<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA5510 SMTP problems in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967386#M439738</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just got a Mail Host Unreachable email from Postini so were the packet tracer results incorrect then?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 10 Jul 2012 15:14:10 GMT</pubDate>
    <dc:creator>Adam Hudson</dc:creator>
    <dc:date>2012-07-10T15:14:10Z</dc:date>
    <item>
      <title>ASA5510 SMTP problems</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967383#M439731</link>
      <description>&lt;P&gt;Up until recently one of my sites was able to get to a postini subnet. Then we started recieving "host unreachable" e-mails. Postini told us SMTP traffic was not getting let in. I've compared the current config to a config that was saved before the issue popped up and found really no noticeable difference. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried a packet tracer trace with no luck:&lt;/P&gt;&lt;P&gt;==============================&lt;/P&gt;&lt;P&gt;SiteB-Firewall# packet-tracer input outside tcp 11.2.2.36 12345 65.19.0.0 25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;============================================&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Attached is a sanitized config. I'm not entirely convinced it's a firewall issue, but I need to some successful testing to prove otherwise.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:28:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967383#M439731</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2019-03-11T23:28:42Z</dc:date>
    </item>
    <item>
      <title>ASA5510 SMTP problems</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967384#M439734</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So only the subnet 65.19.0.0 255.255.240.0 should be able to access the SMTP server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The packet tracer is not properly build&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try this one&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 65.19.0.30 1025 25.107.253.3 eq 25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Right now your ASA is setup to allow connections only from 65.19.0.0 255.255.240.0 to the SMTP server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate all the helpful posts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Jul 2012 22:59:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967384#M439734</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-07-09T22:59:20Z</dc:date>
    </item>
    <item>
      <title>ASA5510 SMTP problems</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967385#M439735</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Julio, yes, only that subnet should be able to reach my SMTP server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the packet trace:&lt;/P&gt;&lt;P&gt;SiteB-Firewall# packet-tracer input outside tcp 65.19.0.30 1025 25.107.$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: UN-NAT&lt;/P&gt;&lt;P&gt;Subtype: static&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface smtp 11.2.2.36 smtp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;&amp;nbsp; match tcp inside host 11.2.2.36 eq 25 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 25.107.253.3/25&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 9453&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;NAT divert to egress interface inside&lt;/P&gt;&lt;P&gt;Untranslate 25.107.253.3/25 to 11.2.2.36/25 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group incoming in interface outside&lt;/P&gt;&lt;P&gt;access-list incoming extended permit tcp object-group Postini interface outside eq smtp&lt;/P&gt;&lt;P&gt;object-group network Postini&lt;/P&gt;&lt;P&gt; network-object 65.19.0.0 255.255.240.0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: VPN&lt;/P&gt;&lt;P&gt;Subtype: ipsec-tunnel-flow&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface smtp 11.2.2.36 smtp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;&amp;nbsp; match tcp inside host 11.2.2.36 eq 25 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 25.107.253.3/25&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 9453&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface smtp 11.2.2.36 smtp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;&amp;nbsp; match tcp inside host 11.2.2.36 eq 25 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 25.107.253.3/25&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 9453&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 41247, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I'm understanding this right, we're testing to make sure the outside interface and my postini subnet can talk. That looks like that was successful, that's good, but only half of the communication. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Testing the other half of the coummuncation, if all of my assumptions have been correct, is making sure the outside interface passes the SMTP traffic back correctly to the inside network. Below is the packet trace I tried, it failed:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SiteB-Firewall# packet-tracer input inside tcp 24.106.253.3 1025 11.2.2$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 11.2.2.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 0 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any BAD_INT_1 any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; no translation group, implicit deny&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; policy_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 11.2.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside 11.2.2.0 255.255.255.0 inside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What's our next step?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jul 2012 14:52:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967385#M439735</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2012-07-10T14:52:48Z</dc:date>
