<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Allowing Netbios 137/138 through ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allowing-netbios-137-138-through-asa/m-p/2021789#M399491</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jones,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You already have the netbios protocol inspection,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you are missing is the NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Sep 11 2012 17:09:59: %ASA-7-710005: UDP request discarded from 172.19.241.35/137 to outside:172.19.241.255/137&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this log both of the users are on the same subnet and actually the traffic is going to the broadcast address of the outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is, what is the traffic that is supposed to be allowed ( I know is Netbios) but will the traffic only be innitiatted from the inside interface to the outside interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt;&lt;EM&gt;Remember to rate all the post, for us that is more important that a thanks&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 11 Sep 2012 19:05:49 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2012-09-11T19:05:49Z</dc:date>
    <item>
      <title>Allowing Netbios 137/138 through ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-netbios-137-138-through-asa/m-p/2021785#M399487</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've recently had to move an AS400 system behind an internal ASA firewall and now users are unable to browse to it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA is running Version 8.2(5)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I get these messages: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sep 11 2012 17:09:59: %ASA-7-710005: UDP request discarded from 172.19.241.35/137 to outside:172.19.241.255/137&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way to enable these ports without enabling NAT?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No VPN's involved, just an inside and outside eth interfaces&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--Mike&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:52:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-netbios-137-138-through-asa/m-p/2021785#M399487</guid>
      <dc:creator>jonesm111</dc:creator>
      <dc:date>2019-03-11T23:52:47Z</dc:date>
    </item>
    <item>
      <title>Allowing Netbios 137/138 through ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-netbios-137-138-through-asa/m-p/2021786#M399488</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share your configuration please,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Sep 2012 17:41:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-netbios-137-138-through-asa/m-p/2021786#M399488</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-09-11T17:41:29Z</dc:date>
    </item>
    <item>
      <title>Allowing Netbios 137/138 through ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-netbios-137-138-through-asa/m-p/2021787#M399489</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Mike, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NetBIOS is supported by performing NAT of the packets for NBNS UDP port 137 and NBDS UDP port 138. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Link- &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa83/asdm63/configuration_guide/inspect_overview.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa83/asdm63/configuration_guide/inspect_overview.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you enabled "inspect netbios" on ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Gurpreet&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Sep 2012 17:57:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-netbios-137-138-through-asa/m-p/2021787#M399489</guid>
      <dc:creator>gurpsin2</dc:creator>
      <dc:date>2012-09-11T17:57:06Z</dc:date>
    </item>
    <item>
      <title>Allowing Netbios 137/138 through ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-netbios-137-138-through-asa/m-p/2021788#M399490</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Config pasted below..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;@Gurpreet - I see that:&lt;/P&gt;&lt;P&gt;NetBIOS is supported by performing NAT of the packets for&amp;nbsp; NBNS UDP port 137 and NBDS UDP port 138. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do not know how to Nat these ports though, is it through the fixup protocol?