<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5510 Internal Routing Problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857073#M456271</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am going to quickly add that I built the ASAs configuration in ASDM, I am not affraid to use the console though &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 24 Jan 2012 15:16:49 GMT</pubDate>
    <dc:creator>peterhammerl</dc:creator>
    <dc:date>2012-01-24T15:16:49Z</dc:date>
    <item>
      <title>ASA 5510 Internal Routing Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857072#M456270</link>
      <description>&lt;P&gt;I am having a problem where my (newly setup) ASA 5510 is closing TCP connections for data routed to another router on my internal network.&amp;nbsp; Here is a diagram of how its setup:&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/2/1/6/73612-Layout.jpg" alt="Layout.jpg" class="jive-image-thumbnail jive-image" height="403" onclick="" width="515" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my running conf on the ASA (some bits censored):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;Result of the command: "show run"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;: Saved&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;:&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;ASA Version 8.4(3) &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;!&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;hostname HPAFW01&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;domain-name SNIP&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;enable password SNIP&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;passwd SNIP&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;names&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;name 192.168.7.26 Spam_Firewall&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;name 192.168.12.0 xxxSt_VideoSec description xxx St Video/Security&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;name 192.168.8.0 Phone_System-network description Phone System&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;name 192.168.6.0 Inside-network description Main Network&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;name 192.168.11.0 EnduraSM-network description Endura System Manager&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;name 192.168.15.0 Data-network1 description Data1&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;name 192.168.13.0 Video-network1 description Video/Security1&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;name 192.168.16.0 Data-network2 description Data2&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;name 192.168.14.0 Video-network2 description Video/Security2&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;name 192.168.7.11 FTP_Server description FTP Server&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;name 192.168.7.17 Mail_Server&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;name 192.168.6.1 yyy description yyy&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;name 192.168.6.2 zzz description zzz&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;name 192.168.7.12 HPA02&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;!&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;interface Ethernet0/0&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;nameif Outside&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;security-level 0&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;ip address x.x.x.x 255.255.255.240 &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;!&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;interface Ethernet0/1&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;nameif Inside&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;security-level 100&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;ip address 192.168.7.20 255.255.254.0 &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;!&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;interface Ethernet0/2&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;nameif Phone_System&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;security-level 100&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;ip address 192.168.8.254 255.255.255.0 &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;!&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;interface Ethernet0/3&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;shutdown&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;no nameif&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;no security-level&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;no ip address&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;!&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;interface Management0/0&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;nameif management&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;security-level 100&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;management-only&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;!&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;boot system disk0:/asa843-k8.bin&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;ftp mode passive&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;clock timezone EST -5&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;domain-name abc.ca&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network MainNetwork&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;subnet 192.168.6.0 255.255.254.0&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network HPA02&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;host 192.168.7.12&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network Phone_System-network&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;subnet 192.168.8.0 255.255.255.0&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;description Created during name migration&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network HPA01&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;host 192.168.7.11&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;description FTP Server&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network xxx&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;host 192.168.6.1&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;description xxx&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network HPA07&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;host 192.168.7.17&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;description Mail Server&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network Pelco_Endura-Network&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;subnet 192.168.11.0 