    </item>
    <item>
      <title>ASA5510 SMTP problems</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967386#M439738</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just got a Mail Host Unreachable email from Postini so were the packet tracer results incorrect then?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jul 2012 15:14:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967386#M439738</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2012-07-10T15:14:10Z</dc:date>
    </item>
    <item>
      <title>ASA5510 SMTP problems</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967387#M439739</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can anyone make heads or tails of that last packet tracer output?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jul 2012 13:22:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967387#M439739</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2012-07-11T13:22:28Z</dc:date>
    </item>
    <item>
      <title>ASA5510 SMTP problems</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967388#M439741</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Adam,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry I could not respond this before, I was working on some other things.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are using Port-forwarding to make this happen.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Por-forwarding is only used for incoming connections, for outbound connections the server will use a PAT or NAT rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So as we can see on packet tracer 1 everything looks good from the ASA perspective.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1-Traffic arrives on the outside interface on por 25&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2-ASA checks the ACL and allows the packet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3-ASA does the right nat tranlastion&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4-ASA creates an entry on the XLATE, CONN and Local-Host table&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5-ASA send's the packet out the right interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6-ASA receives the response from the SMTP server, based on the entry on the XLATE and CONN table he will&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perform the nat for the reply&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7-Packet will reach the outside client&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why is the second PT not working?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A/Because as I said you have a port-forwarding rule for the SMTP server and that only works for incoming traffic&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; not outbound traffic ( to make it work you will need to add a Global statement but this will not solve the problem)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please add the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture capout interface outside trace match tcp any host interface_ip eq 25&lt;/P&gt;&lt;P&gt;capture capin interface inside trace match tcp any host SMTP_SERVER_IP eq 25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then generate the traffic and provide us the :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -Show cap capout&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -Show cap capin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate all the helpful posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jul 2012 13:49:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967388#M439741</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-07-11T13:49:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 SMTP problems</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967389#M439743</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;@&lt;A _jive_internal="true" href="https://community.cisco.com/people/jcarvaja" id="jive-5895078356008821766671" style="outline: none; background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; color: #000000; font-weight: bold; font-family: Arial, verdana, sans-serif;"&gt;jcarvaja&lt;/A&gt; I'll try that next.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the test from the outside interface, it fails as well. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SiteB-Firewall# packet-tracer input outside tcp 24.106.253.3 1025 11.2.2.36 25 detail&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 11.2.2.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd7c09ef8, priority=11, domain=permit, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=39, user_data=0x5, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do I need to try next in this config?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jul 2012 17:37:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967389#M439743</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2012-07-11T17:37:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 SMTP problems</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967390#M439746</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Adam,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;add the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list incoming line 1 permit ip any host 11.2.2.36 25 &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jul 2012 17:45:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967390#M439746</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-07-11T17:45:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 SMTP problems</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967391#M439748</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here's the results:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SiteB-Firewall# capture capout interface outside trace match tcp any host 25.107.253.3 eq 25&lt;/P&gt;&lt;P&gt;SiteB-Firewall# capture capin interface inside trace match tcp any host 11.2.2.36 eq 25&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;NOTE: I did not manually generate traffic here.