<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA SYN ACK missing related with a firewall inside a DMZ of another ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-syn-ack-missing-related-with-a-firewall-inside-a-dmz-of/m-p/2036123#M439113</link>
    <description>&lt;P&gt;Hi I have two control point, two firewall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the second one is linked inside one DMZ from the first firewall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route is good and inside the DMZ from first firewall I have servers too&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so&amp;nbsp; to be more clear we could call as IP for the DMZ from first firewall,&amp;nbsp; Interface IP 1.1.1.1 that generate this DMZ with first firewall (netmask&amp;nbsp; 255.255.0.0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inside the DMZ I have an interface from second firewall with IP 1.1.1.5 and inside DMZ 1.1/16 I have servers too&lt;/P&gt;&lt;P&gt;keep one test server with IP 1.1.1.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The LAN passing the second firewall is 2.2.2.1 ever 16 bits of netmask (255.255.0.0)&lt;/P&gt;&lt;P&gt;inside&amp;nbsp; the DMZ generated from second firewall I have a machine with IP 2.2.2.9&amp;nbsp; that need to access in TCP services on machine 1.1.1.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;running the test I have this scenario:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TCP packets from 2.2.2.9 pass the second firewall and arrive inside DMZ with net 1.1/16 and arrive to server with IP 1.1.1.3&lt;/P&gt;&lt;P&gt;defaul gateway (to answer to originating machine with IP 2.2.2.9) is 1.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA&amp;nbsp; interface 1.1.1.1 claim a missing related as it haven't mapped the&amp;nbsp; connection that has passed on first firewall. I need only that 1.1.1.1&amp;nbsp; route packets to second firewall (who own net 2.2/16) avoiding to be&amp;nbsp; trappen in missing related check&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;at&amp;nbsp; start it was working! around 1 year ago we upgraded IOS to 8.4 and ever&amp;nbsp; so late (one year) doing maintenance to a machine I discovered it was&amp;nbsp; no longer talking with these server on net 1.1/16&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I&amp;nbsp; have found on cisco docs chapter 51 and TCP State Bypass&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ............&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; is this the only answer and the right answer?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;before was working, is something that has changed inside ASA IOS 8.4 ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTML version of TCP State Bypass I found that should, could solve my issue is:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080b2d922.shtml" rel="nofollow" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080b2d922.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any other info or solutions? is that what I have to configure so to solve? and before was working why no more?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 23:44:47 GMT</pubDate>
    <dc:creator>albertocolosi</dc:creator>
    <dc:date>2019-03-11T23:44:47Z</dc:date>
    <item>
      <title>ASA SYN ACK missing related with a firewall inside a DMZ of another ASA</title>
      <link>https://community.cisco.com/t5/network-security/asa-syn-ack-missing-related-with-a-firewall-inside-a-dmz-of/m-p/2036123#M439113</link>
      <description>&lt;P&gt;Hi I have two control point, two firewall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the second one is linked inside one DMZ from the first firewall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route is good and inside the DMZ from first firewall I have servers too&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so&amp;nbsp; to be more clear we could call as IP for the DMZ from first firewall,&amp;nbsp; Interface IP 1.1.1.1 that generate this DMZ with first firewall (netmask&amp;nbsp; 255.255.0.0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inside the DMZ I have an interface from second firewall with IP 1.1.1.5 and inside DMZ 1.1/16 I have servers too&lt;/P&gt;&lt;P&gt;keep one test server with IP 1.1.1.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The LAN passing the second firewall is 2.2.2.1 ever 16 bits of netmask (255.255.0.0)&lt;/P&gt;&lt;P&gt;inside&amp;nbsp; the DMZ generated from second firewall I have a machine with IP 2.2.2.9&amp;nbsp; that need to access in TCP services on machine 1.1.1.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;running the test I have this scenario:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TCP packets from 2.2.2.9 pass the second firewall and arrive inside DMZ with net 1.1/16 and arrive to server with IP 1.1.1.3&lt;/P&gt;&lt;P&gt;defaul gateway (to answer to originating machine with IP 2.2.2.9) is 1.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA&amp;nbsp; interface 1.1.1.1 claim a missing related as it haven't mapped the&amp;nbsp; connection that has passed on first firewall. I need only that 1.1.1.1&amp;nbsp; route packets to second firewall (who own net 2.2/16) avoiding to be&amp;nbsp; trappen in missing related check&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;at&amp;nbsp; start it was working! around 1 year ago we upgraded IOS to 8.4 and ever&amp;nbsp; so late (one year) doing maintenance to a machine I discovered it was&amp;nbsp; no longer talking with these server on net 1.1/16&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I&amp;nbsp; have found on cisco docs chapter 51 and TCP State Bypass&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ............&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; is this the only answer and the right answer?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;before was working, is something that has changed inside ASA IOS 8.4 ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTML version of TCP State Bypass I found that should, could solve my issue is:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080b2d922.shtml" rel="nofollow" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080b2d922.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any other info or solutions? is that what I have to configure so to solve? and before was working why no more?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:44:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-syn-ack-missing-related-with-a-firewall-inside-a-dmz-of/m-p/2036123#M439113</guid>
      <dc:creator>albertocolosi</dc:creator>
      <dc:date>2019-03-11T23:44:47Z</dc:date>
    </item>
    <item>
      <title>ASA SYN ACK missing related with a firewall inside a DMZ of anot</title>
      <link>https://community.cisco.com/t5/network-security/asa-syn-ack-missing-related-with-a-firewall-inside-a-dmz-of/m-p/2036124#M439114</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alberto, the easier thing would be to add a static route to server 10.2.2.10 defining 10.3.0.0/16 as being via 10.2.2.100 (ie: start -&amp;gt; run -&amp;gt; cmd -&amp;gt; route add 10.3.0.0 mask 255.255.0.0 10.2.2.100). A better solution would be to make the network between the 2 firewalls to be a point to point link with no devices on that subnet. This depends on having enough interfaces or using sub-interfaces. You should try and avoid static bypass if possible. Matthew&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Aug 2012 12:52:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-syn-ack-missing-related-with-a-firewall-inside-a-dmz-of/m-p/2036124#M439114</guid>
      <dc:creator>mwinnett</dc:creator>
      <dc:date>2012-08-28T12:52:15Z</dc:date>
    </item>
    <item>
      <title>ASA SYN ACK missing related with a firewall inside a DMZ of anot</title>
      <link>https://community.cisco.com/t5/network-security/asa-syn-ack-missing-related-with-a-firewall-inside-a-dmz-of/m-p/2036125#M439115</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another option not the easy one is to use the proxy arp feature and the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you know this is a routing problem so what you could do is to NAT the 10.2/16 to a phantom subnet that the internal ASA does not know how to get to so he will always need to send the traffic to the primary ASA &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; This will also solve the routing problem.. Of course now the hosts at 10.1/16 will need to talk to the phantom subnet insted of the 10.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to rate all the helpful posts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Aug 2012 19:06:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-syn-ack-missing-related-with-a-firewall-inside-a-dmz-of/m-p/2036125#M439115</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-08-28T19:06:10Z</dc:date>
    </item>
  </channel>
</rss>