255.255.255.0&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;description Endura System Manager&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network Data-Network1&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;subnet 192.168.15.0 255.255.255.0&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;description Data Network 1&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network Security-Network1&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;subnet 192.168.13.0 255.255.255.0&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;description Sec Network 1&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network Data-Network2&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;subnet 192.168.16.0 255.255.255.0&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;description Data Network 2&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network Security-Network2&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;subnet 192.168.14.0 255.255.255.0&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;description Sec Network 2&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network Cisco-Management-Network&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network xxx&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;host 192.168.6.2&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;description xxx&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network SpamFirewall&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;host 192.168.7.26&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;description Barracuda Spam Firewall&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network HTTP&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;host 192.168.7.26&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network msrdp&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;host 192.168.6.5&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network HPA03&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;host 192.168.7.13&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network Ping&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;subnet 192.168.6.0 255.255.254.0&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network HTTP-In-HPA10&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;host 192.168.6.4&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network NAT-HPA01-FTP-In&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;host 192.168.7.11&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network NAT-HPA01-FTPData-In&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;host 192.168.7.11&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object service FTPData50000-50010&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;service tcp source range 50000 50010 destination range 50000 50010 &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network NAT-HPA03-PPTP-In&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;host 192.168.7.13&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network NAT-HPA07-HTTPS-In&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;host 192.168.7.17&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network NAT-Barracuda-SMTP-In&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;host 192.168.7.26&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network NAT-HPA07-DrOfficeSMTP-In&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;host 192.168.7.17&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network NAT-HPA07-HTTPSSPOWA-In&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;host 192.168.7.17&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network NAT-HPA07-HTTPSIntranet-In&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;host 192.168.7.17&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network NAT-HPA07-HTTPS2-In&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;host 192.168.7.17&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network DrOffice&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;host a.a.a.a&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network DrOffice2&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;host b.b.b.b&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network HPA07-IP2&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;host 192.168.7.37&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object-group protocol TCPUDP&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;protocol-object udp&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;protocol-object tcp&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object-group service DM_INLINE_TCP_1 tcp&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;port-object eq ftp&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;port-object eq www&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object-group network DM_INLINE_NETWORK_1&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;network-object object HPA_MainNetwork&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;network-object object Pelco_Endura-Network&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;network-object object Data-Network1&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;network-object object Security-Network1&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;network-object object Data-Network2&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;network-object object Security-Network2&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object-group network DM_INLINE_NETWORK_2&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;network-object object xxx&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;network-object object yyy&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;protocol-object ip&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;protocol-object udp&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;protocol-object tcp&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object-group service DM_INLINE_TCPUDP_1 tcp-udp&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;port-object eq 2252&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;port-object eq 5685&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object-group service DM_INLINE_TCP_2 tcp&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;port-object range 50000 50010&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;port-object eq 990&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object-group network DM_INLINE_NETWORK_12&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;network-object object DrOwsianik&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;network-object object DrPray&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object-group service DM_INLINE_TCP_3 tcp&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;port-object