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SiteB-Firewall# sh cap capin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2 packets captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 14:26:39.200154 65.19.1.143.35442 &amp;gt; 11.2.2.36.25: S 1481583325:1481583325(0) win 5744 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2: 14:26:39.682948 65.19.1.134.40522 &amp;gt; 11.2.2.36.25: S 688312206:688312206(0) win 5744 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;2 packets shown&lt;/P&gt;&lt;P&gt;SiteB-Firewall# sh cap capout&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5 packets captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 14:26:33.201710 65.19.1.143.35442 &amp;gt; 25.107.253.3.25: S 3750468370:3750468370(0) win 5744 &lt;MSS 1436=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2: 14:26:33.683085 65.19.1.134.40522 &amp;gt; 25.107.253.3.25: S 15701922:15701922(0) win 5744 &lt;MSS 1436=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 3: 14:26:34.168051 65.19.1.159.33872 &amp;gt; 25.107.253.3.25: S 422177870:422177870(0) win 5744 &lt;MSS 1436=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 4: 14:26:39.200062 65.19.1.143.35442 &amp;gt; 25.107.253.3.25: S 3750468370:3750468370(0) win 5744 &lt;MSS 1436=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 5: 14:26:39.682871 65.19.1.134.40522 &amp;gt; 25.107.253.3.25: S 15701922:15701922(0) win 5744 &lt;MSS 1436=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;5 packets shown&lt;/P&gt;&lt;P&gt;SiteB-Firewall#&lt;/P&gt;&lt;P&gt;====&lt;/P&gt;&lt;P&gt;SiteB-Firewall# SiteB-Firewall# packet-tracer input outside tcp 25.107.253.3 1025 11.2.2.36 25 detail&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: CAPTURE&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd84e46f0, priority=12, domain=capture, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=4963, user_data=0xd7c01278, cs_id=0x0, l3_type=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd7b31b58, priority=1, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=129043, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 11.2.2.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd7b375a0, priority=500, domain=permit, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1, user_data=0x6, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=25.107.253.3, mask=255.255.255.255, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;====&lt;/P&gt;&lt;P&gt;SiteB-Firewall# sh cap capin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10 packets captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 14:26:39.200154 65.19.1.143.35442 &amp;gt; 11.2.2.36.25: S 1481583325:1481583325(0) win 5744 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2: 14:26:39.682948 65.19.1.134.40522 &amp;gt; 11.2.2.36.25: S 688312206:688312206(0) win 5744 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 3: 14:26:51.200276 65.19.1.143.35442 &amp;gt; 11.2.2.36.25: S 1481583325:1481583325(0) win 5744 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 4: 14:26:51.680201 65.19.1.134.40522 &amp;gt; 11.2.2.36.25: S 688312206:688312206(0) win 5744 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 5: 14:26:58.167883 65.19.1.159.33872 &amp;gt; 11.2.2.36.25: S 691920151:691920151(0) win 5744 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 6: 14:27:15.197774 65.19.1.143.35442 &amp;gt; 11.2.2.36.25: S 1326979564:1326979564(0) win 5744 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 7: 14:27:15.677867 65.19.1.134.40522 &amp;gt; 11.2.2.36.25: S 330226058:330226058(0) win 5744 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 8: 14:27:46.166983 65.19.1.159.33872 &amp;gt; 11.2.2.36.25: S 1755337294:1755337294(0) win 5744 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 9: 14:28:03.191899 65.19.1.143.35442 &amp;gt; 11.2.2.36.25: S 465997866:465997866(0) win 5744 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10: 14:28:03.670299 65.19.1.134.40522 &amp;gt; 11.2.2.36.25: S 1234871544:1234871544(0) win 5744 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;10 packets shown&lt;/P&gt;&lt;P&gt;SiteB-Firewall# sh cap capout&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;13 packets captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 14:26:33.201710 65.19.1.143.35442 &amp;gt; 25.107.253.3.25: S 3750468370:3750468370(0) win 5744 &lt;MSS 1436=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2: 14:26:33.683085 65.19.1.134.40522 &amp;gt; 25.107.253.3.25: S 15701922:15701922(0) win 5744 &lt;MSS 1436=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 3: 14:26:34.168051 65.19.1.159.33872 &amp;gt; 25.107.253.3.25: S 422177870:422177870(0) win 5744 &lt;MSS 1436=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 4: 14:26:39.200062 65.19.1.143.35442 &amp;gt; 25.107.253.3.25: S 3750468370:3750468370(0) win 5744 &lt;MSS 1436=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 5: 14:26:39.682871 65.19.1.134.40522 &amp;gt; 25.107.253.3.25: S 15701922:15701922(0) win 5744 &lt;MSS 1436=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 6: 14:26:51.200200 65.19.1.143.35442 &amp;gt; 25.107.253.3.25: S 3750468370:3750468370(0) win 5744 &lt;MSS 1436=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 7: 14:26:51.680125 65.19.1.134.40522 &amp;gt; 25.107.253.3.25: S 15701922:15701922(0) win 5744 &lt;MSS 1436=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 8: 14:26:58.167639 65.19.1.159.33872 &amp;gt; 25.107.253.3.25: S 422177870:422177870(0) win 5744 &lt;MSS 1436=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 9: 14:27:15.197530 65.19.1.143.35442 &amp;gt; 25.107.253.3.25: S 3750468370:3750468370(0) win 5744 &lt;MSS 1436=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10: 14:27:15.677653 65.19.1.134.40522 &amp;gt; 25.107.253.3.25: S 15701922:15701922(0) win 5744 &lt;MSS 1436=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11: 14:27:46.166769 