa</title>
      <link>https://community.cisco.com/t5/network-security/packet-treatment-by-asa/m-p/2259420#M349709</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello jcarvaja and Patrick&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your answers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ISA servers are using the same mac address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From ASA&lt;/P&gt;&lt;P&gt;ciscoasa/act# sh arp | i airisa&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PARTNERS airisa1 &lt;STRONG&gt;02bf.0a3c.046e &lt;/STRONG&gt;67&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PARTNERS airisa2 &lt;STRONG&gt;02bf.0a3c.046e &lt;/STRONG&gt;515&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From 6509&lt;/P&gt;&lt;P&gt;Koropi_6509#sh mac address-table dynamic address 02bf.0a3c.046e&lt;/P&gt;&lt;P&gt;Legend: * - primary entry&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; age - seconds since last seen&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; n/a - not available&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; vlan&amp;nbsp;&amp;nbsp; mac address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; type&amp;nbsp;&amp;nbsp;&amp;nbsp; learn&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; age&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ports&lt;/P&gt;&lt;P&gt;------+----------------+--------+-----+----------+--------------------------&lt;/P&gt;&lt;P&gt;No entries present.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since there is no entry for this mac i suppose the switch "floods" the packet and then ASA receives the packets and send back a RST to the originating server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you already mentioned the same-security-traffic command is not configured on ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding the inspection policy that Patrick mentioned. There is inspection policy (IPS on promiscuous mode) but is not applied to this interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What i don't understand is why ASA is replying to a packet that is not destined for ASA (different destination&amp;nbsp; MAC/IP).&lt;/P&gt;&lt;P&gt;Is this normal ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apostolos&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 May 2013 07:13:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-treatment-by-asa/m-p/2259420#M349709</guid>
      <dc:creator>olympicair</dc:creator>
      <dc:date>2013-05-23T07:13:13Z</dc:date>
    </item>
    <item>
      <title>Packet treatment by asa</title>
      <link>https://community.cisco.com/t5/network-security/packet-treatment-by-asa/m-p/2259421#M349710</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;Since there is no entry for this mac i suppose the switch "floods" the packet and then ASA receives the packets and send back a RST to the originating server.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Agree with you, this will be an unknown unicast packet so it will be flood it across the switch ports on the same vlan.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG&gt;What i don't understand is why ASA is replying to a packet that is not destined for ASA (different destination&amp;nbsp; MAC/IP).&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG&gt;Is this normal ??&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; We will need to check the NAT statements you have there because I am almost sure that there got to be a NAT statements that will create a proxy-arp rule for this traffic, that for me would be the only explanation (at least with the information provided so far)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My real question would be, why is the switch not learning the MAC address of those ISA servers?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 May 2013 16:26:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-treatment-by-asa/m-p/2259421#M349710</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-05-23T16:26:59Z</dc:date>
    </item>
    <item>
      <title>Re: Packet treatment by asa</title>
      <link>https://community.cisco.com/t5/network-security/packet-treatment-by-asa/m-p/2259422#M349711</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I believe that the packet for which the ASA sent RST has a destination MAC of the ASA, otherwise it would get dropped at&lt;/P&gt;&lt;P&gt; layer 2.&lt;/P&gt;&lt;P&gt;would you please post the ASA config and get captures that show the flooded packet and the RST packets at the ASA ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; capture cap interface &lt;INTERFACE name=""&gt;&lt;/INTERFACE&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; show capture cap detail&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i guess the switch behvaiour of not learning the the MAC is normal as it cannot learn the same MAC on two ports, probably the MAC entry keeps flapping, hence not appearing in CAM table.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;------------------ &lt;BR /&gt;Mashal Alshboul&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 May 2013 18:15:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-treatment-by-asa/m-p/2259422#M349711</guid>
      <dc:creator>malshbou</dc:creator>
      <dc:date>2013-05-23T18:15:42Z</dc:date>
    </item>
    <item>
      <title>Re: Packet treatment by asa</title>
      <link>https://community.cisco.com/t5/network-security/packet-treatment-by-asa/m-p/2259423#M349712</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mashal,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG&gt;i guess the switch behvaiour of not learning the the MAC is normal as it cannot learn the same MAC on two ports, probably the MAC entry keeps flapping, hence not appearing in CAM table.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif; min-height: 8pt; height: 8pt;"&gt;On these particular scenarios we relay on Network Load Balancing.... This allows the ISA servers to masquerade the cluster MAC address on a way that each member of the ISA cluster will have a dedicated MAC address..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif; min-height: 8pt; height: 8pt;"&gt;For further information check:&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif; min-height: 8pt; height: 8pt;"&gt;&lt;A href="http://www.cisco.com/en/US/products/hw/switches/ps708/products_configuration_example09186a0080a07203.shtml"&gt;http://www.cisco.com/en/US/products/hw/switches/ps708/products_configuration_example09186a0080a07203.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 May 2013 19:12:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-treatment-by-asa/m-p/2259423#M349712</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-05-23T19:12:59Z</dc:date>
    </item>
    <item>
      <title>Re: Packet treatment by asa</title>
      <link>https://community.cisco.com/t5/network-security/packet-treatment-by-asa/m-p/2259424#M349713</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Julio,&lt;/P&gt;&lt;P&gt;will this LB setup normally lead to two MAC addresses forwarded from different switch ports ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA seems seeing the same MAC addresses via the switch:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa/act# sh arp | i airisa&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PARTNERS airisa1 &lt;STRONG&gt;02bf.0a3c.046e &lt;/STRONG&gt;67&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PARTNERS airisa2 &lt;STRONG&gt;02bf.0a3c.046e &lt;/STRONG&gt;515&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;------------------ &lt;BR /&gt;Mashal Alshboul&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 May 2013 06:08:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-treatment-by-asa/m-p/2259424#M349713</guid>
      <dc:creator>malshbou</dc:creator>
      <dc:date>2013-05-24T06:08:33Z</dc:date>
    </item>
    <item>
      <title>Re: Packet treatment by asa</title>
      <link>https://community.cisco.com/t5/network-security/packet-treatment-by-asa/m-p/2259425#M349714</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mashal,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Exactly, Pointing to an issue in the deployment&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 May 2013 17:40:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/packet-treatment-by-asa/m-p/2259425#M349714</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-05-24T17:40:46Z</dc:date>
    </item>
  </channel>
</rss>

