<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic FWSM Linux Issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fwsm-linux-issue/m-p/2087555#M393856</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;By the way,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have some Active/Standby FWSM setup between 2 FWSMs?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also why doesnt the "SHARED" interface have a secondary IP address configured but the others do?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 22 Dec 2012 17:14:21 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2012-12-22T17:14:21Z</dc:date>
    <item>
      <title>FWSM Linux Issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-linux-issue/m-p/2087551#M393849</link>
      <description>&lt;P&gt;Hey Guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You've been very helpful in the past for me, and was wondering if you guys have seen this issue before. We run a 6500 with an FWSM with multiple security contexts as well as cacading contexts with a "shared VLAN"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a problem with regards to Linux machines and our shared network. For example, we have three Linux machines in production, each in three separate VLANs. For me to communicate to these boxes from one VLAN to another I must first ping the server. If I do not ping the server it will not bring up a connection like ssh or http, etc. Below is the error I get from the FWSM that hosts the Linux server, but like I said once I ping the server the error goes away. We only have this problem with Linux machines, and it is a problem for all three of them. Is the FWSM having issues understanding something with all three Linux boxes? Below is the error I get at first, when I try to SSH from one VLAN to another VLAN with the Linux machine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="0" cellpadding="0" style="padding: px;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P&gt;&lt;STRONG&gt;6&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P&gt;&lt;STRONG&gt;Dec 21 2012&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P&gt;&lt;STRONG&gt;16:33:54&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P&gt;&lt;STRONG&gt;106015&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P&gt;&lt;STRONG&gt;10.255.12.109&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P&gt;&lt;STRONG&gt;22&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P&gt;&lt;STRONG&gt;10.255.1.30&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P&gt;&lt;STRONG&gt;63000&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P&gt;&lt;STRONG&gt;Deny TCP (no connection) from 10.255.12.109/22 to 10.255.1.30/63000 flags SYN ACK on interface inside&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is what happens when I initiate a ping to the Linux Server and then ssh again. Notice it builds the connection with no problem after the ping. During the ping it builds the dynamic translation, and then when I ssh it builds the TCP connection. Do you know why this could be?&lt;/P&gt;&lt;TABLE border="0" cellpadding="0" style="padding: px;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P&gt;&lt;STRONG&gt;6&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P&gt;&lt;STRONG&gt;Dec 21 2012&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P&gt;&lt;STRONG&gt;16:35:08&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P&gt;&lt;STRONG&gt;305009&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P&gt;&lt;STRONG&gt;10.255.12.109&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P&gt;&lt;STRONG&gt;10.255.12.109&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P&gt;&lt;STRONG&gt;Built dynamic translation from inside:10.255.12.109 to SHARED:10.255.12.109&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P&gt;&lt;STRONG&gt;6&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P&gt;&lt;STRONG&gt;Dec 21 2012&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P&gt;&lt;STRONG&gt;16:35:17&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P&gt;&lt;STRONG&gt;302013&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P&gt;&lt;STRONG&gt;10.255.1.30&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P&gt;&lt;STRONG&gt;63073&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P&gt;&lt;STRONG&gt;10.255.12.109&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P&gt;&lt;STRONG&gt;22&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P&gt;&lt;STRONG&gt;Built inbound TCP connection 144979159621177275 for SHARED:10.255.1.30/63073 (10.255.1.30/63073) to inside:10.255.12.109/22 (10.255.12.109/22)&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Thank you in advance for any help!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:39:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-linux-issue/m-p/2087551#M393849</guid>
      <dc:creator>John Apricena</dc:creator>
