<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5510 ACL issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-acl-issue/m-p/2243426#M350416</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your log message refers to the source IP address of 192.168.50.2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though it seems you have allowed traffic only for the source IP address 192.168.50.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 10 May 2013 01:10:19 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-05-10T01:10:19Z</dc:date>
    <item>
      <title>ASA 5510 ACL issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-acl-issue/m-p/2243417#M350404</link>
      <description>&lt;P&gt;Hi guys,&lt;BR /&gt;&lt;BR /&gt;I'm newbie in a FW matters, I need to apply some filters between our corporate network and our industrial networks (FTP traffic and some special ports for telnet matters). For that I'm using an ASA 5510 building a etherchannel with 3 of its Fa interfaces, over the main portchannel I set the corporate network access with a higher security level and the I created a few sub interfaces with a different VLAN each one and lower security level.&lt;BR /&gt;&lt;BR /&gt;Then I used some NAT configuration in order to go from the industrial network to some specific FTP server in the corporate network.&lt;BR /&gt;&lt;BR /&gt;When I try to use an ACL just to permit the FTP traffic inbound over the corporate interface all traffic is dropped by the global implicit rule to deny any to any traffic.&lt;BR /&gt;&lt;BR /&gt;Why can I do to enable the ftp traffic?&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;&lt;BR /&gt;G.Fuentes&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:39:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-acl-issue/m-p/2243417#M350404</guid>
      <dc:creator>fuenteslg</dc:creator>
      <dc:date>2019-03-12T01:39:48Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 ACL issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-acl-issue/m-p/2243418#M350407</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would be easier to go through this seeing the configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You say that you have configured a Etherchannel between the ASA and some other device. This means that you are atleast using software level 8.4(1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This in&amp;nbsp; turn means that you dont need any NAT configurations between your local interfaces UNLESS you specifically want to NAT some IP addresses or networks to something else.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the ACLs its important to remember that when your software level is equal or above 8.3(1) that you always use the hosts real IP address in the ACL rules even if you have configured NAT for it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 May 2013 13:12:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-acl-issue/m-p/2243418#M350407</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-07T13:12:30Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 ACL issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-acl-issue/m-p/2243419#M350409</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jouni,&lt;BR /&gt;&lt;BR /&gt;I'm sorry my scenario is:&lt;BR /&gt;&lt;BR /&gt;- EtherChannel is connect to a HP procurve switch&lt;BR /&gt;- ASA version: 9.0(2)&lt;BR /&gt;- ASDM version 7.1(2)&lt;BR /&gt;&lt;BR /&gt;In fact about my FTP server destination I setting a network object and I used it to created the ACL rule, in that case I must to forget it and create the ACL using the real IP address? Regarding security levels, is better to set a higher security level over my corporate network interface and leave a lower security level over the industrial network interfaces or maybe set the same security level for everyone? On the other hand I need to enable the traffic between interfaces with the same security level or it isn't necessary?&lt;BR /&gt;&lt;BR /&gt;Many thanks in advance for your comments.&lt;BR /&gt;&lt;BR /&gt;G.FUENTES.-&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 May 2013 03:16:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-acl-issue/m-p/2243419#M350409</guid>
      <dc:creator>fuenteslg</dc:creator>
      <dc:date>2013-05-08T03:16:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 ACL issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-acl-issue/m-p/2243420#M350410</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I personally would forget about the "security-level" values and just configure ACL for each interface and allow the connections which need to be allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you rely simply on the "security-level" value then you can consider it as a "Allow all or Deny all traffic" setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You either allow all connections from one interface to other or block all traffic from one interface to another. Meaning that higher "security-level" interfaces (or rather the networks behind them) can connect to any network located on a less secure interface of the ASA. Also all traffic from a lower "security-level" interface to a higher "security-level" interface would be blocked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Eventually to create a good access policy you will need to configure an ACL and at the point the "security-level" value looses its meaning. As soon as the ACL is attached to the interface, it starts to control what is allowed and what is blocked. The "security-level" wont determine that anymore.