65.19.1.159.33872 &amp;gt; 25.107.253.3.25: S 422177870:422177870(0) win 5744 &lt;MSS 1436=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12: 14:28:03.191670 65.19.1.143.35442 &amp;gt; 25.107.253.3.25: S 3750468370:3750468370(0) win 5744 &lt;MSS 1436=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 13: 14:28:03.670070 65.19.1.134.40522 &amp;gt; 25.107.253.3.25: S 15701922:15701922(0) win 5744 &lt;MSS 1436=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;13 packets shown&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jul 2012 18:40:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967391#M439748</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2012-07-11T18:40:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 SMTP problems</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967392#M439750</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Adam,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you install wireshark on the server and run a capture?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on the captures packets are reaching the server but there is no reply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jul 2012 18:44:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967392#M439750</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-07-11T18:44:26Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 SMTP problems</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967393#M439752</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Results:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SiteB-Firewall# packet-tracer input outside tcp 25.107.253.3 1025 11.2.2.36 25 detail&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: CAPTURE&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd84e46f0, priority=12, domain=capture, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=245849, user_data=0xd7c01278, cs_id=0x0, l3_type=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd7b31b58, priority=1, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=131772, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 11.2.2.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group incoming in interface outside&lt;/P&gt;&lt;P&gt;access-list incoming extended permit tcp any host 11.2.2.36 eq smtp&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd7b3c5f8, priority=12, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=0, user_data=0xd6874100, cs_id=0x0, flags=0x0, protocol=6&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=11.2.2.36, mask=255.255.255.255, port=25, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd7b347d0, priority=0, domain=permit-ip-option, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=14315, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: VPN&lt;/P&gt;&lt;P&gt;Subtype: ipsec-tunnel-flow&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd83106c8, priority=12, domain=ipsec-tunnel-flow, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=11490, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: CAPTURE&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; out id=0xd84e3c28, priority=12, domain=capture, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=372, user_data=0xd7c01bf8, cs_id=0xd84e3538, reverse, flags=0x0, protocol=6&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=11.2.2.36, mask=255.255.255.255, port=25, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface smtp 11.2.2.36 smtp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;&amp;nbsp; match tcp inside host 11.2.2.36 eq 25 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 25.107.253.3/25&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 11143&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; out id=0xd7bfb070, priority=5, domain=nat-reverse, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=11104, user_data=0xd7bfacf0, cs_id=0x0, flags=0x0, protocol=6&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=11.2.2.36, mask=255.255.255.255, port=25, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jul 2012 21:24:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967393#M439752</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2012-07-11T21:24:50Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 SMTP problems</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967394#M439754</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;@&lt;A _jive_internal="true" href="https://community.cisco.com/people/jcarvaja" id="jive-5895078423352700214615" style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; outline: none; color: #000000; font-weight: bold; font-family: Arial, verdana, sans-serif;"&gt;jcarvaja&lt;/A&gt;: That last capture was after adding the line: access-list incoming line 1 permit ip any host 11.2.2.36 25&lt;/P&gt;&lt;P&gt;To my ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you see anything on the captures or packet-trace that would help me out or at least point me in the right direction?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jul 2012 12:13:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967394#M439754</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2012-07-12T12:13:41Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 SMTP problems</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967395#M439756</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Adam,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The packet tracer's and captures are not the right ones:&lt;/P&gt;&lt;P&gt;no cap capout&lt;/P&gt;&lt;P&gt;no cap capin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cap capout interface outside trace match tcp any host 11.255.2.1 eq 25&lt;/P&gt;&lt;P&gt;cap capin interface inside trace match tcp any host 11.2.2.36 eq 25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input tcp 25.107.253.3 1025 11.255.2.1 25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jul 2012 17:03:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967395#M439756</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-07-12T17:03:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 SMTP problems</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967396#M439757</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;cap capout interface outside trace match tcp any host 11.255.2.1 eq 25&lt;/P&gt;&lt;P&gt;cap capin interface inside trace match tcp any host 11.2.2.36 eq 25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SiteB-Firewall# packet-tracer input outside tcp 25.107.253.3 1025 11.255.2.1 25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: CAPTURE&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 11.255.2.