      <dc:date>2019-03-12T00:39:57Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM Linux Issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-linux-issue/m-p/2087552#M393851</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a post on the first page of this forum section that has abit similiar logoutput when trying connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But it almost seems to me that when you attempt the connection at first the initial connection attempt to the server has gone through (by some other route than the firewall) but the reply (SYN ACK)) to that TCP connection forming (SYN) is coming through the FWSM Context which in turn gets blocked as it hasnt seen the SYN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I find the NAT log line abit wierd too.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you share configurations related to one context?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not sure if I can be of help but could always look through the configurations if there is something there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 22 Dec 2012 14:35:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-linux-issue/m-p/2087552#M393851</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-12-22T14:35:48Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM Linux Issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-linux-issue/m-p/2087553#M393854</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jouni, thanks for the response!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've pasted the configs of both FWSM's below. I've omitted most of the uneeded config to try to simplify it for you. The packets should not be getting filtered by the FWSM, as you wil see in the configs the "shared" traffic routes to 10.255.255.2 which is the 6500 not the FWSM. Again, just to let you know we only have this issue with Linux boxes, but we have this same issue with three different Linux Machines, with different versions of OS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;NYSPAL03FW02-PRIMARY/FWSM1# show run&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;FWSM Version 4.1(5) &lt;CONTEXT&gt;&lt;/CONTEXT&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan105&lt;/P&gt;&lt;P&gt; nameif SHARED&lt;/P&gt;&lt;P&gt; security-level 90&lt;/P&gt;&lt;P&gt; ip address 10.255.255.12 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan12&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.255.12.1 255.255.255.0 standby 10.255.12.2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan212&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.96.49 255.255.255.248 standby 192.168.96.50&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list INSIDE_IN extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list INSIDE_IN extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list SHARED_IN extended permit ip any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu SHARED 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;icmp permit any SHARED&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 x.x.x.x&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.255.12.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-group SHARED_IN in interface SHARED&lt;/P&gt;&lt;P&gt;access-group INSIDE_IN in interface inside&lt;/P&gt;&lt;P&gt;access-group OUTSIDE_IN in interface outside&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route SHARED 10.255.1.0 255.255.255.0 10.255.255.2 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.96.51 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 1:00:00 h225 1:00:00 mgcp 0:05:00&lt;/P&gt;&lt;P&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout pptp-gre 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns maximum-length 512&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;NYSPAL03FW02-PRIMARY/FWSM2# show run&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;FWSM Version 4.1(5) &lt;CONTEXT&gt;&lt;/CONTEXT&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan10&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.255.1.1 255.255.255.0 standby 10.255.1.2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan105&lt;/P&gt;&lt;P&gt; nameif SHARED&lt;/P&gt;&lt;P&gt; security-level 90&lt;/P&gt;&lt;P&gt; ip address 10.255.255.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan150&lt;/P&gt;&lt;P&gt; nameif EDGE&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.255.150.1 255.255.255.0 standby 10.255.150.2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan210&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.96.1 255.255.255.248 standby 192.168.96.2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list EDGE_IN extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list EDGE_IN extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list SHARED_IN extended permit ip any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging monitor debugging&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging asdm debugging&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu SHARED 1500&lt;/P&gt;&lt;P&gt;mtu EDGE 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;icmp permit any SHARED&lt;/P&gt;&lt;P&gt;icmp permit any EDGE&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 x.x.x.x&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.255.