<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA not allowing return traffic without ACL in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-not-allowing-return-traffic-without-acl/m-p/2116779#M394028</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just an assumption: You only test it with ICMP ping instead of "real" traffic and you don't have the ICMP-inspection active?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 17 Dec 2012 20:28:40 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2012-12-17T20:28:40Z</dc:date>
    <item>
      <title>ASA not allowing return traffic without ACL</title>
      <link>https://community.cisco.com/t5/network-security/asa-not-allowing-return-traffic-without-acl/m-p/2116777#M394001</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am facing a problem with the ASA. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have one of my internal hosts hide NATed to go directly to the internet. I have a policy and NAT created on the inside interface and I can see that NAT is happening in the Xlate table. Also, in the logs the traffic is allowed through. But, the access form the host is just not working. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, as part of troubleshooting I created an accesslist on the outside interface to allow the return traffic specifically. Then it started working. It seems strange that the return traffic should ideally work fine. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would really appreciate if anyone could help me with this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Faiz&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:37:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-not-allowing-return-traffic-without-acl/m-p/2116777#M394001</guid>
      <dc:creator>ahamadfaiz</dc:creator>
      <dc:date>2019-03-12T00:37:47Z</dc:date>
    </item>
    <item>
      <title>ASA not allowing return traffic without ACL</title>
      <link>https://community.cisco.com/t5/network-security/asa-not-allowing-return-traffic-without-acl/m-p/2116778#M394020</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share the configurations related to this case?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would think if the traffic coming from the remote end is part of the already formed connection it should get through automatically. On the other hand if its a totally new formed connection by the remote host then it will need the ACL statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though there is exceptions like FTP where the remote end might initiate the data connection to random port and there the "inspect ftp" (to my understanding) is keeping track of the connections and allows the remote hosts connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Might be also good to get some logs of the failed/succesfull attempt and copy/paste them here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Dec 2012 08:53:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-not-allowing-return-traffic-without-acl/m-p/2116778#M394020</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-12-17T08:53:03Z</dc:date>
    </item>
    <item>
      <title>Re: ASA not allowing return traffic without ACL</title>
      <link>https://community.cisco.com/t5/network-security/asa-not-allowing-return-traffic-without-acl/m-p/2116779#M394028</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just an assumption: You only test it with ICMP ping instead of "real" traffic and you don't have the ICMP-inspection active?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Dec 2012 20:28:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-not-allowing-return-traffic-without-acl/m-p/2116779#M394028</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-12-17T20:28:40Z</dc:date>
    </item>
    <item>
      <title>ASA not allowing return traffic without ACL</title>
      <link>https://community.cisco.com/t5/network-security/asa-not-allowing-return-traffic-without-acl/m-p/2116780#M394037</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for the suggestions and sorry for the delayed response. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It was pretty silly. Enabled ICMP inspection and it worked. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanx again.&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Faiz&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 Dec 2012 14:26:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-not-allowing-return-traffic-without-acl/m-p/2116780#M394037</guid>
      <dc:creator>ahamadfaiz</dc:creator>
      <dc:date>2012-12-23T14:26:53Z</dc:date>
    </item>
  </channel>
</rss>