eq 8000&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;port-object eq 8008&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;port-object eq 8332&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;port-object eq 8333&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;port-object eq 8480&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object-group network DM_INLINE_NETWORK_14&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;network-object object HPA07&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;network-object object HPA07-IP2&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in remark Allow DNS Out&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in extended permit object-group TCPUDP any any eq domain log disable &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in remark Allow HTTP Out&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in extended permit tcp any any eq www log disable &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in remark Allow HTTPS Out&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in extended permit tcp any any eq https log disable &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in remark Allow FTP Out&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in extended permit tcp any any eq ftp log disable &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in remark Allow SSH Out&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in extended permit tcp any any eq ssh log disable &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in remark Allow SMTP Out&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in extended permit tcp any any eq smtp log disable &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in remark Allow Whois Out&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in extended permit tcp any any eq whois log disable &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in remark Allow Port 81 Out&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in extended permit tcp any any eq 81 log disable &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in remark Allow POP3 out for xxx&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in extended permit tcp object-group DM_INLINE_NETWORK_2 any eq pop3 log disable &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in remark Allow Blackberry BES Out&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in extended permit tcp any any eq 3101 log disable &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in remark Allow MSRDP Out&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in extended permit tcp any any eq 3389 log disable &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in remark Allow Port 8000 Out&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in extended permit tcp any any object-group DM_INLINE_TCP_3 log disable &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in remark Allow Interac Machines Out&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in extended permit tcp any any eq 8013 log disable &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in remark Allow Network Time Out&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in extended permit udp any any eq ntp log disable &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in remark Allow AIS Out&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in extended permit object-group TCPUDP any any object-group DM_INLINE_TCPUDP_1 log disable &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in remark Allow SFTP Out&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in extended permit tcp any any object-group DM_INLINE_TCP_2 log disable &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in remark Allow Traceroute Out&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in extended permit icmp any any traceroute log disable &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in extended permit icmp any any echo log disable &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in extended permit udp any any eq time log disable &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in remark Allow Access to Phone System&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list Inside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 any any log disable &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;:SNIPPED OUT FOR SECURITY&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;pager lines 24&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;logging enable&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;logging asdm informational&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;mtu Outside 1500&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;mtu Inside 1500&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;mtu Phone_System 1500&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;mtu management 1500&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;asdm image disk0:/asdm-647.bin&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;no asdm history enable&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;arp timeout 14400&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;nat (any,Outside) source static NAT-HPA01-FTPData-In interface service FTPData50000-50010 FTPData50000-50010&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;!&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network HPA_MainNetwork&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;nat (Inside,Outside) dynamic interface&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network NAT-HPA01-FTP-In&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;nat (any,Outside) static interface service tcp ftp ftp &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network NAT-HPA03-PPTP-In&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;nat (any,Outside) static interface service tcp pptp pptp &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network NAT-HPA07-HTTPS-In&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;nat (any,Outside) static interface service tcp https https &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network NAT-Barracuda-SMTP-In&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;nat (any,Outside) static interface service tcp smtp smtp &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network NAT-HPA07-DrOSMTP-In&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;nat (any,any) static y.y.y.y service tcp smtp smtp &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network NAT-HPA07-HTTPSSPOWA-In&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;nat (any,any) static y.y.y.y service tcp 444 444 &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network NAT-HPA07-HTTPSIntranet-In&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;nat (any,any) static y.y.y.y service tcp https https &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network NAT-HPA07-HTTPS2-In&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;nat (any,any) static y.y.y.y service tcp www www &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-group Outside_access_in in interface Outside&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-group Inside_access_in in interface Inside&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-group Phone_System_access_in in interface Phone_System&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;route Outside 0.0.0.0 0.0.0.0 z.z.z.z 10 :Routes to external Gateway&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;route Inside 192.168.9.0 255.255.255.0 192.168.7.29 1&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;route Inside EnduraSM-network 255.255.255.0 192.168.7.29 1&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;route Inside MainOffice_VideoSec 255.255.255.0 192.168.7.29 1&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;route Inside Video-network1 255.255.255.0 192.168.7.29 1&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;route Inside Video-network2 255.255.255.0 192.168.7.29 1&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;route Inside Data-network1 255.255.255.0 192.168.7.29 1&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;route Inside Data-network2 255.255.255.0 192.168.7.29 1&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;http server enable&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;http Inside-network 255.255.254.0 Inside&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;no snmp-server location&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;no snmp-server contact&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;sysopt connection tcpmss 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;telnet Inside-network 255.255.254.0 Inside&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;telnet timeout 5&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;ssh Inside-network 255.255.254.0 Inside&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;ssh timeout 5&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;console timeout 0&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;management-access Inside&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;dhcpd enable management&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;!&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;threat-detection basic-threat&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;threat-detection statistics&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;ntp server 132.246.11.227 source Outside prefer&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;webvpn&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;!&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;class-map global-class&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;match access-list global_mpc&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;class-map inspection_default&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;match default-inspection-traffic&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;!&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;!&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;parameters&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;policy-map global_policy&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;class inspection_default&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;class global-class&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&amp;nbsp; csc fail-open&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;!&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;service-policy global_policy global&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The router/switch at 192.168.7.29 (its an HP) has its default route set to the ASA and knows about all the networks connected to it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem I am having is lets say I am sitting on my 192.168.6.0/23 network and want to send some data (or receive) from the 192.168.12.0/24 network.&amp;nbsp; Packets not requiring the 3 step handshake work perfectly (eg, I can ping the 12.0/24 network and get a reply no problem).&amp;nbsp; Any HTTP or other TCP connection gets immediately built and dropped by the ASA.&amp;nbsp; Here is an excerpt of the log (from last night):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:09|302015|HPA02|53|192.168.12.10|64374|Built inbound UDP connection 27987 for Inside:HPA02/53 (HPA02/53) to Inside:192.168.12.10/64374 (192.168.12.10/64374)&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:09|302015|FTP_Server|53|192.168.12.10|64374|Built inbound UDP connection 27986 for Inside:FTP_Server/53 (FTP_Server/53) to Inside:192.168.12.10/64374 (192.168.12.10/64374)&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:09|302016|HPA02|53|192.168.12.10|62344|Teardown UDP connection 27984 for Inside:HPA02/53 to Inside:192.168.12.10/62344 duration 0:00:00 bytes 0&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:09|302016|FTP_Server|53|192.168.12.10|62344|Teardown UDP connection 27983 for Inside:FTP_Server/53 to Inside:192.168.12.10/62344 duration 0:00:00 bytes 0&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:09|302016|HPA02|53|192.168.13.178|55282|Teardown UDP connection 27980 for Inside:HPA02/53 to Inside:192.168.13.178/55282 duration 0:00:00 bytes 0&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:09|302016|FTP_Server|53|192.168.13.178|55282|Teardown UDP connection 27979 for Inside:FTP_Server/53 to Inside:192.168.13.178/55282 duration 0:00:00 bytes 0&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:09|302016|HPA02|53|192.168.13.10|57948|Teardown UDP connection 27978 for Inside:HPA02/53 to Inside:192.168.13.10/57948 duration 0:00:00 bytes 0&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:09|302016|FTP_Server|53|192.168.13.10|57948|Teardown UDP connection 27977 for Inside:FTP_Server/53 to Inside:192.168.13.10/57948 duration 0:00:00 bytes 0&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:08|106015|192.168.13.104|1720|192.168.8.1|61444|Deny TCP (no connection) from 192.168.13.104/1720 to 192.168.8.1/61444 flags ACK&amp;nbsp; on interface Inside&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:08|302015|HPA02|53|192.168.12.10|62344|Built inbound UDP connection 27984 for Inside:HPA02/53 (HPA02/53) to Inside:192.168.12.10/62344 (192.168.12.10/62344)&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:08|302015|FTP_Server|53|192.168.12.10|62344|Built inbound UDP connection 27983 for Inside:FTP_Server/53 (FTP_Server/53) to Inside:192.168.12.10/62344 (192.168.12.10/62344)&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:08|302014|192.168.7.16|56861|192.168.14.203|3001|Teardown TCP connection 27773 for Inside:192.168.7.16/56861 to Inside:192.168.14.203/3001 duration 0:00:30 bytes 0 SYN Timeout&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:08|302013|192.168.7.16|57187|192.168.14.203|3001|Built inbound TCP connection 27982 for Inside:192.168.7.16/57187 (192.168.7.16/57187) to Inside:192.168.14.203/3001 (192.168.14.203/3001)&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:08|106015|192.168.13.104|1720|192.168.8.1|61440|Deny TCP (no connection) from 192.168.13.104/1720 to 192.168.8.1/61440 flags ACK&amp;nbsp; on interface Inside&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:08|302015|HPA02|53|192.168.13.178|55282|Built inbound UDP connection 27980 for Inside:HPA02/53 (HPA02/53) to Inside:192.168.13.178/55282 (192.168.13.178/55282)&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:08|302015|FTP_Server|53|192.168.13.178|55282|Built inbound UDP connection 27979 for Inside:FTP_Server/53 (FTP_Server/53) to Inside:192.168.13.178/55282 (192.168.13.178/55282)&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:08|302015|HPA02|53|192.168.13.10|57948|Built inbound UDP connection 27978 for Inside:HPA02/53 (HPA02/53) to Inside:192.168.13.10/57948 (192.168.13.10/57948)&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:08|302015|FTP_Server|53|192.168.13.10|57948|Built inbound UDP connection 27977 for Inside:FTP_Server/53 (FTP_Server/53) to Inside:192.168.13.10/57948 (192.168.13.10/57948)&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:08|302014|192.168.7.16|56860|192.168.13.207|3001|Teardown TCP connection 27765 for Inside:192.168.7.16/56860 to Inside:192.168.13.207/3001 duration 0:00:30 bytes 0 SYN Timeout&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:08|302013|192.168.7.16|57186|192.168.13.207|3001|Built inbound TCP connection 27976 for Inside:192.168.7.16/57186 (192.168.7.16/57186) to Inside:192.168.13.207/3001 (192.168.13.207/3001)&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:08|302016|HPA02|53|192.168.12.10|64374|Teardown UDP connection 27972 for Inside:HPA02/53 to Inside:192.168.12.10/64374 duration 0:00:00 bytes 0&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:07|302014|192.168.7.16|56859|192.168.13.206|3001|Teardown TCP connection 27761 for Inside:192.168.7.16/56859 to Inside:192.168.13.206/3001 duration 0:00:30 bytes 0 SYN Timeout&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:07|302013|192.168.7.16|57179|192.168.13.206|3001|Built inbound TCP connection 27975 for Inside:192.168.7.16/57179 (192.168.7.16/57179) to Inside:192.168.13.206/3001 (192.168.13.206/3001)&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:07|302013|192.168.7.16|57178|192.168.13.208|3001|Built inbound TCP connection 27974 for Inside:192.168.7.16/57178 (192.168.7.16/57178) to Inside:192.168.13.208/3001 (192.168.13.208/3001)&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:07|302014|192.168.7.16|56858|192.168.14.204|3001|Teardown TCP connection 27758 for Inside:192.168.7.16/56858 to Inside:192.168.14.204/3001 duration 0:00:30 bytes 0 SYN Timeout&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:07|302013|192.168.7.16|57177|192.168.14.204|3001|Built inbound TCP connection 27973 for Inside:192.168.7.16/57177 (192.168.7.16/57177) to Inside:192.168.14.204/3001 (192.168.14.204/3001)&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:07|302015|HPA02|53|192.168.12.10|64374|Built inbound UDP connection 27972 for Inside:HPA02/53 (HPA02/53) to Inside:192.168.12.10/64374 (192.168.12.10/64374)&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:07|302016|HPA02|53|192.168.12.10|62344|Teardown UDP connection 27971 for Inside:HPA02/53 to Inside:192.168.12.10/62344 duration 0:00:00 bytes 0&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:07|302016|HPA02|53|192.168.13.178|55185|Teardown UDP connection 27970 for Inside:HPA02/53 to Inside:192.168.13.178/55185 duration 0:00:00 bytes 0&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:07|302016|FTP_Server|53|192.168.13.178|55185|Teardown UDP connection 27969 for Inside:FTP_Server/53 to Inside:192.168.13.178/55185 duration 0:00:00 bytes 0&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:07|302016|FTP_Server|53|192.168.12.10|64374|Teardown UDP connection 27968 for Inside:FTP_Server/53 to Inside:192.168.12.10/64374 duration 0:00:00 bytes 0&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:06|302015|HPA02|53|192.168.12.10|62344|Built inbound UDP connection 27971 for Inside:HPA02/53 (HPA02/53) to Inside:192.168.12.10/62344 (192.168.12.10/62344)&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:06|302015|HPA02|53|192.168.13.178|55185|Built inbound UDP connection 27970 for Inside:HPA02/53 (HPA02/53) to Inside:192.168.13.178/55185 (192.168.13.178/55185)&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:06|302015|FTP_Server|53|192.168.13.178|55185|Built inbound UDP connection 27969 for Inside:FTP_Server/53 (FTP_Server/53) to Inside:192.168.13.178/55185 (192.168.13.178/55185)&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:06|302015|FTP_Server|53|192.168.12.10|64374|Built inbound UDP connection 27968 for Inside:FTP_Server/53 (FTP_Server/53) to Inside:192.168.12.10/64374 (192.168.12.10/64374)&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:06|302016|FTP_Server|53|192.168.12.10|62344|Teardown UDP connection 27965 for Inside:FTP_Server/53 to Inside:192.168.12.10/62344 duration 0:00:00 bytes 0&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:06|106015|192.168.13.105|1720|192.168.8.1|61442|Deny TCP (no connection) from 192.168.13.105/1720 to 192.168.8.1/61442 flags ACK&amp;nbsp; on interface Inside&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:06|106015|192.168.13.105|1720|192.168.8.1|61443|Deny TCP (no connection) from 192.168.13.105/1720 to 192.168.8.1/61443 flags ACK&amp;nbsp; on interface Inside&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:06|302016|HPA02|53|192.168.12.10|64374|Teardown UDP connection 27964 for Inside:HPA02/53 to Inside:192.168.12.10/64374 duration 0:00:00 bytes 0&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:05|302015|FTP_Server|53|192.168.12.10|62344|Built inbound UDP connection 27965 for Inside:FTP_Server/53 (FTP_Server/53) to Inside:192.168.12.10/62344 (192.168.12.10/62344)&lt;/P&gt;&lt;P&gt;6|Jan 23 2012|18:20:05|302016|HPA02|53|192.168.13.178|61975|Teardown UDP connection 27963 for Inside:HPA02/53 to Inside:192.168.13.178/61975 duration 0:00:00 bytes 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This setup used to works perfectly on my old firewall (Watchguard) but I cant seem to figure out what is happening here (I am migrating away from the watchguard to the cisco).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The routing between my 6.0/23 and the 8.0/24 works perfectly, as does the internet in and out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help is appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:18:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857072#M456270</guid>