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.255 identity&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: NP Identity Ifc&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SiteB-Firewall# sh capture capin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;0 packet captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;0 packet shown&lt;/P&gt;&lt;P&gt;SiteB-Firewall# sh capture capout&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1 packet captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 16:39:58.911543 24.106.253.3.1025 &amp;gt; 10.255.2.1.25: S 1576173544:1576173544(0) win 8192&lt;/P&gt;&lt;P&gt;1 packet shown&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jul 2012 20:54:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967396#M439757</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2012-07-12T20:54:35Z</dc:date>
    </item>
    <item>
      <title>ASA5510 SMTP problems</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967397#M439759</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Adam,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just reviewed the entire configuration one more time and I saw what is going on here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please remove the entire captures one more time:&lt;/P&gt;&lt;P&gt;no cap capin&lt;/P&gt;&lt;P&gt;no cap capout&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are trying to connect from the outside world to the following IP:11.255.2.1 &lt;/P&gt;&lt;P&gt;-That ip belongs to&amp;nbsp; the inside interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *****ASA speaking, you will not be able to access a distant interface***********&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; example: from a inside host you cannot ping or ssh or telnet the outside interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; example 2: from the outside world you will not be able to ping or ssh or telnet the outside interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will need to connect to this IP address&amp;nbsp; 25.107.253.3&lt;/P&gt;&lt;P&gt;That is why you have : static (inside,outside) tcp interface smtp 11.2.2.36 smtp netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So:&lt;/P&gt;&lt;P&gt;1-access-list incoming permit tcp any host 11.2.2.36&lt;/P&gt;&lt;P&gt;2- packet-tracer input outside tcp 4.2.2.2 1025 25.107.253.3 and provide me the result&lt;/P&gt;&lt;P&gt;3- cap capout interface outside match tcp any host 25.107.253.3 eq 25&lt;/P&gt;&lt;P&gt;4-cap capin interface inside match tcp any host 11.2.2.36 eq 25&lt;/P&gt;&lt;P&gt;5-Generate real traffic&lt;/P&gt;&lt;P&gt;6-Send me the show cap capin, show cap capout&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CSC it's a free support community take your time to rate all the engineer's responses that help you resolving your problems.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Jul 2012 20:04:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967397#M439759</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-07-13T20:04:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 SMTP problems</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967398#M439761</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Reconfigured NAT to use seperate public IP addresses for our mail (SMTP) and RDP, using the following commands on the existing config: &lt;/P&gt;&lt;P&gt;===============&lt;/P&gt;&lt;P&gt;no static (inside,outside) tcp interface 3389 11.22.33 3389 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;no static (inside,outside) tcp interface smtp access-list postini-nat &lt;/P&gt;&lt;P&gt;&lt;BR style="font-size: 12.727272033691406px; font-family: 'Droid Serif', Georgia, 'Times New Roman', serif; color: #222222; line-height: 20px; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR style="font-size: 12.727272033691406px; font-family: 'Droid Serif', Georgia, 'Times New Roman', serif; color: #222222; line-height: 20px; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 25.107.253.4 11.22.33 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 25.107.253.5 11.22.36 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;BR style="font-size: 12.727272033691406px; font-family: 'Droid Serif', Georgia, 'Times New Roman', serif; color: #222222; line-height: 20px; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR style="font-size: 12.727272033691406px; font-family: 'Droid Serif', Georgia, 'Times New Roman', serif; color: #222222; line-height: 20px; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;access-list incoming extended permit tcp any host 25.107.253.4 eq 3389 &lt;/P&gt;&lt;P&gt;access-list incoming extended permit tcp 65.19.0.0 255.255.240.0 host 25.107.253.5 eq smtp &lt;/P&gt;&lt;P&gt;access-list incoming extended permit icmp any any &lt;/P&gt;&lt;P&gt;&lt;BR style="font-size: 12.727272033691406px; font-family: 'Droid Serif', Georgia, 'Times New Roman', serif; color: #222222; line-height: 20px; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;access-group incoming in interface outside&lt;/P&gt;&lt;P&gt;=================&lt;/P&gt;&lt;P&gt;These commands did not let the mail through. In addition, after restarting the router, now the firewall can't get to anything on the internal network and I can't remote directly into it. I have to telnet into it through the local router.