<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Same Security Traffic, help diagnosing please in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/same-security-traffic-help-diagnosing-please/m-p/2136045#M395547</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sure..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input CustA tcp 192.168.139.8 10000 192.168.180.26 http&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 16 Nov 2012 17:28:01 GMT</pubDate>
    <dc:creator>WStoffel1</dc:creator>
    <dc:date>2012-11-16T17:28:01Z</dc:date>
    <item>
      <title>Same Security Traffic, help diagnosing please</title>
      <link>https://community.cisco.com/t5/network-security/same-security-traffic-help-diagnosing-please/m-p/2136038#M395538</link>
      <description>&lt;P&gt;Why would the drop reason be acl-drop?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take the following interfaces:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vpnfw# sh run int gig 0/3.139&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3.139&lt;/P&gt;&lt;P&gt; vlan 139&lt;/P&gt;&lt;P&gt; nameif test1&lt;/P&gt;&lt;P&gt; security-level 90&lt;/P&gt;&lt;P&gt; ip address 192.168.139.254 255.255.255.0 standby 192.168.139.253&lt;/P&gt;&lt;P&gt;vpnfw# sh run int gig 0/3.180&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3.180&lt;/P&gt;&lt;P&gt; vlan 180&lt;/P&gt;&lt;P&gt; nameif test2&lt;/P&gt;&lt;P&gt; security-level 90&lt;/P&gt;&lt;P&gt; ip address 192.168.180.220 255.255.255.0 standby 192.168.180.221&lt;/P&gt;&lt;P&gt;vpnfw# sh run same-security-traffic&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;vpnfw# ping 192.168.139.8&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 192.168.139.8, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!!!!!&lt;/P&gt;&lt;P&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/10 ms&lt;/P&gt;&lt;P&gt;vpnfw# ping 192.168.180.26&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 192.168.180.26, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!!!!!&lt;/P&gt;&lt;P&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I go to packet tracer and set the Interface to test1, packet type TCP, source add 192.168.139.8 (a valid working host on that subnet), source port 32000, destination add 192.168.180.26 (again a valid working host for that subnet) dest. port http, i get the following results:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.180.0&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; test2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: FOVER&lt;/P&gt;&lt;P&gt;Subtype: standby-update&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (test1,dmz) 192.168.139.0 192.168.139.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip lvbw 192.168.139.0 255.255.255.0 dmz any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 192.168.139.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1564, untranslate_hits = 501&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (test1) 1 192.168.139.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip lvbw 192.168.139.0 255.255.255.0 test2 any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 8, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: test1&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: test2&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just starting to troubleshoot AND understand this so I'm hoping to learn a few things here &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So thanks in advance for any help!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:23:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-traffic-help-diagnosing-please/m-p/2136038#M395538</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2019-03-12T00:23:35Z</dc:date>
    </item>
    <item>
      <title>Same Security Traffic, help diagnosing please</title>
      <link>https://community.cisco.com/t5/network-security/same-security-traffic-help-diagnosing-please/m-p/2136039#M395539</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you "clear xlate" after adding the static NAT statement?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Nov 2012 04:23:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-traffic-help-diagnosing-please/m-p/2136039#M395539</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-11-15T04:23:58Z</dc:date>
    </item>
    <item>
      <title>Same Security Traffic, help diagnosing please</title>
      <link>https://community.cisco.com/t5/network-security/same-security-traffic-help-diagnosing-please/m-p/2136040#M395540</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes I have.&amp;nbsp; Now i have a question(s)....My thought was all i needed was the same-seciruty-interface command to allow this.&amp;nbsp; Am i incorrect in my thinking?&amp;nbsp; Is it perhaps because theres existing nats that i would need a nat for this traffic? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me start over.&amp;nbsp; The more i read about this the more confused i am &lt;SPAN __jive_emoticon_name="happy"&gt;&lt;/SPAN&gt;&amp;nbsp; I can't put my whole config in but this I believe is all the relavant info below.&amp;nbsp; I have to protect customer info, as subnet 139 is a customer that sits behind my firewall, which i renamed CustA.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CustB is, as you can see from the port forwards, and email product we host.&amp;nbsp; Clearly CustA can't get to the 180 subinterface.&amp;nbsp; And hence email doesn't work for them.&amp;nbsp; How can i go about rectifying this?&amp;nbsp;&amp;nbsp; All of the CustA config has been there a long time (i did not set any of that up).&amp;nbsp; The only thing new is the 180 network and the CustB config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can i get this working?&amp;nbsp; And would it benefit me to increase the security level of CustA to say 95 or 100?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The 74.x.x.x addresses below have their associated public DNS entries for mail.domain.com, etc...&amp;nbsp; So essentially right now&amp;nbsp; traffic from 192.168.139.0/24 just gets sent out the default gateway of the ASA, with no hopes of returning.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you so much!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.254.254 255.255.255.0 standby 192.168.254.253&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3.139&lt;/P&gt;&lt;P&gt; vlan 139&lt;/P&gt;&lt;P&gt; nameif CustA&lt;/P&gt;&lt;P&gt; security-level 90&lt;/P&gt;&lt;P&gt; ip address 192.168.139.254 255.255.255.0 standby 192.168.139.253&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3.180&lt;/P&gt;&lt;P&gt; vlan 180&lt;/P&gt;&lt;P&gt; nameif CustB&lt;/P&gt;&lt;P&gt; security-level 90&lt;/P&gt;&lt;P&gt; ip address 192.168.180.220 255.255.255.0 standby 192.168.180.221&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (CustA) 0 access-list CustA2&lt;/P&gt;&lt;P&gt;nat (CustA) 1 192.168.139.