<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: problem with session telnet through asa topology in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/problem-with-session-telnet-through-asa-topology/m-p/943159#M419246</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure exactly what coul be hapenning, but I would suggest as a first troubleshooting step, try to capture this traffic on both interfaces of the ASA. Create an access list to match this traffic flow and then apply it to a capture line and then apply the captures to the ASA's interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list capture permit ip host &lt;SERVER_IP&gt; host &lt;ALCALTEL&gt;&lt;/ALCALTEL&gt;&lt;/SERVER_IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list capture permit ip host &lt;ALCALTEL&gt;&lt;/ALCALTEL&gt;&lt;/P&gt;&lt;P&gt;host &lt;SERVER_IP&gt;&lt;/SERVER_IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture capin access-list capture interface inside packet-length 1520&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would be the capture to use in the inside interface, you would need to create another acl if there's NAT for the outside interface otherwise just create anothe capture line with the same acl and apply it to the outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Run a test and check you captures with the show capture &lt;CAP_NAME&gt; command.&lt;/CAP_NAME&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Start with this and try to determine if the traffic is being dropped in the ASA on the way back.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 11 Jul 2008 16:23:53 GMT</pubDate>
    <dc:creator>lolayo_19</dc:creator>
    <dc:date>2008-07-11T16:23:53Z</dc:date>
    <item>
      <title>problem with session telnet through asa topology</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-session-telnet-through-asa-topology/m-p/943158#M419245</link>
      <description>&lt;P&gt;Hi, we have a problem with a problem with an alcatel device.the problem is that when we telnet (from the management server) to the device everything is ok, but when we give a particular command the results never come back through the telnet console! others command are executed with success! We have tried to run the particular command directly connected to the device and the results for the command executed succesfully! The topology is :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Server(LAN) -&amp;gt; SWITCH -&amp;gt; ASA -&amp;gt; SWITCH -&amp;gt; Alcatel Device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can you explain this...meaning that some commands are running and show results through the above topology...but some no! even though directly connected they are successfully!&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 10:55:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-session-telnet-through-asa-topology/m-p/943158#M419245</guid>
      <dc:creator>mikebrsnet</dc:creator>
      <dc:date>2020-02-21T10:55:10Z</dc:date>
    </item>
    <item>
      <title>Re: problem with session telnet through asa topology</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-session-telnet-through-asa-topology/m-p/943159#M419246</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure exactly what coul be hapenning, but I would suggest as a first troubleshooting step, try to capture this traffic on both interfaces of the ASA. Create an access list to match this traffic flow and then apply it to a capture line and then apply the captures to the ASA's interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list capture permit ip host &lt;SERVER_IP&gt; host &lt;ALCALTEL&gt;&lt;/ALCALTEL&gt;&lt;/SERVER_IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list capture permit ip host &lt;ALCALTEL&gt;&lt;/ALCALTEL&gt;&lt;/P&gt;&lt;P&gt;host &lt;SERVER_IP&gt;&lt;/SERVER_IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture capin access-list capture interface inside packet-length 1520&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would be the capture to use in the inside interface, you would need to create another acl if there's NAT for the outside interface otherwise just create anothe capture line with the same acl and apply it to the outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Run a test and check you captures with the show capture &lt;CAP_NAME&gt; command.&lt;/CAP_NAME&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Start with this and try to determine if the traffic is being dropped in the ASA on the way back.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jul 2008 16:23:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-session-telnet-through-asa-topology/m-p/943159#M419246</guid>
      <dc:creator>lolayo_19</dc:creator>
      <dc:date>2008-07-11T16:23:53Z</dc:date>
    </item>
  </channel>
</rss>