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-group INSIDE_IN in interface inside&lt;/P&gt;&lt;P&gt;access-group SHARED_IN in interface SHARED&lt;/P&gt;&lt;P&gt;access-group EDGE_IN in interface EDGE&lt;/P&gt;&lt;P&gt;access-group OUTSIDE_IN in interface outside&lt;/P&gt;&lt;P&gt;route inside 10.222.139.0 255.255.255.0 10.255.1.69 1&lt;/P&gt;&lt;P&gt;route SHARED 10.255.9.0 255.255.255.0 10.255.255.2 1&lt;/P&gt;&lt;P&gt;route SHARED 10.255.11.0 255.255.255.0 10.255.255.2 1&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route SHARED 10.255.12.0 255.255.255.0 10.255.255.2 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;route SHARED 10.255.16.0 255.255.255.0 10.255.255.2 1&lt;/P&gt;&lt;P&gt;route SHARED 10.255.20.0 255.255.255.0 10.255.255.2 1&lt;/P&gt;&lt;P&gt;route SHARED 10.255.24.0 255.255.255.0 10.255.255.2 1&lt;/P&gt;&lt;P&gt;route SHARED 10.255.28.0 255.255.255.0 10.255.255.2 1&lt;/P&gt;&lt;P&gt;route SHARED 10.255.17.0 255.255.255.224 10.255.255.2 1&lt;/P&gt;&lt;P&gt;route SHARED 10.255.18.0 255.255.255.0 10.255.255.2 1&lt;/P&gt;&lt;P&gt;route SHARED 10.255.19.0 255.255.255.0 10.255.255.2 1&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.96.3 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 1:00:00 h225 1:00:00 mgcp 0:05:00&lt;/P&gt;&lt;P&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout pptp-gre 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns maximum-length 512&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;NYSPAL03FW02-PRIMARY/MGMT#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 22 Dec 2012 16:03:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-linux-issue/m-p/2087553#M393854</guid>
      <dc:creator>John Apricena</dc:creator>
      <dc:date>2012-12-22T16:03:53Z</dc:date>
    </item>
    <item>
      <title>FWSM Linux Issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-linux-issue/m-p/2087554#M393855</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems theres not really much complicating the configuration that might explain the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Don't really have a chance to lab this setup myself at the moment but I know we have had some problems with shared Vlan use on FWSM also but nothing that would really help me in this situation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One thing I noticed that you are not doing any NAT other than for LAN -&amp;gt; WAN traffic, unless you have removed some configurations. I think the "nat-control" is at its default which would mean "no nat-control"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What also confuses me is that the log messages talk about dynamic translations when you have generated traffic. I wonder if making a Static NAT statement affec the situation at all. (Even though NAT configurations shouldnt be needed if you specifically want to NAT some address)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the case of the first Context (that you posted) I guess the typical NAT configuration that we would do would be&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,SHARED) 10.255.12.0 10.255.12.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which in case of "nat-control" would enable "inside" to communicate with "SHARED" interface hosts with their original IP address (Other option would be to configure NAT0/NAT Exempt)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also one thing you havent configured, unless its taken from the configuration, is "sysopt noproxyarp SHARED". This command would be of any use in your setup. We usually configure this to customer context LAN interfaces which have direct connection to customer L2 network segment so the FWSM doesnt reply to any ARP request instead of a actual host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also one thing I noticed which probably isnt any issue but is different between the contexts is that the first one doesnt have the "inspect icmp" configuration. Though since you have opened traffic between the interfaces ICMP should work normally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sadly I can't give you an answer as to what is causing this. &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Personally I would just go through the whole path of the traffic (even though you have stated that this only happens with these Linux devices) and possibly play around with the NAT configurations. Ofcourse I don't know how much chances you have to touch the configurations in these setups if they are part of a critical production enviroment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Heres some quotes from Cisco FWSM documentation related to the "nat-control" and "sysopt noproxyarp" configuration commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;H2&gt; sysopt noproxyarp &lt;/H2&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp2754252"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; To disable proxy ARP for NAT global addresses on an interface, use the &lt;STRONG&gt;sysopt noproxyarp&lt;/STRONG&gt; command in global configuration mode. To reenable proxy ARP for global addresses, use the &lt;STRONG&gt;no&lt;/STRONG&gt; form of this command. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp2754253"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;sysopt noproxyarp&lt;/STRONG&gt; &lt;EM&gt;interface_name &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp2754254"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no sysopt noproxyarp&lt;/STRONG&gt; &lt;EM&gt;interface_name &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp2754260"&gt;&lt;/A&gt;&lt;/P&gt;&lt;H3&gt; Syntax Description&lt;/H3&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV align="left"&gt;
&lt;TABLE border="1" cellpadding="3" cellspacing="0" id="wp2754257table2754255" width="80%"&gt;
&lt;CAPTION&gt;&lt;BR /&gt;&lt;/CAPTION&gt; 
&lt;TBODY&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;&lt;A name="wp2754257"&gt;&lt;/A&gt;
&lt;P&gt; &lt;EM&gt;interface_name&lt;/EM&gt; &lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp2754259"&gt;&lt;/A&gt;
&lt;P&gt; Specifies the interface name for which you want to disable proxy ARP. &lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H3&gt; &lt;/H3&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp2754261"&gt;&lt;/A&gt;&lt;/P&gt;&lt;H3&gt; Defaults &lt;/H3&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp2754262"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; Proxy ARP for global addresses is enabled by default. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp2754263"&gt;&lt;/A&gt;&lt;/P&gt;&lt;H2&gt; Command Modes &lt;/H2&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp2754264"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; The following table shows the modes in which you can enter the command: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp2754314"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV align="left"&gt;
&lt;TABLE border="1" cellpadding="3" cellspacing="0" id="wp2754267table2754265" width="80%"&gt;
&lt;CAPTION&gt;&lt;BR /&gt;&lt;/CAPTION&gt; 
&lt;TBODY&gt;
&lt;TR align="left" valign="bottom"&gt;
&lt;TH rowspan="3" scope="col"&gt;&lt;A name="wp2754267"&gt;&lt;/A&gt;
&lt;DIV&gt; Command Mode &lt;/DIV&gt;
&lt;/TH&gt; &lt;TH colspan="2" scope="col"&gt;&lt;A name="wp2754269"&gt;&lt;/A&gt;
&lt;DIV&gt; Firewall Mode &lt;/DIV&gt;
&lt;/TH&gt; &lt;TH colspan="3" scope="col"&gt;&lt;A name="wp2754273"&gt;&lt;/A&gt;
&lt;DIV&gt; Security Context &lt;/DIV&gt;
&lt;/TH&gt; 
&lt;/TR&gt;
&lt;TR align="left" valign="bottom"&gt;
&lt;TH rowspan="2" scope="col"&gt;&lt;A name="wp2754281"&gt;&lt;/A&gt;
&lt;DIV&gt; Routed &lt;/DIV&gt;
&lt;/TH&gt; &lt;TH rowspan="2" scope="col"&gt;&lt;A name="wp2754283"&gt;&lt;/A&gt;
&lt;DIV&gt; Transparent &lt;/DIV&gt;
&lt;/TH&gt; &lt;TH rowspan="2" scope="col"&gt;&lt;A name="wp2754285"&gt;&lt;/A&gt;
&lt;DIV&gt; Single &lt;/DIV&gt;
&lt;/TH&gt; &lt;TH colspan="2" scope="col"&gt;&lt;A name="wp2754287"&gt;&lt;/A&gt;
&lt;DIV&gt; Multiple &lt;/DIV&gt;
&lt;/TH&gt; 
&lt;/TR&gt;
&lt;TR align="left" valign="bottom"&gt;
&lt;TH scope="col"&gt;&lt;A name="wp2754299"&gt;&lt;/A&gt;
&lt;DIV&gt; Context &lt;/DIV&gt;
&lt;/TH&gt; &lt;TH scope="col"&gt;&lt;A name="wp2754301"&gt;&lt;/A&gt;
&lt;DIV&gt; System &lt;/DIV&gt;
&lt;/TH&gt; 
&lt;/TR&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;&lt;A name="wp2754303"&gt;&lt;/A&gt;
&lt;P&gt; Global configuration &lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp2754305"&gt;&lt;/A&gt;
&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt; &lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp2754307"&gt;&lt;/A&gt;
&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt; &lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp2754309"&gt;&lt;/A&gt;
&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt; &lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp2754311"&gt;&lt;/A&gt;
&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt; &lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp2754313"&gt;&lt;/A&gt;
&lt;P&gt; — &lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp2754324"&gt;&lt;/A&gt;&lt;/P&gt;&lt;H3&gt; Command History&lt;/H3&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV align="left"&gt;
&lt;TABLE border="1" cellpadding="3" cellspacing="0" id="wp2754317table2754315" width="80%"&gt;
&lt;CAPTION&gt;&lt;BR /&gt;&lt;/CAPTION&gt; 
&lt;TBODY&gt;
&lt;TR align="left" valign="bottom"&gt;