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname fw-us-leb-001&lt;/P&gt;&lt;P&gt;domain-name na.lan&lt;/P&gt;&lt;P&gt;enable password 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 172.19.241.250 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.19.242.1 255.255.255.224 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; no nameif&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.30.240.51 255.255.255.248 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name na.lan&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-inbound extended permit ip any host 172.19.242.2 &lt;/P&gt;&lt;P&gt;access-list OUTSIDE-inbound extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list OUTSIDE-inbound extended permit icmp any host 172.19.242.5 echo &lt;/P&gt;&lt;P&gt;access-list OUTSIDE-outbound extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list OUTSIDE-outbound extended permit tcp any any eq 3389 &lt;/P&gt;&lt;P&gt;access-list OUTSIDE-outbound extended permit tcp any any eq www &lt;/P&gt;&lt;P&gt;access-list OUTSIDE-outbound extended permit tcp any any eq https &lt;/P&gt;&lt;P&gt;access-list OUTSIDE-outbound extended permit tcp any any eq ftp-data &lt;/P&gt;&lt;P&gt;access-list OUTSIDE-outbound extended permit udp host 172.19.242.5 any eq 50 &lt;/P&gt;&lt;P&gt;access-list OUTSIDE-outbound extended permit udp any any eq ntp &lt;/P&gt;&lt;P&gt;access-list OUTSIDE-outbound extended permit udp any any eq tftp &lt;/P&gt;&lt;P&gt;access-list OUTSIDE-outbound extended permit tcp any any eq ftp &lt;/P&gt;&lt;P&gt;access-list OUTSIDE-outbound extended permit tcp any any eq domain &lt;/P&gt;&lt;P&gt;access-list OUTSIDE-outbound extended permit tcp any any eq ssh &lt;/P&gt;&lt;P&gt;access-list OUTSIDE-outbound extended permit tcp any any eq smtp &lt;/P&gt;&lt;P&gt;access-list OUTSIDE-outbound extended permit ip any host 172.19.156.137 &lt;/P&gt;&lt;P&gt;access-list OUTSIDE-outbound extended permit ip any host 172.19.156.138 &lt;/P&gt;&lt;P&gt;access-list OUTSIDE-outbound extended permit ip any host 172.19.157.4 &lt;/P&gt;&lt;P&gt;access-list OUTSIDE-outbound extended permit ip any host 172.19.157.5 &lt;/P&gt;&lt;P&gt;access-list OUTSIDE-outbound extended permit ip any host 172.19.157.12 &lt;/P&gt;&lt;P&gt;access-list OUTSIDE-outbound extended permit ip any host 172.19.157.128 &lt;/P&gt;&lt;P&gt;access-list OUTSIDE-outbound extended permit ip any host 172.19.157.194 &lt;/P&gt;&lt;P&gt;access-list OUTSIDE-outbound extended permit udp any host 172.19.157.9 eq 12345 &lt;/P&gt;&lt;P&gt;access-list OUTSIDE-outbound extended permit tcp any host 172.19.157.9 eq 12345 &lt;/P&gt;&lt;P&gt;access-list OUTSIDE-outbound extended permit icmp any any time-exceeded &lt;/P&gt;&lt;P&gt;access-list OUTSIDE-outbound extended permit icmp any any unreachable &lt;/P&gt;&lt;P&gt;access-list OUTSIDE-outbound extended permit icmp any any source-quench &lt;/P&gt;&lt;P&gt;access-list OUTSIDE-outbound extended permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list OUTSIDE-outbound extended deny ip any any &lt;/P&gt;&lt;P&gt;access-list testcap extended permit tcp any any &lt;/P&gt;&lt;P&gt;access-list testcap extended permit udp any any &lt;/P&gt;&lt;P&gt;access-list testcapinside extended permit tcp any any &lt;/P&gt;&lt;P&gt;access-list testcapinside extended permit udp any any &lt;/P&gt;&lt;P&gt;access-list testcapinside extended permit ip any any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging monitor informational&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging trap informational&lt;/P&gt;&lt;P&gt;logging history errors&lt;/P&gt;&lt;P&gt;logging facility 22&lt;/P&gt;&lt;P&gt;logging host management 172.30.240.253&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;icmp permit any echo-reply outside&lt;/P&gt;&lt;P&gt;icmp permit any unreachable outside&lt;/P&gt;&lt;P&gt;icmp permit any echo-reply management&lt;/P&gt;&lt;P&gt;icmp permit any management&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;access-group OUTSIDE-inbound in interface outside&lt;/P&gt;&lt;P&gt;access-group OUTSIDE-outbound out interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 172.19.241.254 1&lt;/P&gt;&lt;P&gt;route management 172.30.0.0 255.255.0.0 172.30.240.49 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ (management) host 172.30.36.200&lt;/P&gt;&lt;P&gt; timeout 15&lt;/P&gt;&lt;P&gt; key *****&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ (management) host 172.30.36.10&lt;/P&gt;&lt;P&gt; timeout 15&lt;/P&gt;&lt;P&gt; key *****&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa authentication enable console TACACS+ LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication telnet console TACACS+ LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication serial console TACACS+ LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console TACACS+ LOCAL&lt;/P&gt;&lt;P&gt;aaa authorization command LOCAL &lt;/P&gt;&lt;P&gt;snmp-server host management 172.30.240.158 community *****&lt;/P&gt;&lt;P&gt;snmp-server host management 172.30.36.12 community *****&lt;/P&gt;&lt;P&gt;snmp-server host management 172.30.36.195 community *****&lt;/P&gt;&lt;P&gt;snmp-server host management 172.30.36.201 community *****&lt;/P&gt;&lt;P&gt;snmp-server host management 172.30.36.9 poll community *****&lt;/P&gt;&lt;P&gt;snmp-server host management 172.30.38.5 community *****&lt;/P&gt;&lt;P&gt;snmp-server host management 172.30.38.6 community *****&lt;/P&gt;&lt;P&gt;snmp-server host management 172.30.38.7 community *****&lt;/P&gt;&lt;P&gt;snmp-server location Infineon Technologies NA Corp., Milpitas CA 95035 640 N McCarthy Blvd&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;snmp-server contact Infineon NOC-KLU, Phone +43-51777-4444, email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:NOC-KLU@infineon.com"&gt;NOC-KLU@infineon.