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to the actual ACL, you can use "object network" or "object-group" to hold the IP addresses or networks for which you want to deny or allow traffic. I just mean that in the case if you are using some NAT configurations on the ASA then you should always use the real/original IP address of the host in the ACL rules instead of the NAT IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would be easier to check the reason of the problem if we&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Saw the configurations&lt;/LI&gt;&lt;LI&gt;Knew the host IP address that is connecting to the FTP server&lt;/LI&gt;&lt;LI&gt;Knew the IP address of the FTP server&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 May 2013 03:25:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-acl-issue/m-p/2243420#M350410</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-08T03:25:32Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 ACL issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-acl-issue/m-p/2243421#M350411</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;Just for clarify about security level, I can leave i.e. 0 for all interfaces and set the security trough ACL, I'm corrected? Well in that scenario I did the test I mean, all interfaces with the same security level, ACL using the real IP address trough network objects and always the package is dropped by the implicit ACL because the ACL that I did doesn't match.&lt;BR /&gt;&lt;BR /&gt;I created de ACL rule over the my corporate network interface on in access permitting the traffic from one of my industrial network to my FTP server and the result is the same that I described over.&lt;BR /&gt;&lt;BR /&gt;what I'm missing?&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 May 2013 03:45:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-acl-issue/m-p/2243421#M350411</guid>
      <dc:creator>fuenteslg</dc:creator>
      <dc:date>2013-05-08T03:45:13Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 ACL issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-acl-issue/m-p/2243422#M350412</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are a couple of special settings on the ASA related to the "security-level" that always apply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have traffic between interfaces with equal "security-level" you will need&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;same-security-traffic permit inter-interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have traffic that is entering an ASA interface and leaves through the same interface then you need&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;same-security-traffic permit intra-interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though the latter one is usually used with VPN connections that need to enter the ASA through "outside" and leave to the Internet (or another L2L VPN remote site) through the "outside"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I personally configure LAN interfaces usually with "security-level 100" and WAN interfaces with "security-level 0".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 May 2013 03:53:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-acl-issue/m-p/2243422#M350412</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-08T03:53:07Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 ACL issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-acl-issue/m-p/2243423#M350413</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;I got it, in my case all interfaces will be like a LAN, the ASA will be used to protect our corporate network because the industrial one doesn't have any protection in terms of antivirus, OS patch, etc. for that reason I need only permit the FTP and some IP ports from industrial to corporate nothing else. On this scenario I need to apply some ACL over the industrial interface about outbound traffic?&lt;BR /&gt;&lt;BR /&gt;I'm sorry if my questions are too basic.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;&lt;BR /&gt;G.FUENTES.-&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 May 2013 04:07:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-acl-issue/m-p/2243423#M350413</guid>
      <dc:creator>fuenteslg</dc:creator>
