<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA as default gw causing apps to fail in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-as-default-gw-causing-apps-to-fail/m-p/2199464#M360373</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;here is the solution&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 12 Mar 2013 19:49:34 GMT</pubDate>
    <dc:creator>dcambron</dc:creator>
    <dc:date>2013-03-12T19:49:34Z</dc:date>
    <item>
      <title>ASA as default gw causing apps to fail</title>
      <link>https://community.cisco.com/t5/network-security/asa-as-default-gw-causing-apps-to-fail/m-p/2199453#M360362</link>
      <description>&lt;P&gt;I have two gateways at my office.&amp;nbsp; 1.1.1.1 is an ASA that is the default gw assigned to all clients and is the device used for Internet access and to NAT external public IPs to internal public servers.&amp;nbsp; I have a second device 1.1.1.2 used for IPSec VPN to a handful of remote/home offices.&amp;nbsp; The ASA has a static route to 1.1.1.2 for these remote subnets.&amp;nbsp; Proxy ARP on internal private interface of ASA is disabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My problem is that users on the remote networks have trouble accessing applications on clients on the 1.1.1.0/24 network.&amp;nbsp; They can ping and traceroute OK to them but when they try to use RDP or file sharing they get erratic results.&amp;nbsp; Sometimes they can connect but most of the time the apps fail.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I manually configure the internal clients to use 1.1.1.2 as their gateway all trouble clears up and remote users report no problems.&amp;nbsp; Obviously this is not a solution because the internal guys lose Internet access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA is a 5505 model running 8.4(4)1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Diego&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:13:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-as-default-gw-causing-apps-to-fail/m-p/2199453#M360362</guid>
      <dc:creator>tato386</dc:creator>
      <dc:date>2019-03-12T01:13:19Z</dc:date>
    </item>
    <item>
      <title>ASA as default gw causing apps to fail</title>
      <link>https://community.cisco.com/t5/network-security/asa-as-default-gw-causing-apps-to-fail/m-p/2199454#M360363</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Why is proxy-arp disabled on the inside?&lt;/P&gt;&lt;P&gt;Does it make any difference if you enable it?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Mar 2013 17:52:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-as-default-gw-causing-apps-to-fail/m-p/2199454#M360363</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-03-12T17:52:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA as default gw causing apps to fail</title>
      <link>https://community.cisco.com/t5/network-security/asa-as-default-gw-causing-apps-to-fail/m-p/2199455#M360364</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You have these option.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;change DG to 1.1.1.2 and add a default route to 1.1.1.1 in your 1.1.1.2 device.&lt;/P&gt;&lt;P&gt;or In your ASA nat trafic from remote networks when going to 1.1.1.0/24 and nat trafic from 1.1.1.0/ when going to remote networks.&amp;nbsp; These is called u-turn you should permit traffic from same-sec int.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your last option that could work is disable TCP state check at the ASA or disable the stateful check at the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;saludos&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Mar 2013 18:22:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-as-default-gw-causing-apps-to-fail/m-p/2199455#M360364</guid>
      <dc:creator>dcambron</dc:creator>
      <dc:date>2013-03-12T18:22:39Z</dc:date>
    </item>
    <item>
      <title>ASA as default gw causing apps to fail</title>
      <link>https://community.cisco.com/t5/network-security/asa-as-default-gw-causing-apps-to-fail/m-p/2199456#M360365</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How many clients do you have behind your 5505? Can you post a show version, due to the volatile nature of your situation (sometimes it works, and sometimes it doesn't) it could be related to a license limitation with "inside hosts". Should be able to better tell once you provide this information. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Mar 2013 18:38:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-as-default-gw-causing-apps-to-fail/m-p/2199456#M360365</guid>
      <dc:creator>Gabriel Hill</dc:creator>
      <dc:date>2013-03-12T18:38:20Z</dc:date>
    </item>
    <item>
      <title>ASA as default gw causing apps to fail</title>