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;snmp-server community *****&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;snmp-server enable traps syslog&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 172.30.0.0 255.255.0.0 management&lt;/P&gt;&lt;P&gt;ssh timeout 30&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access management&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ntp server 172.30.240.253 key 3725 source management&lt;/P&gt;&lt;P&gt;ntp server 172.30.36.125 source management&lt;/P&gt;&lt;P&gt;tftp-server management 172.30.240.158 /&lt;/P&gt;&lt;P&gt;ssl encryption des-sha1 rc4-md5&lt;/P&gt;&lt;P&gt;username nocna password k63UhvskWqNEcomX encrypted privilege 15&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:18b6d78f5aa4d43bc28ff101ecdc5c1c&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;[OK]&lt;/P&gt;&lt;P&gt;fw-us-leb-001(config)#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Sep 2012 18:09:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-netbios-137-138-through-asa/m-p/2021788#M399490</guid>
      <dc:creator>jonesm111</dc:creator>
      <dc:date>2012-09-11T18:09:10Z</dc:date>
    </item>
    <item>
      <title>Allowing Netbios 137/138 through ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-netbios-137-138-through-asa/m-p/2021789#M399491</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jones,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You already have the netbios protocol inspection,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you are missing is the NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Sep 11 2012 17:09:59: %ASA-7-710005: UDP request discarded from 172.19.241.35/137 to outside:172.19.241.255/137&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this log both of the users are on the same subnet and actually the traffic is going to the broadcast address of the outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is, what is the traffic that is supposed to be allowed ( I know is Netbios) but will the traffic only be innitiatted from the inside interface to the outside interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt;&lt;EM&gt;Remember to rate all the post, for us that is more important that a thanks&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Sep 2012 19:05:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-netbios-137-138-through-asa/m-p/2021789#M399491</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-09-11T19:05:49Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing Netbios 137/138 through ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-netbios-137-138-through-asa/m-p/2021790#M399492</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The traffic is initiated from the outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I turn off Netbios inspection, will that allow the netbios traffic through the firewall? If so, how do I do that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If Nat will resolve this, what do I have to NAT? My server ip address ? because that could complicate things much more..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Sep 2012 19:42:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-netbios-137-138-through-asa/m-p/2021790#M399492</guid>
      <dc:creator>jonesm111</dc:creator>
      <dc:date>2012-09-11T19:42:41Z</dc:date>
    </item>
    <item>
      <title>Allowing Netbios 137/138 through ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-netbios-137-138-through-asa/m-p/2021791#M399493</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jones, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NetBIOS inspection is enabled by default. The&amp;nbsp; NetBios inspection engine translates IP addresses in the NetBios name&amp;nbsp; service (NBNS) packets according to the ASA NAT configuration. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you do not wish to configure nat for server to prevent further issues, you can try to play with the layer 7 inspection map on ASA for netbios inspection and allow it to just log the packest instead of dropping them(since, they will be dropped by default if there is no nat configured):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect netbios NBS&lt;/P&gt;&lt;P&gt;paramaters&lt;/P&gt;&lt;P&gt;protocol-violation action log&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global-policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;no inspect netbios&lt;/P&gt;&lt;P&gt;inspect netbios NBS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Link- &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/inspect_basic.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/inspect_basic.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Let me know if it works&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Gurpreet&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Sep 2012 20:04:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-netbios-137-138-through-asa/m-p/2021791#M399493</guid>
      <dc:creator>gurpsin2</dc:creator>