      <dc:date>2013-05-08T04:07:43Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 ACL issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-acl-issue/m-p/2243424#M350414</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have for example had some simple firewall configurations between Automation and Office networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There might be an ASA with no NAT configurations at all and we only allow certain traffic in and certain traffic out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically your ACL can look like this with just the FTP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INDUSTRIAL-IN remark Allow FTP to Corporate Network&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INDUSTRIAL-IN permit tcp host &lt;IND. host="" ip=""&gt; host &lt;CORP. host="" ip=""&gt; eq ftp&lt;/CORP.&gt;&lt;/IND.&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INDUSTRIAL-IN remark Deny All other traffic&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INDUSTRIAL-IN deny ip &lt;IND. network=""&gt; &lt;MASK&gt; any&lt;/MASK&gt;&lt;/IND.&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you wanted to add DNS to some internal or external server then it could be&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INDUSTRIAL-IN remark Allow FTP and DNS to Corporate Network&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INDUSTRIAL-IN permit tcp host &lt;IND. host="" ip=""&gt; host &lt;CORP. host="" ip=""&gt; eq ftp&lt;/CORP.&gt;&lt;/IND.&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INDUSTRIAL-IN permit udp host &lt;IND. host="" ip=""&gt; host &lt;CORP. host="" ip=""&gt; eq domain&lt;/CORP.&gt;&lt;/IND.&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INDUSTRIAL-IN remark Deny All other traffic&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INDUSTRIAL-IN deny ip &lt;IND. network=""&gt; &lt;MASK&gt; any&lt;/MASK&gt;&lt;/IND.&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the same way you could open services between hosts or even networks if you needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could also need to add the ACL to the interface with the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group INDUSTRIAL-IN in interface industrial&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ofcourse the names of ACL and interface might be something else&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But to be honest as I dont know your current NAT and ACL configurations I cant really help you if you still have problems with the FTP connection through the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 May 2013 04:53:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-acl-issue/m-p/2243424#M350414</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-08T04:53:48Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 ACL issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-acl-issue/m-p/2243425#M350415</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I followed your advice but it doesn't works, please see below my configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 9.0(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ASA-CO0011-VASCH-01&lt;/P&gt;&lt;P&gt;enable password 792XWCseaD5YPLGJ encrypted&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any4 any6&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any6 any4&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any6 any6&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any4 any4 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any4 any6 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any6 any4 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any6 any6 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session permit tcp any4 any4&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;channel-group 20 mode active&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;channel-group 20 mode active&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;channel-group 20 mode active&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt;management-only&lt;/P&gt;&lt;P&gt;nameif management&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Port-channel20&lt;/P&gt;&lt;P&gt;nameif SG_Net&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 10.200.5.19 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Port-channel20.40&lt;/P&gt;&lt;P&gt;description VLAN for YK DCS&lt;/P&gt;&lt;P&gt;vlan 40&lt;/P&gt;&lt;P&gt;nameif YOK_VLAN&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.30.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Port-channel20.50&lt;/P&gt;&lt;P&gt;description VLAN for BT Line&lt;/P&gt;&lt;P&gt;vlan 50&lt;/P&gt;&lt;P&gt;nameif BOT_VLAN&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.40.1 255.255.255.192&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Port-channel20.60&lt;/P&gt;&lt;P&gt;vlan 60&lt;/P&gt;&lt;P&gt;nameif COG_VLAN&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 192.168.50.1 255.255.255.192&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa902-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone COST -5&lt;/P&gt;&lt;P&gt;object service SMQF_YK_Connect&lt;/P&gt;&lt;P&gt;service tcp destination range 10300 10310&lt;/P&gt;&lt;P&gt;object network obj-192.168.30.30&lt;/P&gt;&lt;P&gt;host 192.168.30.30&lt;/P&gt;&lt;P&gt;object network obj-192.168.30.2&lt;/P&gt;&lt;P&gt;host 192.168.30.2&lt;/P&gt;&lt;P&gt;object network obj-192.168.30.3&lt;/P&gt;&lt;P&gt;host 192.168.30.3&lt;/P&gt;&lt;P&gt;object network SG_Antares_SMQF_Server&lt;/P&gt;&lt;P&gt;host 10.200.5.22&lt;/P&gt;&lt;P&gt;description Antares SMQF