<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hit count in ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/hit-count-in-asa/m-p/2065985#M396775</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, that is correct.&lt;/P&gt;&lt;P&gt;Access-list on ASA only matches on the first connection, and the subsequent packets within the same connection will be allowed by default as it is part of the same connections. ASA is a stateful firewall so it has a state table to store the existing connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 26 Oct 2012 02:01:09 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2012-10-26T02:01:09Z</dc:date>
    <item>
      <title>Hit count in ASA</title>
      <link>https://community.cisco.com/t5/network-security/hit-count-in-asa/m-p/2065984#M396773</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Need to confirm how hit count is incremented in ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am pinging IP from PC connected to ASA&amp;nbsp; .&lt;/P&gt;&lt;P&gt;PC has send 4 packets&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is ASA info&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sh access-li$&lt;/P&gt;&lt;P&gt;access-list cached ACL log flows: total 1, denied 0 (deny-flow-max 4096)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; alert-interval 300&lt;/P&gt;&lt;P&gt;access-list ICMP; 1 elements; name hash: 0x2d2cf426&lt;/P&gt;&lt;P&gt;access-list ICMP line 1 extended permit icmp any any echo-reply log informational interval 300 (hitcnt=3) 0x0b307247&lt;/P&gt;&lt;P&gt;ciscoasa#&amp;nbsp; ICMP echo request from inside:192.168.1.6 to outside:4.2.2.2 ID=1 seq=33 len=32&lt;/P&gt;&lt;P&gt;ICMP echo request translating inside:192.168.1.6/1 to outside:192.168.11.2/21335&lt;/P&gt;&lt;P&gt;ICMP echo reply from outside:4.2.2.2 to inside:192.168.11.2 ID=21335 seq=33 len=32&lt;/P&gt;&lt;P&gt;ICMP echo reply untranslating outside:192.168.11.2/21335 to inside:192.168.1.6/1&lt;/P&gt;&lt;P&gt;ICMP echo request from inside:192.168.1.6 to outside:4.2.2.2 ID=1 seq=34 len=32&lt;/P&gt;&lt;P&gt;ICMP echo request translating inside:192.168.1.6/1 to outside:192.168.11.2/21335&lt;/P&gt;&lt;P&gt;ICMP echo reply from outside:4.2.2.2 to inside:192.168.11.2 ID=21335 seq=34 len=32&lt;/P&gt;&lt;P&gt;ICMP echo reply untranslating outside:192.168.11.2/21335 to inside:192.168.1.6/1&lt;/P&gt;&lt;P&gt;ICMP echo request from inside:192.168.1.6 to outside:4.2.2.2 ID=1 seq=35 len=32&lt;/P&gt;&lt;P&gt;ICMP echo request translating inside:192.168.1.6/1 to outside:192.168.11.2/21335&lt;/P&gt;&lt;P&gt;ICMP echo reply from outside:4.2.2.2 to inside:192.168.11.2 ID=21335 seq=35 len=32&lt;/P&gt;&lt;P&gt;ICMP echo reply untranslating outside:192.168.11.2/21335 to inside:192.168.1.6/1&lt;/P&gt;&lt;P&gt;ICMP echo request from inside:192.168.1.6 to outside:4.2.2.2 ID=1 seq=36 len=32&lt;/P&gt;&lt;P&gt;ICMP echo request translating inside:192.168.1.6/1 to outside:192.168.11.2/21335&lt;/P&gt;&lt;P&gt;ICMP echo reply from outside:4.2.2.2 to inside:192.168.11.2 ID=21335 seq=36 len=32&lt;/P&gt;&lt;P&gt;ICMP echo reply untranslating outside:192.168.11.2/21335 to inside:192.168.1.6/1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sh access-li$&lt;/P&gt;&lt;P&gt;access-list cached ACL log flows: total 1, denied 0 (deny-flow-max 4096)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; alert-interval 300&lt;/P&gt;&lt;P&gt;access-list ICMP; 1 elements; name hash: 0x2d2cf426&lt;/P&gt;&lt;P&gt;access-list ICMP line 1 extended permit icmp any any echo-reply log informational interval 300 (hitcnt=4) 0x0b307247&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We can see that after the ping hit count has gone from 3 to 4.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So does&amp;nbsp; this mean that for every 4 packets sent by PC&amp;nbsp; Hit count increments with 1?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:14:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hit-count-in-asa/m-p/2065984#M396773</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2019-03-12T00:14:15Z</dc:date>
    </item>
    <item>
      <title>Hit count in ASA</title>
      <link>https://community.cisco.com/t5/network-security/hit-count-in-asa/m-p/2065985#M396775</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, that is correct.&lt;/P&gt;&lt;P&gt;Access-list on ASA only matches on the first connection, and the subsequent packets within the same connection will be allowed by default as it is part of the same connections. ASA is a stateful firewall so it has a state table to store the existing connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Oct 2012 02:01:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hit-count-in-asa/m-p/2065985#M396775</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-26T02:01:09Z</dc:date>
    </item>
    <item>
      <title>Hit count in ASA</title>
      <link>https://community.cisco.com/t5/network-security/hit-count-in-asa/m-p/2065986#M396778</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jennifer,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for prompt&amp;nbsp; reply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Oct 2012 02:16:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hit-count-in-asa/m-p/2065986#M396778</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2012-10-26T02:16:25Z</dc:date>
    </item>
  </channel>
</rss>