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (dmz,CustA) 74.11.x.x 192.168.254.11 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (dmz,CustA) 74.11.x.x 192.168.254.19 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (dmz,CustA) 74.11.x.x 192.168.254.4 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (dmz,CustA) 74.11.x.x 192.168.254.32 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (dmz,CustA) 74.11.x.x 192.168.254.14 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (dmz,CustA) 74.11.x.x 192.168.254.52 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (dmz,CustA) 74.11.x.x 192.168.254.50 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (dmz,CustA) 24.7.x.x 192.168.254.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (dmz,CustA) 24.7.x.x 192.168.254.13 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (dmz,CustA) 24.7.x.x 192.168.254.35 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (dmz,CustA) 74.112.121.2 192.168.254.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (CustA,dmz) 192.168.139.0 192.168.139.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (dmz,CustA) 74.11.x.x 192.168.254.62 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (CustA,outside) 74.11.x.x 192.168.139.15 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (CustA,outside) 74.11.x.x 192.168.139.7 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (CustA,outside) 74.11.x.x 192.168.139.6 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list CustA1 extended permit ip 192.168.139.0 255.255.255.0 172.18.139.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list CustA2 extended permit ip 192.168.139.0 255.255.255.0 172.18.139.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (CustA) 0 access-list CustA2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (CustB) 1 192.168.180.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (CustB,outside) tcp 74.11.x.x smtp 192.168.180.26 smtp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (CustB,outside) tcp 74.11.x.x 26 192.168.180.26 26 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (CustB,outside) tcp 74.11.x.x 587 192.168.180.26 587 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (CustB,outside) tcp 74.11.x.x www 192.168.180.25 www netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (CustB,outside) tcp 74.11.x.x pop3 192.168.180.25 pop3 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (CustB,outside) tcp 74.11.x.x imap4 192.168.180.25 imap4 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (CustB,outside) tcp 74.11.x.x https 192.168.180.25 https netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (CustB,outside) tcp 74.11.x.x 993 192.168.180.25 993 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (CustB,outside) tcp 74.11.x.x 995 192.168.180.25 995 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (CustB,outside) 74.11.x.x 192.168.180.72 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (CustB,outside) 74.11.x.x 192.168.180.230 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (dmz,CustB) 74.11.x.x 192.168.254.19 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (dmz,CustB) 74.11.x.x 192.168.254.26 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (CustB,dmz) 192.168.180.0 192.168.180.0 netmask 255.255.255.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Nov 2012 13:50:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-traffic-help-diagnosing-please/m-p/2136040#M395540</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2012-11-15T13:50:02Z</dc:date>
    </item>
    <item>
      <title>Same Security Traffic, help diagnosing please</title>
      <link>https://community.cisco.com/t5/network-security/same-security-traffic-help-diagnosing-please/m-p/2136041#M395541</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oh and customers external to my firewall have no problem accessing email with this setup...but you probably already figured that...thanks again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Nov 2012 13:51:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-traffic-help-diagnosing-please/m-p/2136041#M395541</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2012-11-15T13:51:22Z</dc:date>
    </item>
    <item>
      <title>Same Security Traffic, help diagnosing please</title>
      <link>https://community.cisco.com/t5/network-security/same-security-traffic-help-diagnosing-please/m-p/2136042#M395542</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Don't see a static NAT statement between the 2 interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;YOu would need;&lt;/P&gt;&lt;P&gt;static (CustA,CustB) 192.168.139.0 192.168.139.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is assuming that you are accessing the server by its real IP (private IP).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Nov 2012 23:22:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-traffic-help-diagnosing-please/m-p/2136042#M395542</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-11-15T23:22:08Z</dc:date>
    </item>
    <item>
      <title>Same Security Traffic, help diagnosing please</title>
      <link>https://community.cisco.com/t5/network-security/same-security-traffic-help-diagnosing-please/m-p/2136043#M395544</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Now we're getting somewhere!&amp;nbsp; I put the command in, then cleared xlates.&amp;nbsp; Now it's dropped in phase 9&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.180.0&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; CustB&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: FOVER&lt;/P&gt;&lt;P&gt;Subtype: standby-update&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (CustA,CustB) 192.168.139.0 192.168.139.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip CustA 192.168.139.0 255.255.255.0 CustB any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 192.168.139.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 3, untranslate_hits = 1&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Static translate 192.168.139.0/0 to 192.168.139.0/0 using netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (CustA,dmz) 192.168.139.0 192.168.139.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip CustA 192.168.139.0 255.255.255.0 dmz any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 192.168.139.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1632, untranslate_hits = 513&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (CustB) 1 192.168.180.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip CustB 192.168.180.0 255.255.255.0 CustA any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: CustA&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: CustB&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What's next &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Nov 2012 01:11:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-traffic-help-diagnosing-please/m-p/2136043#M395544</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2012-11-16T01:11:47Z</dc:date>