&lt;TH scope="col"&gt;&lt;A name="wp2754317"&gt;&lt;/A&gt;
&lt;DIV&gt; Release &lt;/DIV&gt;
&lt;/TH&gt; &lt;TH scope="col"&gt;&lt;A name="wp2754319"&gt;&lt;/A&gt;
&lt;DIV&gt; Modification &lt;/DIV&gt;
&lt;/TH&gt; 
&lt;/TR&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;&lt;A name="wp2754321"&gt;&lt;/A&gt;
&lt;P&gt; 1.1(1) &lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp2754323"&gt;&lt;/A&gt;
&lt;P&gt; This command was introduced. &lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H3&gt; &lt;/H3&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp2754325"&gt;&lt;/A&gt;&lt;/P&gt;&lt;H3&gt; Usage Guidelines &lt;/H3&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp2754326"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; In rare circumstances, you might want to disable proxy ARP for global addresses. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp2754327"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; When a host sends IP traffic to another device on the same Ethernet&amp;nbsp; network, the host needs to know the MAC address of the device. ARP is a&amp;nbsp; Layer 2 protocol that resolves an IP address to a MAC address. A host&amp;nbsp; sends an ARP request asking "Who is this IP address?" The device owning&amp;nbsp; the IP address replies, "I own that IP address; here is my MAC address." &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp2754328"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; Proxy ARP is when a device responds to an ARP request with its own MAC&amp;nbsp; address, even though the device does not own the IP address. The FWSM&amp;nbsp; uses proxy ARP when you configure NAT and specify a global address that&amp;nbsp; is on the same network as the FWSM interface. The only way traffic can&amp;nbsp; reach the hosts is if the FWSM uses proxy ARP to claim that the FWSM MAC&amp;nbsp; address is assigned to destination global addresses. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp2754341"&gt;&lt;/A&gt;&lt;A name="wp2754342"&gt;&lt;/A&gt;&lt;/P&gt;&lt;H3&gt; Examples &lt;/H3&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp2754343"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; The following example disables proxy ARP on the inside interface: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp2754346"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV&gt;
&lt;PRE&gt;hostname(config)# &lt;STRONG&gt;sysopt noproxyarp inside
&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;/P&gt;
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;H2&gt; nat-control &lt;/H2&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1635843"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; To enforce NAT control use the &lt;STRONG&gt;nat-control&lt;/STRONG&gt; command in global configuration mode. NAT control requires NAT for&amp;nbsp; inside hosts when they access the outside. To disable NAT control, use&amp;nbsp; the &lt;STRONG&gt;no&lt;/STRONG&gt; form of this command. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1635844"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat-control &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1635845"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no nat-control &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1635846"&gt;&lt;/A&gt;&lt;/P&gt;&lt;H3&gt; Syntax Description &lt;/H3&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1635847"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; This command has no arguments or keywords. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1635848"&gt;&lt;/A&gt;&lt;/P&gt;&lt;H3&gt; Defaults &lt;/H3&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1635849"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; NAT control is disabled by default (&lt;STRONG&gt;no nat-control&lt;/STRONG&gt; command). If you upgraded from an earlier version of software, however,&amp;nbsp; NAT control might be enabled on your system because it was the default&amp;nbsp; in some earlier versions. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1635850"&gt;&lt;/A&gt;&lt;/P&gt;&lt;H2&gt; Command Modes &lt;/H2&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1635851"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; The following table shows the modes in which you can enter the command: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1635901"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV align="left"&gt;
&lt;TABLE border="1" cellpadding="3" cellspacing="0" id="wp1635854table1635852" width="80%"&gt;
&lt;CAPTION&gt;&lt;BR /&gt;&lt;/CAPTION&gt; 
&lt;TBODY&gt;
&lt;TR align="left" valign="bottom"&gt;
&lt;TH rowspan="3" scope="col"&gt;&lt;A name="wp1635854"&gt;&lt;/A&gt;
&lt;DIV&gt; Command Mode &lt;/DIV&gt;
&lt;/TH&gt; &lt;TH colspan="2" scope="col"&gt;&lt;A name="wp1635856"&gt;&lt;/A&gt;
&lt;DIV&gt; Firewall Mode &lt;/DIV&gt;
&lt;/TH&gt; &lt;TH colspan="3" scope="col"&gt;&lt;A name="wp1635860"&gt;&lt;/A&gt;