Server&lt;/P&gt;&lt;P&gt;object network YK_FTP&lt;/P&gt;&lt;P&gt;host 192.168.30.30&lt;/P&gt;&lt;P&gt;object network obj-192.168.40.2&lt;/P&gt;&lt;P&gt;host 192.168.40.2&lt;/P&gt;&lt;P&gt;object network SG_FIS_Server&lt;/P&gt;&lt;P&gt;host 10.200.5.20&lt;/P&gt;&lt;P&gt;description FIS Server for labeling&lt;/P&gt;&lt;P&gt;object service ANTARES_CG_Connnect&lt;/P&gt;&lt;P&gt;service tcp destination range 20301 20302&lt;/P&gt;&lt;P&gt;object network obj-192.168.50.3&lt;/P&gt;&lt;P&gt;host 192.168.50.3&lt;/P&gt;&lt;P&gt;object-group icmp-type ping-service&lt;/P&gt;&lt;P&gt;description allow ping&lt;/P&gt;&lt;P&gt;icmp-object echo&lt;/P&gt;&lt;P&gt;object-group service grp_SMQF tcp&lt;/P&gt;&lt;P&gt;port-object range 10300 10310&lt;/P&gt;&lt;P&gt;object-group service grp_ANTARES_CG tcp&lt;/P&gt;&lt;P&gt;port-object range 20301 20302&lt;/P&gt;&lt;P&gt;access-list ACL_SMQF extended permit object SMQF_YK_Connect 192.168.30.0 255.255.255.0 object SG_Antares_SMQ&lt;/P&gt;&lt;P&gt;access-list ACL_SMQF extended permit tcp 192.168.30.0 255.255.255.0 object SG_Antares_SMQF_Server eq ftp&lt;/P&gt;&lt;P&gt;access-list ACL_FIS extended permit tcp 192.168.40.0 255.255.255.192 object SG_FIS_Server eq ftp&lt;/P&gt;&lt;P&gt;access-list ACL_COGX extended permit tcp 192.168.50.0 255.255.255.192 object SG_Antares_SMQF_Server object&lt;/P&gt;&lt;P&gt;access-list ACL_COGX-IN remark Allow TCP Ports 20301-20302 to SGNet&lt;/P&gt;&lt;P&gt;access-list ACL_COGX-IN extended permit tcp host 192.168.50.2 host 10.200.5.22 eq 20301&lt;/P&gt;&lt;P&gt;access-list ACL_COGX-IN extended permit tcp host 192.168.50.2 host 10.200.5.22 eq 20302&lt;/P&gt;&lt;P&gt;access-list ACL_COGX-IN extended permit tcp host 192.168.50.3 host 10.200.5.22 eq ftp&lt;/P&gt;&lt;P&gt;access-list ACL_COGX-IN remark Deny All other trafic&lt;/P&gt;&lt;P&gt;access-list ACL_COGX-IN extended deny ip 192.168.50.0 255.255.255.192 any&lt;/P&gt;&lt;P&gt;access-list ACL_ANTARES extended permit ip 192.168.40.0 255.255.255.192 object SG_Antares_SMQF_Server&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm debugging&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;mtu SG_Net 1500&lt;/P&gt;&lt;P&gt;mtu YOK_VLAN 1500&lt;/P&gt;&lt;P&gt;mtu BOT_VLAN 1500&lt;/P&gt;&lt;P&gt;mtu COG_VLAN 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-712.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj-192.168.30.30&lt;/P&gt;&lt;P&gt;nat (YOK_VLAN,SG_Net) static 10.200.5.225 net-to-net&lt;/P&gt;&lt;P&gt;object network obj-192.168.30.2&lt;/P&gt;&lt;P&gt;nat (YOK_VLAN,SG_Net) static 10.200.5.225 net-to-net&lt;/P&gt;&lt;P&gt;object network obj-192.168.30.3&lt;/P&gt;&lt;P&gt;nat (YOK_VLAN,SG_Net) static 10.200.5.225 net-to-net&lt;/P&gt;&lt;P&gt;object network obj-192.168.40.2&lt;/P&gt;&lt;P&gt;nat (BOT_VLAN,SG_Net) static 10.200.5.226 net-to-net&lt;/P&gt;&lt;P&gt;access-group ACL_COGX-IN in interface COG_VLAN&lt;/P&gt;&lt;P&gt;route SG_Net 0.0.0.0 0.0.0.0 10.200.5.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association pmtu-aging infinite&lt;/P&gt;&lt;P&gt;crypto ca trustpool policy&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ntp server 10.201.1.39 source SG_Net prefer&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptochecksum:e64886d2e1d1e3449721b3aa0944bfd0&lt;/P&gt;&lt;P&gt;: end ASA Version 9.0(2)&lt;BR /&gt;!&lt;BR /&gt;hostname ASA-CO0011-VASCH-01&lt;BR /&gt;enable password 792XWCseaD5YPLGJ encrypted&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;xlate per-session permit tcp any4 any4&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;channel-group 20 mode active&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;channel-group 20 mode active&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;channel-group 20 mode active&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;management-only&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;&lt;STRONG&gt;interface Port-channel20 (Corporate)&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;nameif SG_Net&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;security-level 0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;ip address 10.200.5.19 255.255.255.0&lt;/STRONG&gt;&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel20.40&lt;BR /&gt;description VLAN for YK DCS&lt;BR /&gt;vlan 40&lt;BR /&gt;nameif YOK_VLAN&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.30.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel20.50&lt;BR /&gt;description VLAN for BT Line&lt;BR /&gt;vlan 50&lt;BR /&gt;nameif BOT_VLAN&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.40.1 255.255.255.192&lt;BR /&gt;!