      <dc:creator>peterhammerl</dc:creator>
      <dc:date>2019-03-11T22:18:41Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 Internal Routing Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857073#M456271</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am going to quickly add that I built the ASAs configuration in ASDM, I am not affraid to use the console though &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jan 2012 15:16:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857073#M456271</guid>
      <dc:creator>peterhammerl</dc:creator>
      <dc:date>2012-01-24T15:16:49Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 Internal Routing Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857074#M456272</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Which one will be route for 12.0/24 ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cant find &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;name 192.168.7.26 Spam_Firewall&lt;/P&gt;&lt;P&gt;name 192.168.12.0 xxxSt_VideoSec description xxx St Video/Security&lt;/P&gt;&lt;P&gt;name 192.168.8.0 Phone_System-network description Phone System&lt;/P&gt;&lt;P&gt;name 192.168.6.0 Inside-network description Main Network&lt;/P&gt;&lt;P&gt;name 192.168.11.0 EnduraSM-network description Endura System Manager&lt;/P&gt;&lt;P&gt;name 192.168.15.0 Data-network1 description Data1&lt;/P&gt;&lt;P&gt;name 192.168.13.0 Video-network1 description Video/Security1&lt;/P&gt;&lt;P&gt;name 192.168.16.0 Data-network2 description Data2&lt;/P&gt;&lt;P&gt;name 192.168.14.0 Video-network2 description Video/Security2&lt;/P&gt;&lt;P&gt;name 192.168.7.11 FTP_Server description FTP Server&lt;/P&gt;&lt;P&gt;name 192.168.7.17 Mail_Server&lt;/P&gt;&lt;P&gt;name 192.168.6.1 yyy description yyy&lt;/P&gt;&lt;P&gt;name 192.168.6.2 zzz description zzz&lt;/P&gt;&lt;P&gt;name 192.168.7.12 HPA02&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Ajay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jan 2012 15:28:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857074#M456272</guid>
      <dc:creator>ajay chauhan</dc:creator>
      <dc:date>2012-01-24T15:28:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Internal Routing Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857075#M456274</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I buggered up my censoring.&amp;nbsp; Its this one to get to 0.12/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;name 192.168.12.0 xxxSt_VideoSec description xxx St Video/Security&lt;/P&gt;&lt;P&gt;route Inside MainOffice_VideoSec 255.255.255.0 192.168.7.29 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;name 192.168.12.0 xxxSt_VideoSec description xxx St Video/Security should have read:&lt;/P&gt;&lt;P&gt;name 192.168.12.0 MainOffice_VideoSec description xxx St Video/Security (And it does on the firewall).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The routes are all correct (from what I can tell) as I can ping the hosts on the other network and get a ping reply.&amp;nbsp; But as soon as there is a handshake, the firewall drops the connection (or is having it dropped). &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jan 2012 15:39:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857075#M456274</guid>
      <dc:creator>peterhammerl</dc:creator>
      <dc:date>2012-01-24T15:39:42Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 Internal Routing Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857076#M456282</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am going to add, it doesn't just do this on the 12.0/24, it does it on all the networks connected to the second router (there are a few more then in the drawing).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It does it on 0.11/24, 0.12/24, 0.13/24, 0.14/24, 0.15/24 and 0.16/24.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont know why the ASA would tear down the connection like that.&amp;nbsp; I tried adding a rule to allow any to any (all tcp and ip) on the internal interface but it didn't help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would these routes get passed to the firwall side of things?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jan 2012 15:43:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857076#M456282</guid>
      <dc:creator>peterhammerl</dc:creator>
      <dc:date>2012-01-24T15:43:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Internal Routing Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857077#M456286</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thinking about this problem more, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could this be happening because the other router (HP5300xl) is routing the data back onto the 6.0/23 network itself and not passing it to the ASA to be "put back" onto the network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In other words, When my packets go out they travel like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Client (6.0/23) --&amp;gt; ASA Router (7.20) --&amp;gt; HP Router (7.29) --&amp;gt; Destination (12.0/24)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When they come back in, they take this route as the HP knows about the 6.0/23 network:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Destination (12.0/24) --&amp;gt; HP Router (12.254/24) --&amp;gt; Client (6.0/23)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would the ASA box not seeing this cause it to bugger up?&amp;nbsp; Does anyone think the problem might be solved my putting a static route on the HP to the 6.0/23 network pointing to the ASA to have the ASA forward it?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jan 2012 17:23:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857077#M456286</guid>
      <dc:creator>peterhammerl</dc:creator>
      <dc:date>2012-01-24T17:23:57Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 Internal Routing Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857078#M456290</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Yeah you can check the route on router return traffic should also go via ASA 7.20 .&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jan 2012 17:33:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857078#M456290</guid>
      <dc:creator>ajay chauhan</dc:creator>