&lt;/P&gt;&lt;P&gt;&lt;BR style="font-size: 12.727272033691406px; font-family: 'Droid Serif', Georgia, 'Times New Roman', serif; color: #222222; line-height: 20px; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;Attached is sanitized config of that router. I need to figure out why the mail isn't getting through and additionally why now the firewall can't get into the internal network.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jul 2012 14:19:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967398#M439761</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2012-07-19T14:19:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 SMTP problems</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967399#M439763</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ping results:&lt;/P&gt;&lt;P&gt;Router to inside int of Firewall: Good&lt;/P&gt;&lt;P&gt;Rtr to outside int of FW: Good&lt;/P&gt;&lt;P&gt;Rtr to IPS address (past FW): Good&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall to router on int that connects the 2: Good&lt;/P&gt;&lt;P&gt;FW to RTR int on the internal network: Fail&lt;/P&gt;&lt;P&gt;FW to RTR's mpls port: Fail&lt;/P&gt;&lt;P&gt;FW to internal network address (it's own Site): Fail&lt;/P&gt;&lt;P&gt;FW to internal network address (another site): Fail&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jul 2012 14:30:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967399#M439763</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2012-07-19T14:30:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 SMTP problems</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967400#M439764</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tried "clear xlate", have not power cycled the ASA though.&lt;/P&gt;&lt;P&gt;&lt;BR style="font-size: 12.727272033691406px; font-family: 'Droid Serif', Georgia, 'Times New Roman', serif; color: #222222; line-height: 20px; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;More output:&lt;/P&gt;&lt;P&gt;&lt;BR style="font-size: 12.727272033691406px; font-family: 'Droid Serif', Georgia, 'Times New Roman', serif; color: #222222; line-height: 20px; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;SiteB-Firewall# sh eigrp neighbors&lt;/P&gt;&lt;P&gt;EIGRP-IPv4 neighbors for process 102&lt;/P&gt;&lt;P&gt;H&amp;nbsp;&amp;nbsp; Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Interface&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hold Uptime&amp;nbsp;&amp;nbsp; SRTT&amp;nbsp;&amp;nbsp; RTO&amp;nbsp; Q&amp;nbsp; Seq&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (sec)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (ms)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Cnt Num&lt;/P&gt;&lt;P&gt;0&amp;nbsp;&amp;nbsp; 11.255.2.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Et0/1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 14&amp;nbsp; 19:25:28 2&amp;nbsp;&amp;nbsp;&amp;nbsp; 200&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp; 11&lt;/P&gt;&lt;P&gt;=-=&lt;/P&gt;&lt;P&gt;SiteB-Firewall# sh route&lt;/P&gt;&lt;P&gt;&lt;BR style="font-size: 12.727272033691406px; font-family: 'Droid Serif', Georgia, 'Times New Roman', serif; color: #222222; line-height: 20px; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - candidate default, U - per-user static route, o - ODR&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; P - periodic downloaded static route&lt;/P&gt;&lt;P&gt;&lt;BR style="font-size: 12.727272033691406px; font-family: 'Droid Serif', Georgia, 'Times New Roman', serif; color: #222222; line-height: 20px; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;Gateway of last resort is 25.107.253.1 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;BR style="font-size: 12.727272033691406px; font-family: 'Droid Serif', Georgia, 'Times New Roman', serif; color: #222222; line-height: 20px; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 25.107.253.0 255.255.255.248 is directly connected, outside&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 11.255.2.0 255.255.255.252 is directly connected, inside&lt;/P&gt;&lt;P&gt;S*&amp;nbsp;&amp;nbsp; 0.0.0.0 0.0.0.0 [1/0] via 25.107.253.1, outside&lt;/P&gt;&lt;P&gt;=-=&lt;/P&gt;&lt;P&gt;SiteB-Firewall# sh eigrp topology&lt;/P&gt;&lt;P&gt;&lt;BR style="font-size: 12.727272033691406px; font-family: 'Droid Serif', Georgia, 'Times New Roman', serif; color: #222222; line-height: 20px; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;EIGRP-IPv4 Topology Table for AS(102)/ID(25.107.253.3)&lt;/P&gt;&lt;P&gt;&lt;BR style="font-size: 12.727272033691406px; font-family: 'Droid Serif', Georgia, 'Times New Roman', serif; color: #222222; line-height: 20px; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;Codes: P - Passive, A - Active, U - Update, Q - Query, R - Reply,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; r - reply Status, s - sia Status&lt;/P&gt;&lt;P&gt;&lt;BR style="font-size: 12.727272033691406px; font-family: 'Droid Serif', Georgia, 'Times New Roman', serif; color: #222222; line-height: 20px; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;P 0.0.0.0 0.0.0.0, 1 successors, FD is 28160&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; via Rstatic (28160/0)&lt;/P&gt;&lt;P&gt;P 11.255.2.0 255.255.255.252, 1 successors, FD is 2816&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; via Connected, Ethernet0/1&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jul 2012 17:34:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967400#M439764</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2012-07-19T17:34:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 SMTP problems</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967401#M439765</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Complete updated ASA config attached.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jul 2012 17:35:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-smtp-problems/m-p/1967401#M439765</guid>
      <dc:creator>Adam Hudson</dc:creator>
      <dc:date>2012-07-19T17:35:06Z</dc:date>
    </item>
  </channel>
</rss>