&lt;DIV&gt; Security Context &lt;/DIV&gt;
&lt;/TH&gt; 
&lt;/TR&gt;
&lt;TR align="left" valign="bottom"&gt;
&lt;TH rowspan="2" scope="col"&gt;&lt;A name="wp1635868"&gt;&lt;/A&gt;
&lt;DIV&gt; Routed &lt;/DIV&gt;
&lt;/TH&gt; &lt;TH rowspan="2" scope="col"&gt;&lt;A name="wp1635870"&gt;&lt;/A&gt;
&lt;DIV&gt; Transparent &lt;/DIV&gt;
&lt;/TH&gt; &lt;TH rowspan="2" scope="col"&gt;&lt;A name="wp1635872"&gt;&lt;/A&gt;
&lt;DIV&gt; Single &lt;/DIV&gt;
&lt;/TH&gt; &lt;TH colspan="2" scope="col"&gt;&lt;A name="wp1635874"&gt;&lt;/A&gt;
&lt;DIV&gt; Multiple &lt;/DIV&gt;
&lt;/TH&gt; 
&lt;/TR&gt;
&lt;TR align="left" valign="bottom"&gt;
&lt;TH scope="col"&gt;&lt;A name="wp1635886"&gt;&lt;/A&gt;
&lt;DIV&gt; Context &lt;/DIV&gt;
&lt;/TH&gt; &lt;TH scope="col"&gt;&lt;A name="wp1635888"&gt;&lt;/A&gt;
&lt;DIV&gt; System &lt;/DIV&gt;
&lt;/TH&gt; 
&lt;/TR&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;&lt;A name="wp1635890"&gt;&lt;/A&gt;
&lt;P&gt; Global configuration &lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp1635892"&gt;&lt;/A&gt;
&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt; &lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp1635894"&gt;&lt;/A&gt;
&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt; &lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp1635896"&gt;&lt;/A&gt;
&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt; &lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp1635898"&gt;&lt;/A&gt;
&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt; &lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp1635900"&gt;&lt;/A&gt;
&lt;P&gt; — &lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1635915"&gt;&lt;/A&gt;&lt;/P&gt;&lt;H3&gt; Command History&lt;/H3&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV align="left"&gt;
&lt;TABLE border="1" cellpadding="3" cellspacing="0" id="wp1635904table1635902" width="80%"&gt;
&lt;CAPTION&gt;&lt;BR /&gt;&lt;/CAPTION&gt; 
&lt;TBODY&gt;
&lt;TR align="left" valign="bottom"&gt;
&lt;TH scope="col"&gt;&lt;A name="wp1635904"&gt;&lt;/A&gt;
&lt;DIV&gt; Release &lt;/DIV&gt;
&lt;/TH&gt; &lt;TH scope="col"&gt;&lt;A name="wp1635906"&gt;&lt;/A&gt;
&lt;DIV&gt; Modification &lt;/DIV&gt;
&lt;/TH&gt; 
&lt;/TR&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;&lt;A name="wp1635908"&gt;&lt;/A&gt;
&lt;P&gt; 3.1(1) &lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp1635910"&gt;&lt;/A&gt;
&lt;P&gt; This command was introduced. &lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;&lt;A name="wp1635912"&gt;&lt;/A&gt;
&lt;P&gt; 3.2.(1) &lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp1635914"&gt;&lt;/A&gt;
&lt;P&gt; NAT is now supported in transparent firewall mode. &lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H3&gt; &lt;/H3&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1635916"&gt;&lt;/A&gt;&lt;/P&gt;&lt;H3&gt; Usage Guidelines &lt;/H3&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1635917"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; NAT control requires that packets traversing from an inside interface to&amp;nbsp; an outside interface match a NAT rule; for any host on the inside&amp;nbsp; network to access a host on the outside network, you must configure NAT&amp;nbsp; to translate the inside host address. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1635918"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; Interfaces at the same security level are not required to use NAT to communicate. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1635919"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; By default, NAT control is disabled, so you do not need to perform NAT on any networks unless you choose to perform NAT. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1635920"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; If you want the added security of NAT control but do not want to&amp;nbsp; translate inside addresses in some cases, you can apply a NAT exemption (&lt;STRONG&gt;nat 0 access-list&lt;/STRONG&gt;) or identity NAT (&lt;STRONG&gt;nat 0&lt;/STRONG&gt; or &lt;STRONG&gt;static&lt;/STRONG&gt;) rule on those addresses. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://www.cisco.com/en/US/i/templates/note.gif" /&gt;&lt;/P&gt;&lt;HR /&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1635921"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;Note &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="1" /&gt;In&amp;nbsp; multiple context mode, the packet classifier relies on the NAT&amp;nbsp; configuration in some cases to assign packets to contexts. If you do not&amp;nbsp; perform NAT because NAT control is disabled, then the classifier might&amp;nbsp; require changes in your network configuration. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;HR /&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1635922"&gt;&lt;/A&gt;&lt;/P&gt;&lt;H3&gt; Examples &lt;/H3&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1635923"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; The following example enables NAT control: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1635926"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV&gt;