&lt;BR /&gt;&lt;STRONG&gt;interface Port-channel20.60 (Industrial)&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;vlan 60&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;nameif COG_VLAN&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;security-level 0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;ip address 192.168.50.1 255.255.255.192&lt;/STRONG&gt;&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa902-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone COST -5&lt;BR /&gt;object service SMQF_YK_Connect&lt;BR /&gt;service tcp destination range 10300 10310&lt;BR /&gt;object network obj-192.168.30.30&lt;BR /&gt;host 192.168.30.30&lt;BR /&gt;object network obj-192.168.30.2&lt;BR /&gt;host 192.168.30.2&lt;BR /&gt;object network obj-192.168.30.3&lt;BR /&gt;host 192.168.30.3&lt;BR /&gt;object network SG_Antares_SMQF_Server&lt;BR /&gt;host 10.200.5.22&lt;BR /&gt;description Antares SMQF Server&lt;BR /&gt;object network YK_FTP&lt;BR /&gt;host 192.168.30.30&lt;BR /&gt;object network obj-192.168.40.2&lt;BR /&gt;host 192.168.40.2&lt;BR /&gt;object network SG_FIS_Server&lt;BR /&gt;host 10.200.5.20&lt;BR /&gt;description FIS Server for labeling&lt;BR /&gt;object service ANTARES_CG_Connnect&lt;BR /&gt;service tcp destination range 20301 20302&lt;BR /&gt;object network obj-192.168.50.3&lt;BR /&gt;host 192.168.50.3&lt;BR /&gt;object-group icmp-type ping-service&lt;BR /&gt;description allow ping&lt;BR /&gt;icmp-object echo&lt;BR /&gt;object-group service grp_SMQF tcp&lt;BR /&gt;port-object range 10300 10310&lt;BR /&gt;object-group service grp_ANTARES_CG tcp&lt;BR /&gt;port-object range 20301 20302&lt;BR /&gt;access-list ACL_SMQF extended permit object SMQF_YK_Connect 192.168.30.0 255.255.255.0 object SG_Antares_SMQ&lt;BR /&gt;access-list ACL_SMQF extended permit tcp 192.168.30.0 255.255.255.0 object SG_Antares_SMQF_Server eq ftp&lt;BR /&gt;access-list ACL_FIS extended permit tcp 192.168.40.0 255.255.255.192 object SG_FIS_Server eq ftp&lt;BR /&gt;access-list ACL_COGX extended permit tcp 192.168.50.0 255.255.255.192 object SG_Antares_SMQF_Server object&lt;BR /&gt;&lt;STRONG&gt;access-list ACL_COGX-IN remark Allow TCP Ports 20301-20302 and ftp to SGNet&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;access-list ACL_COGX-IN extended permit tcp host 192.168.50.3 host 10.200.5.22 eq 20301&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;access-list ACL_COGX-IN extended permit tcp host 192.168.50.3 host 10.200.5.22 eq 20302&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;access-list ACL_COGX-IN extended permit tcp host 192.168.50.3 host 10.200.5.22 eq ftp&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;access-list ACL_COGX-IN remark Deny All other trafic&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;access-list ACL_COGX-IN extended deny ip 192.168.50.0 255.255.255.192 any&lt;/STRONG&gt;&lt;BR /&gt;access-list ACL_ANTARES extended permit ip 192.168.40.0 255.255.255.192 object SG_Antares_SMQF_Server&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm debugging&lt;BR /&gt;mtu management 1500&lt;BR /&gt;mtu SG_Net 1500&lt;BR /&gt;mtu YOK_VLAN 1500&lt;BR /&gt;mtu BOT_VLAN 1500&lt;BR /&gt;mtu COG_VLAN 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-712.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network obj-192.168.30.30&lt;BR /&gt;nat (YOK_VLAN,SG_Net) static 10.200.5.225 net-to-net&lt;BR /&gt;object network obj-192.168.30.2&lt;BR /&gt;nat (YOK_VLAN,SG_Net) static 10.200.5.225 net-to-net&lt;BR /&gt;object network obj-192.168.30.3&lt;BR /&gt;nat (YOK_VLAN,SG_Net) static 10.200.5.225 net-to-net&lt;BR /&gt;object network obj-192.168.40.2&lt;BR /&gt;nat (BOT_VLAN,SG_Net) static 10.200.5.226 net-to-net&lt;BR /&gt;&lt;STRONG&gt;access-group ACL_COGX-IN in interface COG_VLAN&lt;/STRONG&gt;&lt;BR /&gt;route SG_Net 0.0.0.0 0.0.0.0 10.200.5.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.1.0 255.255.255.0 management&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 10.201.1.39 source SG_Net prefer&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:e64886d2e1d1e3449721b3aa0944bfd0&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when I check the log viewer follow the IP source the message is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Syslog ID: 106001&lt;/P&gt;&lt;P&gt;Description: Inbound TCP Connection denied from 192.168.50.2/1065 to 10.200.5.22/21 flags SYN on interface COG_VLAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll apreciate your comments about it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;G.FUENTES.-&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 May 2013 01:02:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-acl-issue/m-p/2243425#M350415</guid>
      <dc:creator>fuenteslg</dc:creator>
      <dc:date>2013-05-10T01:02:45Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 ACL issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-acl-issue/m-p/2243426#M350416</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your log message refers to the source IP address of 192.168.50.2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though it seems you have allowed traffic only for the source IP address 192.168.50.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 May 2013 01:10:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-acl-issue/m-p/2243426#M350416</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-10T01:10:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 ACL issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-acl-issue/m-p/2243427#M350417</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Actually,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems your source and destination interface are of the same &lt;STRONG&gt;"security-level 0"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you add the following configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;same-security-traffic permit inter-interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or you can change the "security-level" value of the source interface (for example) to something else then "0" and it should probably work.