      <link>https://community.cisco.com/t5/network-security/asa-as-default-gw-causing-apps-to-fail/m-p/2199457#M360366</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; When I first installed the ASA I had all sorts of problems until I turned off the proxy arp on the inside interface. Except for this VPN/routing issue its been working well so I left it like that.&amp;nbsp; I can test enabling it during off hours I guess.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a Security Plus license with unlimited inside hosts among other feautres.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dcambron: I already have permit traffic from same security interface enabled.&amp;nbsp; Are you sure I have to use NAT for this to work???&amp;nbsp; Seems like a lot of trouble and the traffic is not crossing the ASA, just bouncing off it and sent to another device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Diego&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Mar 2013 18:51:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-as-default-gw-causing-apps-to-fail/m-p/2199457#M360366</guid>
      <dc:creator>tato386</dc:creator>
      <dc:date>2013-03-12T18:51:38Z</dc:date>
    </item>
    <item>
      <title>ASA as default gw causing apps to fail</title>
      <link>https://community.cisco.com/t5/network-security/asa-as-default-gw-causing-apps-to-fail/m-p/2199458#M360367</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The issue is Assymetric routing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can try to configure u-turn on the 1.1.1.1 ASA so it will send the traffic to the 1.1.1.2 when the destionation is one of the addresses on the other side of the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As dcambron mentioned, we have to configure u-turn on the unit.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Mar 2013 19:09:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-as-default-gw-causing-apps-to-fail/m-p/2199458#M360367</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-03-12T19:09:53Z</dc:date>
    </item>
    <item>
      <title>ASA as default gw causing apps to fail</title>
      <link>https://community.cisco.com/t5/network-security/asa-as-default-gw-causing-apps-to-fail/m-p/2199459#M360368</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Not clear what "u-turn" is.&amp;nbsp; Could there be another name for that technique?&amp;nbsp; Wouldn't the static route on the ASA cause it to send the traffic to 1.1.1.2?&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Diego&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Mar 2013 19:21:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-as-default-gw-causing-apps-to-fail/m-p/2199459#M360368</guid>
      <dc:creator>tato386</dc:creator>
      <dc:date>2013-03-12T19:21:44Z</dc:date>
    </item>
    <item>
      <title>ASA as default gw causing apps to fail</title>
      <link>https://community.cisco.com/t5/network-security/asa-as-default-gw-causing-apps-to-fail/m-p/2199460#M360369</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Problem is that TCP is stateful and the first packet (SYN) is beeing sent to the ASA. however the returning trafic (SYN Ack) is not, this packet is beeing sent to the clients directly (since the vpn device knows them). So from the ASA perspective only 1 packet from the 3way handshake TCP proccess was received. That is the reason why the TCP conexions are not working. ICMP is not stateful so it doesn't matter if the ASA doesn't see the ICMP Reply. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To solve the issue you should understand what is happening first. &lt;/P&gt;&lt;P&gt;So if you enable nat as I told you the returning traffic will be sent to the ASA (because only the ASA knows the nated network and the vpn device has a route to sent the traffic to the ASA) then the ASA will unNat and sent the traffic to the client at 1.1.1.0/24&amp;nbsp; and there you go the ASA is not terminating the tcp conections since it is seeing the whole transaction now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;try this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object group U-TURN&lt;/P&gt;&lt;P&gt;net 1.1.1.0&lt;/P&gt;&lt;P&gt;sub 1.1.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,inside) dynamic U-TURN interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security permit intra-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think that will allow trafic from 1.1.1.0 to remote networks but if you generate traffic from the remote networks I think you have to nat both networks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;there are some other option check this if that not works&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-17810"&gt;https://supportforums.cisco.com/docs/DOC-17810&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Mar 2013 19:27:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-as-default-gw-causing-apps-to-fail/m-p/2199460#M360369</guid>
      <dc:creator>dcambron</dc:creator>
      <dc:date>2013-03-12T19:27:26Z</dc:date>
    </item>
    <item>
      <title>ASA as default gw causing apps to fail</title>
      <link>https://community.cisco.com/t5/network-security/asa-as-default-gw-causing-apps-to-fail/m-p/2199461#M360370</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hairpinning&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Mar 2013 19:30:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-as-default-gw-causing-apps-to-fail/m-p/2199461#M360370</guid>
