<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA implicit drop in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-implicit-drop/m-p/2105741#M394667</link>
    <description>&lt;P&gt;I need to be able to ssh to local interface on an ASA 7.2.5 cluster, IP=X.147.1.110 (primary cluster address) for management.&lt;/P&gt;&lt;P&gt;- the acl on the interface allows the connection, and shows hits&lt;/P&gt;&lt;P&gt;- ssh is allowed "ssh Y.35.252.0 255.255.254.0 elink"&lt;/P&gt;&lt;P&gt;- fw is sending a TCP reset (service resetinbound and service resetoutside are set)&lt;/P&gt;&lt;P&gt;- packet tracer shows&lt;/P&gt;&lt;P&gt;# packet-tracer input elink tcp Y.35.252.89 9999 X.147.1.110 22&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; X.147.1.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; elink&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Anyone know why this is failing? elink is the middle security level of the three interfaces, and there are PATs on X.147.1.110, that is, traffic leaving elink is being hidden behind X.147.1.110.&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 00:33:11 GMT</pubDate>
    <dc:creator>adamcarteratcisco</dc:creator>
    <dc:date>2019-03-12T00:33:11Z</dc:date>
    <item>
      <title>ASA implicit drop</title>
      <link>https://community.cisco.com/t5/network-security/asa-implicit-drop/m-p/2105741#M394667</link>
      <description>&lt;P&gt;I need to be able to ssh to local interface on an ASA 7.2.5 cluster, IP=X.147.1.110 (primary cluster address) for management.&lt;/P&gt;&lt;P&gt;- the acl on the interface allows the connection, and shows hits&lt;/P&gt;&lt;P&gt;- ssh is allowed "ssh Y.35.252.0 255.255.254.0 elink"&lt;/P&gt;&lt;P&gt;- fw is sending a TCP reset (service resetinbound and service resetoutside are set)&lt;/P&gt;&lt;P&gt;- packet tracer shows&lt;/P&gt;&lt;P&gt;# packet-tracer input elink tcp Y.35.252.89 9999 X.147.1.110 22&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; X.147.1.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; elink&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Anyone know why this is failing? elink is the middle security level of the three interfaces, and there are PATs on X.147.1.110, that is, traffic leaving elink is being hidden behind X.147.1.110.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:33:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-implicit-drop/m-p/2105741#M394667</guid>
      <dc:creator>adamcarteratcisco</dc:creator>
      <dc:date>2019-03-12T00:33:11Z</dc:date>
    </item>
    <item>
      <title>ASA implicit drop</title>
      <link>https://community.cisco.com/t5/network-security/asa-implicit-drop/m-p/2105742#M394668</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are trying to innitiate sessions from behind the X interface of the ASA&amp;nbsp; to the Ip address of the X interface, then you need the following:&lt;/P&gt;&lt;P&gt;- ssh 0 0 inside ( or the name)&lt;/P&gt;&lt;P&gt;- a crypto key on your ASA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; CRYPTO key generate rsa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know how it goes.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Dec 2012 00:12:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-implicit-drop/m-p/2105742#M394668</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-12-06T00:12:22Z</dc:date>
    </item>
    <item>
      <title>ASA implicit drop</title>
      <link>https://community.cisco.com/t5/network-security/asa-implicit-drop/m-p/2105743#M394669</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;- ssh 0 0 inside ( or the name)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is already achieved with the line "ssh Y.35.252.0 255.255.254.0 elink". The source of the connection is Y.35.252.0/23 and the interface name is elink.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- a crypto key on your ASA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; CRYPTO key generate rsa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yep - that's already been done.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way to verify the sshd is running? Something like ps on unix?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Dec 2012 00:23:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-implicit-drop/m-p/2105743#M394669</guid>
      <dc:creator>adamcarteratcisco</dc:creator>
      <dc:date>2012-12-06T00:23:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA implicit drop</title>
      <link>https://community.cisco.com/t5/network-security/asa-implicit-drop/m-p/2105744#M394670</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you run a debug SSH 255 and then attemtp to connect,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What logs is the firewall showing you?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also the show asp table socket&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Dec 2012 00:35:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-implicit-drop/m-p/2105744#M394670</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-12-06T00:35:10Z</dc:date>
    </item>
  </channel>
</rss>