&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 May 2013 01:15:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-acl-issue/m-p/2243427#M350417</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-10T01:15:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 ACL issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-acl-issue/m-p/2243428#M350418</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, it was my typing mistake, the address is ending in .3&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 May 2013 01:23:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-acl-issue/m-p/2243428#M350418</guid>
      <dc:creator>fuenteslg</dc:creator>
      <dc:date>2013-05-10T01:23:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 ACL issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-acl-issue/m-p/2243429#M350419</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In fact I tried with that configuration and nothing happen. Same result. I don't know if is necessary put some static route, maybe.&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 May 2013 01:25:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-acl-issue/m-p/2243429#M350419</guid>
      <dc:creator>fuenteslg</dc:creator>
      <dc:date>2013-05-10T01:25:10Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 ACL issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-acl-issue/m-p/2243430#M350420</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you take the output of this command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input GOC_VLAN tcp 192.168.50.3 12345 10.200.5.22 21&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would simulate the packet coming from the specified source interface with the specified protocol with the mentioned source/destination IP addresses and ports. Its a great tool to find out what the firewall WOULD do to a connections and IS doing at the moment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to your current setup it seems that there is no NAT configured for the source host 192.168.50.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would mean that the FTP server should have a route towards the network 192.168.50.0/24 that in the end is found through the interface IP address of the ASA interface named &lt;STRONG&gt;SG_Net&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or alternatively you could use Dynamic PAT or Static NAT to translate it to the destination interfaces connected networks IP address (if that is a network that the FTP server has a route for)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 May 2013 01:29:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-acl-issue/m-p/2243430#M350420</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-10T01:29:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 ACL issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-acl-issue/m-p/2243431#M350421</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'll check it, for now the access-group is well applied over the industrial interface or bust be applied over corporate interface?&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 May 2013 01:50:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-acl-issue/m-p/2243431#M350421</guid>
      <dc:creator>fuenteslg</dc:creator>
      <dc:date>2013-05-10T01:50:15Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 ACL issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-acl-issue/m-p/2243432#M350422</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACL is now attached to the interface &lt;STRONG&gt;GOC_VLAN&lt;/STRONG&gt; in the direction &lt;STRONG&gt;"in"&lt;/STRONG&gt; so it should we controlling traffic incoming from network 192.168.50.0/26 to other networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But coming back to the &lt;STRONG&gt;"security-level"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will have to have a either &lt;STRONG&gt;"same-security-traffic permit inter-interface"&lt;/STRONG&gt; command or change the &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; so that they are not equal to eachother.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you copy/paste the output of the above &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command here? It should tell us if the ASA configurations are ok&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also one configuration that hits my eye is the fact that SG_Net interface is configured directly on the Port-channel20 interface. I would configure it as a own VlanID as Sub Interface of Po20.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 May 2013 02:20:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-acl-issue/m-p/2243432#M350422</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-10T02:20:31Z</dc:date>
    </item>
  </channel>
</rss>