      <dc:creator>dcambron</dc:creator>
      <dc:date>2013-03-12T19:30:51Z</dc:date>
    </item>
    <item>
      <title>ASA as default gw causing apps to fail</title>
      <link>https://community.cisco.com/t5/network-security/asa-as-default-gw-causing-apps-to-fail/m-p/2199462#M360371</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Basically the issue is that the traffic is coming from 1.1.1.2, the return traffic sent to 1.1.1.1, which will then forward it to 1.1.1.2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This setup is definitely not the best, and will need some configuration on the 1.1.1.1 ASA to get it working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;U-turn aka Hairpinning will let the return traffic reach the 1.1.1.1 ASA and then forward that traffic to 1.1.1.2. Basically, the traffic enters and leaves the internal interface of the 1.1.1.1 unit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It will be necessary to configure TCP state-bypass on the 1.1.1.1 unit so we won't check the flags on the packet and avoid drops due to Asymmetric routing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;U-turn/Hairpinning&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://packetpushers.net/cisco-asa-8-38-4-hairpinning-nat-configuration/"&gt;http://packetpushers.net/cisco-asa-8-38-4-hairpinning-nat-configuration/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TCP state-bypass&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080b2d922.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080b2d922.shtml&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Mar 2013 19:32:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-as-default-gw-causing-apps-to-fail/m-p/2199462#M360371</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-03-12T19:32:33Z</dc:date>
    </item>
    <item>
      <title>ASA as default gw causing apps to fail</title>
      <link>https://community.cisco.com/t5/network-security/asa-as-default-gw-causing-apps-to-fail/m-p/2199463#M360372</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Config should look like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remote netwoks [example]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.10.10.0&lt;/P&gt;&lt;P&gt;10.10.11.0&lt;/P&gt;&lt;P&gt;10.10.12.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;1.1.1.1 ASA&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security permit intra-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object group Hairpinning&lt;/P&gt;&lt;P&gt;sub 1.1.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside,inside) dynamic interrface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Object-group network Remote-nets&lt;/P&gt;&lt;P&gt;network-object 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;network-object 10.10.11.0 255.255.255.0&lt;/P&gt;&lt;P&gt;network-object 10.10.12.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,inside) source static Remote-nets Remote-nets&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; TCP-state Bypass [still on the 1.1.1.1 ASA]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access-list TCP-BYPASS permit ip any object-group Remote-nets&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map TCP-BYPASS&lt;/P&gt;&lt;P&gt;match access-list TCP-BYPASS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Policy-map global_policy&lt;/P&gt;&lt;P&gt;class TCP-BYPASS &lt;/P&gt;&lt;P&gt;set connection advanced-options tcp-state-bypass&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Mar 2013 19:44:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-as-default-gw-causing-apps-to-fail/m-p/2199463#M360372</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-03-12T19:44:01Z</dc:date>
    </item>
    <item>
      <title>ASA as default gw causing apps to fail</title>
      <link>https://community.cisco.com/t5/network-security/asa-as-default-gw-causing-apps-to-fail/m-p/2199464#M360373</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;here is the solution&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Mar 2013 19:49:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-as-default-gw-causing-apps-to-fail/m-p/2199464#M360373</guid>
      <dc:creator>dcambron</dc:creator>
      <dc:date>2013-03-12T19:49:34Z</dc:date>
    </item>
    <item>
      <title>ASA as default gw causing apps to fail</title>
      <link>https://community.cisco.com/t5/network-security/asa-as-default-gw-causing-apps-to-fail/m-p/2199465#M360374</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks to dcambron and jocamare for the TCP bypass examples which fixed my problem.&amp;nbsp; I did not have to do any NAT stuff since my existing NAT statements use very specific interfaces and ACLs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Diego&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Mar 2013 01:48:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-as-default-gw-causing-apps-to-fail/m-p/2199465#M360374</guid>
      <dc:creator>tato386</dc:creator>
      <dc:date>2013-03-14T01:48:23Z</dc:date>
    </item>
  </channel>
</rss>

