<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Checking traffic from ASA  using ASDM in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/checking-traffic-from-asa-using-asdm/m-p/2155068#M358682</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried packet type as UDP then &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;source port as syslog as i do not have port numbers to choose from just names.&lt;/P&gt;&lt;P&gt;destination port as dnsix thats closest one i found&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here is result&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;output interface shows&amp;nbsp; ? ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;info shows&amp;nbsp; virtual firewall classification failed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 08 Apr 2013 18:28:54 GMT</pubDate>
    <dc:creator>mahesh18</dc:creator>
    <dc:date>2013-04-08T18:28:54Z</dc:date>
    <item>
      <title>Checking traffic from ASA  using ASDM</title>
      <link>https://community.cisco.com/t5/network-security/checking-traffic-from-asa-using-asdm/m-p/2155066#M358680</link>
      <description>&lt;P&gt;Hi everyone.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to check if our ASA&amp;nbsp; allows access to IP 192.168.x.x&amp;nbsp; which is DNS&amp;nbsp; server at remote site.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I try the packet tracer&amp;nbsp; and choose the interface and source and destination IP.&lt;/P&gt;&lt;P&gt;What&amp;nbsp; source and destination port i choose while using the ASDM?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:25:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/checking-traffic-from-asa-using-asdm/m-p/2155066#M358680</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2019-03-12T01:25:05Z</dc:date>
    </item>
    <item>
      <title>Re: Checking traffic from ASA  using ASDM</title>
      <link>https://community.cisco.com/t5/network-security/checking-traffic-from-asa-using-asdm/m-p/2155067#M358681</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The source port can be any random UDP port. The destination port will be UDP/53 if you are testing if DNS querys will pass the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The source interface will naturally be the interface on the ASA where the host initiating that connection will be.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Apr 2013 18:20:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/checking-traffic-from-asa-using-asdm/m-p/2155067#M358681</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-08T18:20:03Z</dc:date>
    </item>
    <item>
      <title>Checking traffic from ASA  using ASDM</title>
      <link>https://community.cisco.com/t5/network-security/checking-traffic-from-asa-using-asdm/m-p/2155068#M358682</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried packet type as UDP then &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;source port as syslog as i do not have port numbers to choose from just names.&lt;/P&gt;&lt;P&gt;destination port as dnsix thats closest one i found&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here is result&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;output interface shows&amp;nbsp; ? ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;info shows&amp;nbsp; virtual firewall classification failed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Apr 2013 18:28:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/checking-traffic-from-asa-using-asdm/m-p/2155068#M358682</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-04-08T18:28:54Z</dc:date>
    </item>
    <item>
      <title>Checking traffic from ASA  using ASDM</title>
      <link>https://community.cisco.com/t5/network-security/checking-traffic-from-asa-using-asdm/m-p/2155069#M358684</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are running multiple context, based on the traffic patterns the ASA will not be able to determine out which interface to send the traffic,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: The source port can be any random port ( from 1025 and higher) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Apr 2013 18:33:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/checking-traffic-from-asa-using-asdm/m-p/2155069#M358684</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-04-08T18:33:26Z</dc:date>
    </item>
    <item>
      <title>Checking traffic from ASA  using ASDM</title>
      <link>https://community.cisco.com/t5/network-security/checking-traffic-from-asa-using-asdm/m-p/2155070#M358686</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The message you are getting would seem to hint to a situation where you are using Multiple Context Mode&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you use CLI connection instead and go to the Security Context where the host is located and use the packet-tracer command there?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input &lt;SOURCE interface=""&gt; udp &lt;SOURCE host=""&gt; 12345 &lt;DESTINATION host=""&gt; 53&lt;/DESTINATION&gt;&lt;/SOURCE&gt;&lt;/SOURCE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And copy/paste the output here&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Apr 2013 18:36:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/checking-traffic-from-asa-using-asdm/m-p/2155070#M358686</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-08T18:36:38Z</dc:date>
    </item>
    <item>
      <title>Checking traffic from ASA  using ASDM</title>
      <link>https://community.cisco.com/t5/network-security/checking-traffic-from-asa-using-asdm/m-p/2155071#M358688</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see the ASA&amp;nbsp; as two context admin and other is b.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also on ASDM ther are no port numbers to choose from it has names only.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you mean to say there is no way for me to check if ASA&amp;nbsp; allows access to remote DNS&amp;nbsp; server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Apr 2013 18:43:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/checking-traffic-from-asa-using-asdm/m-p/2155071#M358688</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-04-08T18:43:17Z</dc:date>
    </item>
    <item>
      <title>Checking traffic from ASA  using ASDM</title>
      <link>https://community.cisco.com/t5/network-security/checking-traffic-from-asa-using-asdm/m-p/2155072#M358690</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On ASDM you can type the port number,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now in this case the connection is actually failling because of the fact the ASA is not being able to determine where to send the packet,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share the entire packet tracer output&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Apr 2013 18:46:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/checking-traffic-from-asa-using-asdm/m-p/2155072#M358690</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-04-08T18:46:00Z</dc:date>
    </item>
    <item>
      <title>Checking traffic from ASA  using ASDM</title>
      <link>https://community.cisco.com/t5/network-security/checking-traffic-from-asa-using-asdm/m-p/2155073#M358692</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would still suggest using the CLI&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First moving to the context "b" if the host is located behind it&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;changeto context b&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then using the packet-tracer command (insert the IP addresses and interface name)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input &lt;SOURCE interface=""&gt; udp &lt;SOURCE host=""&gt; 12345 &lt;DESTINATION host=""&gt; 53&lt;/DESTINATION&gt;&lt;/SOURCE&gt;&lt;/SOURCE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should give you the output of what happens to the traffic/connection. And its alot easier to copy/paste directly here on the forums.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Apr 2013 18:46:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/checking-traffic-from-asa-using-asdm/m-p/2155073#M358692</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-08T18:46:55Z</dc:date>
    </item>
    <item>
      <title>Checking traffic from ASA  using ASDM</title>
      <link>https://community.cisco.com/t5/network-security/checking-traffic-from-asa-using-asdm/m-p/2155074#M358694</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I only know user PC&amp;nbsp; IP&amp;nbsp; and its subnet i checked on both context of ASA&amp;nbsp; it does not have that subnet range.&lt;/P&gt;&lt;P&gt;so does not know which interface to choose from both the contexts?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Apr 2013 18:55:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/checking-traffic-from-asa-using-asdm/m-p/2155074#M358694</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-04-08T18:55:19Z</dc:date>
    </item>
    <item>
      <title>Checking traffic from ASA  using ASDM</title>
      <link>https://community.cisco.com/t5/network-security/checking-traffic-from-asa-using-asdm/m-p/2155075#M358696</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally you will have to first find the firewall which handles the connections to the remote site for this host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After that we can try out the "packet-tracer"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use the "show route" command on each firewall context to show the routing table of that firewall to see if the network/subnet of the host is located behind the said firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Apr 2013 18:58:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/checking-traffic-from-asa-using-asdm/m-p/2155075#M358696</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-08T18:58:15Z</dc:date>
    </item>
  </channel>
</rss>

