<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Question behavior ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/question-behavior-asa/m-p/1273031#M417888</link>
    <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a question in a test environment, mount the topology as the attached file, and inserting the wing route to 172.16.2.0/24 via 192.168.0.10 network the ping command works, but any protocol that is oriented to connect does not work. Monitors with the debug command and noticed that the package leaves the station with IP address 192.168.1.3 to the ip address 172.16.2.2 successfully, the packet with SYN flag arrives, and when the 172.16.2.2 server responds with the ACK flag returns without problems. But when the station with IP address 192.168.1.3 returns the packet with flag SYN/ACK the Cisco ASA receives a package and as the ACK not returned by the ASA cisco asa result seems to lose the package and execute a teardown and the connection is not complete. I believe this is because the cisco asa can understand this behavior as an atack main-in-the-middle. Is there a way to disable that check in cisco ASA. I ask that the level of knowledge, because this scenario will not be used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 11:37:10 GMT</pubDate>
    <dc:creator>r-barbosa</dc:creator>
    <dc:date>2020-02-21T11:37:10Z</dc:date>
    <item>
      <title>Question behavior ASA</title>
      <link>https://community.cisco.com/t5/network-security/question-behavior-asa/m-p/1273031#M417888</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a question in a test environment, mount the topology as the attached file, and inserting the wing route to 172.16.2.0/24 via 192.168.0.10 network the ping command works, but any protocol that is oriented to connect does not work. Monitors with the debug command and noticed that the package leaves the station with IP address 192.168.1.3 to the ip address 172.16.2.2 successfully, the packet with SYN flag arrives, and when the 172.16.2.2 server responds with the ACK flag returns without problems. But when the station with IP address 192.168.1.3 returns the packet with flag SYN/ACK the Cisco ASA receives a package and as the ACK not returned by the ASA cisco asa result seems to lose the package and execute a teardown and the connection is not complete. I believe this is because the cisco asa can understand this behavior as an atack main-in-the-middle. Is there a way to disable that check in cisco ASA. I ask that the level of knowledge, because this scenario will not be used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 11:37:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-behavior-asa/m-p/1273031#M417888</guid>
      <dc:creator>r-barbosa</dc:creator>
      <dc:date>2020-02-21T11:37:10Z</dc:date>
    </item>
    <item>
      <title>Re: Question behavior ASA</title>
      <link>https://community.cisco.com/t5/network-security/question-behavior-asa/m-p/1273032#M417889</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The ASA firewall is a stateful firewall and therefore needs to see every packet of a connection.  The connection entry on the ASA is populated upon receipt of the SYN packet.  On the ASAs, this is likely going to be seen as a 'Deny TCP (no connection)' syslog message.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In ASA version 8.2, the TCP State Bypass feature was implemented.  This feature removes all security checks for the traffic - performing very similarly to access-list entry on a Router.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Aug 2009 03:28:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-behavior-asa/m-p/1273032#M417889</guid>
      <dc:creator>Kevin Redmon</dc:creator>
      <dc:date>2009-08-08T03:28:04Z</dc:date>
    </item>
    <item>
      <title>Re: Question behavior ASA</title>
      <link>https://community.cisco.com/t5/network-security/question-behavior-asa/m-p/1273033#M417891</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi kredmon, thanks for responding.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you said that the bypass feature was implemented in version 8.2, but I'm using version 8.4, and there is a acl inside the "permit ip any any". Not necessarily be just that?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Aug 2009 11:40:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-behavior-asa/m-p/1273033#M417891</guid>
      <dc:creator>r-barbosa</dc:creator>
      <dc:date>2009-08-10T11:40:42Z</dc:date>
    </item>
    <item>
      <title>Re: Question behavior ASA</title>
      <link>https://community.cisco.com/t5/network-security/question-behavior-asa/m-p/1273034#M417892</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;8.4 is not a valid ASA version.  You may be running 8.0(4).  This TCP State Bypass feature is available after 8.2(1) or after.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;'permit ip any any' simply states that all UDP and TCP connections are permitted.  However, the ASA will still inspect both connections for state and other security checks.  In the case of TCP, the first packet MUST be a SYN.  Otherwise, without the SYN, we should never see a SYN-ACK.  A syslog message, 'Deny TCP (no connection)', would result if we saw the SYN-ACK without the SYN packet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Kevin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Aug 2009 11:54:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-behavior-asa/m-p/1273034#M417892</guid>
      <dc:creator>Kevin Redmon</dc:creator>
      <dc:date>2009-08-10T11:54:53Z</dc:date>
    </item>
    <item>
      <title>Re: Question behavior ASA</title>
      <link>https://community.cisco.com/t5/network-security/question-behavior-asa/m-p/1273035#M417893</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi kevin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even defining the "permit ip any any" and as you said it will disable the firewall statfull. How to turn off the firewall statfull or enabling bypass?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Aug 2009 15:02:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-behavior-asa/m-p/1273035#M417893</guid>
      <dc:creator>r-barbosa</dc:creator>
      <dc:date>2009-08-10T15:02:49Z</dc:date>
    </item>
    <item>
      <title>Re: Question behavior ASA</title>
      <link>https://community.cisco.com/t5/network-security/question-behavior-asa/m-p/1273036#M417894</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi kevin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i execute the following commands and work. thanks kevin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!----------------------------------&lt;/P&gt;&lt;P&gt;access-list tcp_bypass extended permit ip 192.168.0.0 255.255.0.0 172.16.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map tcp_bypass&lt;/P&gt;&lt;P&gt;	match access-list tcp_bypass&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map tcp_bypass_policy&lt;/P&gt;&lt;P&gt;	class tcp_bypass&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;set connection advanced-options tcp-state-bypass&lt;/P&gt;&lt;P&gt;service-policy tcp_bypass_policy interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!-----------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Aug 2009 17:34:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-behavior-asa/m-p/1273036#M417894</guid>
      <dc:creator>r-barbosa</dc:creator>
      <dc:date>2009-08-10T17:34:21Z</dc:date>
    </item>
    <item>
      <title>Re: Question behavior ASA</title>
      <link>https://community.cisco.com/t5/network-security/question-behavior-asa/m-p/1273037#M417897</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You may also be facing a translation issue.  Please be sure that you have translations defined for the traffic.  For instance, a 'nat (inside) 0' with an access-list defining both the 192.168.0.0/16 to 172.16.2.0/24 networks.  You will also need a 'same-security-traffic permit intra-interface'.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/s1.html#wp1392814" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/s1.html#wp1392814&lt;/A&gt;  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you still experience issues, please gather the debug level syslogs ('logging buffered debug').&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Aug 2009 01:47:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-behavior-asa/m-p/1273037#M417897</guid>
      <dc:creator>Kevin Redmon</dc:creator>
      <dc:date>2009-08-14T01:47:03Z</dc:date>
    </item>
  </channel>
</rss>