&lt;PRE&gt;hostname(config)# nat-control
&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Whole command reference can be found at&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/fwsm/fwsm40/command/reference/fwsm_ref.html"&gt;http://www.cisco.com/en/US/docs/security/fwsm/fwsm40/command/reference/fwsm_ref.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 22 Dec 2012 17:12:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-linux-issue/m-p/2087554#M393855</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-12-22T17:12:25Z</dc:date>
    </item>
    <item>
      <title>FWSM Linux Issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-linux-issue/m-p/2087555#M393856</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;By the way,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have some Active/Standby FWSM setup between 2 FWSMs?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also why doesnt the "SHARED" interface have a secondary IP address configured but the others do?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 22 Dec 2012 17:14:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-linux-issue/m-p/2087555#M393856</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-12-22T17:14:21Z</dc:date>
    </item>
    <item>
      <title>FWSM Linux Issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-linux-issue/m-p/2087556#M393857</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jouni, thanks for the reply! I tried all that you said, however those did not resolve the issue. The nat-control and noproxyarp both were unsuccesful. As for the shared FWSM, currently we don't run failover, but when we do I will add the standby interfaces to the SHARED interface as well for all FWSMs. The setup you see with standby is configured in advance. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have any idea maybe what else I can try with regards to resolving this strange issue with Linux boxes and our FWSM.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Dec 2012 15:32:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-linux-issue/m-p/2087556#M393857</guid>
      <dc:creator>John Apricena</dc:creator>
      <dc:date>2012-12-28T15:32:17Z</dc:date>
    </item>
    <item>
      <title>FWSM Linux Issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-linux-issue/m-p/2087557#M393858</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just for your reference configuring tcp-state-bypass between the two private networks on both sides of the FWSM resolved this issue. So, it seems the firewall was doing a bit too much protecting when really these were two trusted networks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Jan 2013 15:45:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-linux-issue/m-p/2087557#M393858</guid>
      <dc:creator>John Apricena</dc:creator>
      <dc:date>2013-01-10T15:45:31Z</dc:date>
    </item>
    <item>
      <title>FWSM Linux Issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-linux-issue/m-p/2087558#M393859</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, so after further testing we confirmed that tcp-state-bypass fixed the issue with Linux servers communicating over shared contexts, however we still have an issue with Linux machines over a VPN. Currently, from time to time hosts cannot communicate over the VPN to our Linux machines in our DC. The Linux machine uses the FWSM as the gateway, and the FWSM forwards over to the ASA. We checked the logs and when we initiate the connection from the remote site to the Linux servers, our ASA sees the traffic come over the VPN, however the FWSM never sees it. This only happens with Linux machines, all other hosts work fine over the VPN. Could this be an issue with the FWSM looking for something in the packet or doing too much inspecting. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;During this outage I've also confirmed that the inside interface of the ASA loses connection to the Linux server. Example I can ping a windows host on the same network as the Linux server without an issue, however I cannot ping the Linux Server, even they are on the same network. So this looks like an FWSM issue, I can provide logs, network diagrams, configs, anything that may help. Has anyone seen this type of issue before with only Linux machines and Cisco Firewalls? Thanks so much in advance for all the help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jan 2013 18:57:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-linux-issue/m-p/2087558#M393859</guid>
      <dc:creator>John Apricena</dc:creator>
      <dc:date>2013-01-28T18:57:59Z</dc:date>
    </item>
  </channel>
</rss>