    </item>
    <item>
      <title>Same Security Traffic, help diagnosing please</title>
      <link>https://community.cisco.com/t5/network-security/same-security-traffic-help-diagnosing-please/m-p/2136044#M395546</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you pls advise what exactly you run on your packet tracer source and destination IP. Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Nov 2012 13:42:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-traffic-help-diagnosing-please/m-p/2136044#M395546</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-11-16T13:42:48Z</dc:date>
    </item>
    <item>
      <title>Same Security Traffic, help diagnosing please</title>
      <link>https://community.cisco.com/t5/network-security/same-security-traffic-help-diagnosing-please/m-p/2136045#M395547</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sure..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input CustA tcp 192.168.139.8 10000 192.168.180.26 http&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Nov 2012 17:28:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-traffic-help-diagnosing-please/m-p/2136045#M395547</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2012-11-16T17:28:01Z</dc:date>
    </item>
    <item>
      <title>Same Security Traffic, help diagnosing please</title>
      <link>https://community.cisco.com/t5/network-security/same-security-traffic-help-diagnosing-please/m-p/2136046#M395551</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And if it helps, i could raise or lower the security level on the CustA interface...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Nov 2012 17:36:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-traffic-help-diagnosing-please/m-p/2136046#M395551</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2012-11-16T17:36:20Z</dc:date>
    </item>
    <item>
      <title>Same Security Traffic, help diagnosing please</title>
      <link>https://community.cisco.com/t5/network-security/same-security-traffic-help-diagnosing-please/m-p/2136047#M395554</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;would definitely worth a try raising CustA security level to a higher security level.&lt;/P&gt;&lt;P&gt;Might be bug on the version that you are running.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Nov 2012 13:16:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-traffic-help-diagnosing-please/m-p/2136047#M395554</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-11-17T13:16:41Z</dc:date>
    </item>
    <item>
      <title>Same Security Traffic, help diagnosing please</title>
      <link>https://community.cisco.com/t5/network-security/same-security-traffic-help-diagnosing-please/m-p/2136048#M395556</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you!!!&amp;nbsp; That did it for traffic from CustA to CustB.&amp;nbsp; Flawlessly actually.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not sure if I should start a new thread or continue here, but i have 2 questions now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.&amp;nbsp; How do i get traffic from CustB to CustA (or since the traffic would always be initiated from CustA, is this even necessary?)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. CustB is actually our Hosted Email product, which uses public IP's and DNS entries, is there anyway to get email flowing?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Nov 2012 13:42:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-traffic-help-diagnosing-please/m-p/2136048#M395556</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2012-11-17T13:42:20Z</dc:date>
    </item>
    <item>
      <title>Same Security Traffic, help diagnosing please</title>
      <link>https://community.cisco.com/t5/network-security/same-security-traffic-help-diagnosing-please/m-p/2136049#M395559</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1) If traffic only needs to be initiated from CustA to CustB, then the return traffic will be allowed by default.&lt;/P&gt;&lt;P&gt;However, if you need to initiate traffic from Cust B to Cust A, all you need is to configure access-list on Cust B interface to allow the traffic through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) It's probably best to use DNS name instead of that actual ip address. However, it will only work if the DNS traffic traverses through the ASA. All you need to do is to add the keyword "dns" on the static NAT statement on the static NAT for the mail server statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Eg:&lt;/P&gt;&lt;P&gt;static (CustB,outside) tcp 74.11.x.x smtp 192.168.180.26 smtp netmask 255.255.255.255 dns&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2012 10:38:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-traffic-help-diagnosing-please/m-p/2136049#M395559</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-11-21T10:38:42Z</dc:date>
    </item>
    <item>
      <title>Same Security Traffic, help diagnosing please</title>
      <link>https://community.cisco.com/t5/network-security/same-security-traffic-help-diagnosing-please/m-p/2136050#M395562</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you again!&amp;nbsp; Before I do this, i just want to be sure since i really don't want to cause problems for other clients that are functioning correctly &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&amp;nbsp; I just love labbing a production network!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You mean of course my existing nat:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (CustB,outside) tcp 74.11.x.x smtp 192.168.180.26 smtp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All i needed to do &lt;EM&gt;originally &lt;/EM&gt;was have the DNS keyword at the end, and that along your earlier help:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (CustA,CustB) 192.168.139.0 192.168.139.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;...would allow CustB behind my firewall to use a public dns entry for mail.mycompany.com at 74.11.x..x, which is the CustA interface on the same firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully i worded that correctly...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2012 12:40:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-traffic-help-diagnosing-please/m-p/2136050#M395562</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2012-11-21T12:40:36Z</dc:date>
    </item>
  </channel>
</rss>