      <dc:date>2012-09-11T20:04:52Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing Netbios 137/138 through ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-netbios-137-138-through-asa/m-p/2021792#M399494</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That didnt work..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fw-us-leb-001(config-pmap)# parameters &lt;/P&gt;&lt;P&gt;fw-us-leb-001(config-pmap-p)# protocol-violation action log&lt;/P&gt;&lt;P&gt;fw-us-leb-001(config-pmap-p)# exi&lt;/P&gt;&lt;P&gt;fw-us-leb-001(config-pmap)# exi&lt;/P&gt;&lt;P&gt;fw-us-leb-001(config)# policy-map global-policy&lt;/P&gt;&lt;P&gt;fw-us-leb-001(config-pmap)# class inspection_default&lt;/P&gt;&lt;P&gt;fw-us-leb-001(config-pmap-c)# no inspect netbios&lt;/P&gt;&lt;P&gt;ERROR: Inspection not installed or parameters do not match&amp;nbsp; &amp;lt;--- didnt like this&lt;/P&gt;&lt;P&gt;fw-us-leb-001(config-pmap-c)# inspect netbios NBS&lt;/P&gt;&lt;P&gt;fw-us-leb-001(config-pmap-c)#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still getting: &lt;/P&gt;&lt;P&gt;Sep 11 2012 20:18:51: %ASA-7-710005: UDP request discarded from 172.19.241.246/1230 to outside:255.255.255.255/123&lt;/P&gt;&lt;P&gt;Sep 11 2012 20:19:04: %ASA-7-710005: UDP request discarded from 172.19.241.39/138 to outside:172.19.241.255/138&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Sep 2012 20:19:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-netbios-137-138-through-asa/m-p/2021792#M399494</guid>
      <dc:creator>jonesm111</dc:creator>
      <dc:date>2012-09-11T20:19:34Z</dc:date>
    </item>
    <item>
      <title>Allowing Netbios 137/138 through ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-netbios-137-138-through-asa/m-p/2021793#M399495</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hey Jones, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Without removing "inspect netbios" from inspection_default class, we cannot add "inspect netbios NBS" under global-policy. &lt;/P&gt;&lt;P&gt;Make sure, following config is used: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;no inspect netbios&lt;/P&gt;&lt;P&gt;inspect netbios NBS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if you still face any issues. &lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Gurpreet&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Sep 2012 20:31:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-netbios-137-138-through-asa/m-p/2021793#M399495</guid>
      <dc:creator>gurpsin2</dc:creator>
      <dc:date>2012-09-11T20:31:37Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing Netbios 137/138 through ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-netbios-137-138-through-asa/m-p/2021794#M399496</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;BR /&gt;Ok, the commands took but looks like its still discarding netbios packets..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sep 11 2012 20:42:57: %ASA-7-710005: UDP request discarded from 172.19.241.1/137 to outside:172.19.241.255/137&lt;/P&gt;&lt;P&gt;Sep 11 2012 20:42:58: %ASA-7-710005: UDP request discarded from 172.19.241.1/137 to outside:172.19.241.255/137&lt;/P&gt;&lt;P&gt;Sep 11 2012 20:42:59: %ASA-7-710005: UDP request discarded from 172.19.241.246/1230 to outside:255.255.255.255/123&lt;/P&gt;&lt;P&gt;Sep 11 2012 20:43:06: %ASA-7-710005: UDP request discarded from 172.19.241.39/138 to outside:172.19.241.255/138&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Sep 2012 20:45:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-netbios-137-138-through-asa/m-p/2021794#M399496</guid>
      <dc:creator>jonesm111</dc:creator>
      <dc:date>2012-09-11T20:45:16Z</dc:date>
    </item>
    <item>
      <title>Allowing Netbios 137/138 through ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-netbios-137-138-through-asa/m-p/2021795#M399497</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jones,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have nat control enabled????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If yes you will need a NAT, if not the only thing you need is an ACL as traffic is comming from a lower security level interface to a higher.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Sep 2012 20:49:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-netbios-137-138-through-asa/m-p/2021795#M399497</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-09-11T20:49:34Z</dc:date>
    </item>
    <item>
      <title>Allowing Netbios 137/138 through ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-netbios-137-138-through-asa/m-p/2021796#M399498</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I do not think "Nat Control" is enabled, how can I check?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Sep 2012 20:34:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-netbios-137-138-through-asa/m-p/2021796#M399498</guid>
      <dc:creator>jonesm111</dc:creator>
      <dc:date>2012-09-12T20:34:35Z</dc:date>
    </item>
    <item>
      <title>Allowing Netbios 137/138 through ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-netbios-137-138-through-asa/m-p/2021797#M399499</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jones, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Show run nat-control&lt;/P&gt;&lt;P&gt;Also If traffic is going from out to in it needs to be allow on the outside ACL....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Any other question.... Let me Know.. Just remember to rate all of my answers.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Sep 2012 20:46:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-netbios-137-138-through-asa/m-p/2021797#M399499</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-09-12T20:46:32Z</dc:date>
    </item>
  </channel>
</rss>