      <dc:date>2012-01-24T17:33:23Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 Internal Routing Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857079#M456291</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Peter,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It looks like a TCP stateful inspection problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets do a TCP state by pass rule and see if that fix it ( I think it will do it)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list tcp_bypass permit tcp 192.168.12.0 255.255.255.0 192.168.6.0 255.255.254.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map tcp_bypass&lt;/P&gt;&lt;P&gt;match access-list&amp;nbsp; tcp_bypass&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map tcp_bypass&lt;/P&gt;&lt;P&gt;class tcp_bypass&lt;/P&gt;&lt;P&gt;&lt;EM&gt;set connection advanced&lt;/EM&gt;-options &lt;EM&gt;tcp&lt;/EM&gt;-state-bypass &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy tcp_bypass interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know the result!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate helpful posts!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jan 2012 17:38:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857079#M456291</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-24T17:38:22Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 Internal Routing Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857080#M456292</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Its a question &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" height="16" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif" width="16"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking at the diagram what will be the condition to implement Inspection bypass ?&lt;/P&gt;&lt;P&gt;If both way traffic passes via ASA stiil needed ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Ajay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jan 2012 17:45:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857080#M456292</guid>
      <dc:creator>ajay chauhan</dc:creator>
      <dc:date>2012-01-24T17:45:44Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Internal Routing Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857081#M456293</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tried adding a static route to the ASA from the HP router/switch and since it knows about the 6.0/23 interface it just dumps it onto the network and doesn't forward it (not surprised, tested via a traceroute on both sides).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will try the state bypass rule tonight (I have to put the ASA back into production to try this) and let everyone know.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jan 2012 17:46:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857081#M456293</guid>
      <dc:creator>peterhammerl</dc:creator>
      <dc:date>2012-01-24T17:46:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Internal Routing Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857082#M456294</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Ajay,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is that when the hosts on the other side of the router reply the message will be send to their default gateway, then the router will know the packet is going to a host on the 192.168.7.x network witch is directly connected to it so he will send it to the host without going to the ASA.&lt;/P&gt;&lt;P&gt;The ASA will receive a SYN ACK without the ACK and it will drop the packet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is what I have understood on this network diagram.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jan 2012 17:52:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857082#M456294</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-24T17:52:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Internal Routing Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857083#M456296</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Peter,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yeap, lets give it a try and let us know the result.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jan 2012 17:52:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857083#M456296</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-24T17:52:54Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Internal Routing Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857084#M456298</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Julio, your suggestion worked but we are only half way there.&amp;nbsp; I modified the rule to include all my networks on the second router.&amp;nbsp; I am now getting some strange issue where UDP connections are being torn down from the external network:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6|Jan 24 2012|17:33:15|302016|HPA02|53|192.168.13.178|60231|Teardown UDP connection 37876 for Inside:HPA02/53 to Inside:192.168.13.178/60231 duration 0:00:00 bytes 0&lt;/P&gt;&lt;P&gt;6|Jan 24 2012|17:33:15|302016|FTP_Server|53|192.168.13.178|60231|Teardown UDP connection 37875 for Inside:FTP_Server/53 to Inside:192.168.13.178/60231 duration 0:00:00 bytes 0&lt;/P&gt;&lt;P&gt;6|Jan 24 2012|17:33:14|302015|HPA02|53|192.168.13.178|60231|Built inbound UDP connection 37876 for Inside:HPA02/53 (HPA02/53) to Inside:192.168.13.178/60231 (192.168.13.178/60231)&lt;/P&gt;&lt;P&gt;6|Jan 24 2012|17:33:14|302015|FTP_Server|53|192.168.13.178|60231|Built inbound UDP connection 37875 for Inside:FTP_Server/53 (FTP_Server/53) to Inside:192.168.13.178/60231 (192.168.13.178/60231)&lt;/P&gt;&lt;P&gt;6|Jan 24 2012|17:33:13|302016|HPA02|53|192.168.12.10|53412|Teardown UDP connection 37874 for Inside:HPA02/53 to Inside:192.168.12.10/53412 duration 0:00:00 bytes 0&lt;/P&gt;&lt;P&gt;6|Jan 24 2012|17:33:13|302016|FTP_Server|53|192.168.12.10|53412|Teardown UDP connection 37873 for Inside:FTP_Server/53 to Inside:192.168.12.10/53412 duration 0:00:00 bytes 0&lt;/P&gt;&lt;P&gt;6|Jan 24 2012|17:33:12|302015|HPA02|53|192.168.12.10|53412|Built inbound UDP connection 37874 for Inside:HPA02/53 (HPA02/53) to Inside:192.168.12.10/53412 (192.168.12.10/53412)&lt;/P&gt;&lt;P&gt;6|Jan 24 2012|17:33:12|302015|FTP_Server|53|192.168.12.10|53412|Built inbound UDP connection 37873 for Inside:FTP_Server/53 (FTP_Server/53) to Inside:192.168.12.10/53412 (192.168.12.10/53412)&lt;/P&gt;&lt;P&gt;6|Jan 24 2012|17:33:12|302016|HPA02|53|192.168.12.10|62883|Teardown UDP connection 37872 for Inside:HPA02/53 to Inside:192.168.12.10/62883 duration 0:00:00 bytes 0&lt;/P&gt;&lt;P&gt;6|Jan 24 2012|17:33:12|302016|FTP_Server|53|192.168.12.10|62883|Teardown UDP connection 37871 for Inside:FTP_Server/53 to Inside:192.168.12.10/62883 duration 0:00:00 bytes 0&lt;/P&gt;&lt;P&gt;6|Jan 24 2012|17:33:12|302015|HPA02|53|192.168.12.10|62883|Built inbound UDP connection 37872 for Inside:HPA02/53 (HPA02/53) to Inside:192.168.12.10/62883 (192.168.12.10/62883)&lt;/P&gt;&lt;P&gt;6|Jan 24 2012|17:33:12|302015|FTP_Server|53|192.168.12.10|62883|Built inbound UDP connection 37871 for Inside:FTP_Server/53 (FTP_Server/53) to Inside:192.168.12.10/62883 (192.168.12.10/62883)&lt;/P&gt;&lt;P&gt;6|Jan 24 2012|17:33:11|302016|HPA02|53|192.168.13.178|60231|Teardown UDP connection 37870 for Inside:HPA02/53 to Inside:192.168.13.178/60231 duration 0:00:00 bytes 0&lt;/P&gt;&lt;P&gt;6|Jan 24 2012|17:33:11|302016|FTP_Server|53|192.168.13.178|60231|Teardown UDP connection 37869 for Inside:FTP_Server/53 to Inside:192.168.13.178/60231 duration 0:00:00 bytes 0&lt;/P&gt;&lt;P&gt;6|Jan 24 2012|17:33:10|302015|HPA02|53|192.168.13.178|60231|Built inbound UDP connection 37870 for Inside:HPA02/53 (HPA02/53) to Inside:192.168.13.178/60231 (192.168.13.178/60231)&lt;/P&gt;&lt;P&gt;6|Jan 24 2012|17:33:10|302015|FTP_Server|53|192.168.13.178|60231|Built inbound UDP connection 37869 for Inside:FTP_Server/53 (FTP_Server/53) to Inside:192.168.13.178/60231 (192.168.13.178/60231)&lt;/P&gt;&lt;P&gt;6|Jan 24 2012|17:33:09|302016|FTP_Server|53|192.168.13.178|60231|Teardown UDP connection 37868 for Inside:FTP_Server/53 to Inside:192.168.13.178/60231 duration 0:00:00 bytes 0&lt;/P&gt;&lt;P&gt;6|Jan 24 2012|17:33:09|302016|HPA02|53|192.168.12.10|53412|Teardown UDP connection 37867 for Inside:HPA02/53 to Inside:192.168.12.10/53412 duration 0:00:00 bytes 0&lt;/P&gt;&lt;P&gt;6|Jan 24 2012|17:33:09|302016|FTP_Server|53|192.168.12.10|53412|Teardown UDP connection 37866 for Inside:FTP_Server/53 to Inside:192.168.12.10/53412 duration 0:00:00 bytes 0&lt;/P&gt;&lt;P&gt;6|Jan 24 2012|17:33:08|302016|HPA02|53|192.168.12.10|54311|Teardown UDP connection 37865 for Inside:HPA02/53 to Inside:192.168.12.10/54311 duration 0:00:00 bytes 0&lt;/P&gt;&lt;P&gt;6|Jan 24 2012|17:33:08|302016|FTP_Server|53|192.168.12.10|54311|Teardown UDP connection 37864 for Inside:FTP_Server/53 to Inside:192.168.12.10/54311 duration 0:00:00 bytes 0&lt;/P&gt;&lt;P&gt;6|Jan 24 2012|17:33:08|302015|FTP_Server|53|192.168.13.178|60231|Built inbound UDP connection 37868 for Inside:FTP_Server/53 (FTP_Server/53) to Inside:192.168.13.178/60231 (192.168.13.178/60231)&lt;/P&gt;&lt;P&gt;6|Jan 24 2012|17:33:08|302015|HPA02|53|192.168.12.10|53412|Built inbound UDP connection 37867 for Inside:HPA02/53 (HPA02/53) to Inside:192.168.12.10/53412 (192.168.12.10/53412)&lt;/P&gt;&lt;P&gt;6|Jan 24 2012|17:33:08|302015|FTP_Server|53|192.168.12.10|53412|Built inbound UDP connection 37866 for Inside:FTP_Server/53 (FTP_Server/53) to Inside:192.168.12.10/53412 (192.168.12.10/53412)&lt;/P&gt;&lt;P&gt;6|Jan 24 2012|17:33:08|302016|HPA02|53|192.168.12.10|62883|Teardown UDP connection 37863 for Inside:HPA02/53 to Inside:192.168.12.10/62883 duration 0:00:00 bytes 0&lt;/P&gt;&lt;P&gt;6|Jan 24 2012|17:33:08|302016|FTP_Server|53|192.168.12.10|62883|Teardown UDP connection 37862 for Inside:FTP_Server/53 to Inside:192.168.12.10/62883 duration 0:00:00 bytes 0&lt;/P&gt;&lt;P&gt;6|Jan 24 2012|17:33:08|302015|HPA02|53|192.168.12.10|54311|Built inbound UDP connection 37865 for Inside:HPA02/53 (HPA02/53) to Inside:192.168.12.10/54311 (192.168.12.10/54311)&lt;/P&gt;&lt;P&gt;6|Jan 24 2012|17:33:08|302015|FTP_Server|53|192.168.12.10|54311|Built inbound UDP connection 37864 for Inside:FTP_Server/53 (FTP_Server/53) to Inside:192.168.12.10/54311 (192.168.12.10/54311)&lt;/P&gt;&lt;P&gt;6|Jan 24 2012|17:33:08|302016|HPA02|53|192.168.12.10|54447|Teardown UDP connection 37861 for Inside:HPA02/53 to Inside:192.168.12.10/54447 duration 0:00:00 bytes 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FTP_Server is my primary DNS server and HPA02 is my secondary.&amp;nbsp; My guess is the requests are hitting me but not being returned...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jan 2012 22:46:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857084#M456298</guid>
      <dc:creator>peterhammerl</dc:creator>
      <dc:date>2012-01-24T22:46:32Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Internal Routing Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857085#M456300</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Peter,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You were not receiving those logs before right??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture asp type asp-drop all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Provide the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh capture asp | include 192.168.7.11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jan 2012 23:04:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857085#M456300</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-24T23:04:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Internal Routing Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857086#M456301</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was getting them before as well (the partial log is in my first post).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the result of the log you requested:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10: 18:13:13.970637 192.168.7.11.53 &amp;gt; 192.168.12.10.60709:&amp;nbsp; udp 55&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11: 18:13:14.500889 192.168.7.11.53 &amp;gt; 192.168.12.10.62242:&amp;nbsp; udp 55 Drop-reason: (inspect-dns-id-not-matched) DNS Inspect id not matched&lt;/P&gt;&lt;P&gt;&amp;nbsp; 16: 18:13:16.043134 192.168.7.11.53 &amp;gt; 192.168.15.101.50317:&amp;nbsp; udp 55 Drop-reason: (inspect-dns-id-not-matched) DNS Inspect id not matched&lt;/P&gt;&lt;P&gt;&amp;nbsp; 20: 18:13:16.996957 192.168.7.11.53 &amp;gt; 192.168.12.10.60709:&amp;nbsp; udp 55 Drop-reason: (inspect-dns-id-not-matched) DNS Inspect id not matched&lt;/P&gt;&lt;P&gt;&amp;nbsp; 25: 18:13:18.518222 192.168.7.11.53 &amp;gt; 192.168.12.10.62242:&amp;nbsp; udp 55 Drop-reason: (inspect-dns-id-not-matched) DNS Inspect id not matched&lt;/P&gt;&lt;P&gt;&amp;nbsp; 28: 18:13:19.043042 192.168.7.11.53 &amp;gt; 192.168.15.101.50317:&amp;nbsp; udp 55 Drop-reason: (inspect-dns-id-not-matched) DNS Inspect id not matched&lt;/P&gt;&lt;P&gt;&amp;nbsp; 30: 18:13:21.006408 192.168.7.11.53 &amp;gt; 192.168.12.10.60709:&amp;nbsp; udp 55 Drop-reason: (inspect-dns-id-not-matched) DNS Inspect id not matched&lt;/P&gt;&lt;P&gt;&amp;nbsp; 36: 18:13:23.043058 192.168.7.11.53 &amp;gt; 192.168.15.101.50317:&amp;nbsp; udp 55 Drop-reason: (inspect-dns-id-not-matched) DNS Inspect id not matched&lt;/P&gt;&lt;P&gt;&amp;nbsp; 44: 18:13:26.138878 192.168.7.11.53 &amp;gt; 192.168.12.10.59729:&amp;nbsp; udp 55&lt;/P&gt;&lt;P&gt;&amp;nbsp; 49: 18:13:29.165396 192.168.7.11.53 &amp;gt; 192.168.12.10.59729:&amp;nbsp; udp 55 Drop-reason: (inspect-dns-id-not-matched) DNS Inspect id not matched&lt;/P&gt;&lt;P&gt;&amp;nbsp; 52: 18:13:30.592986 192.168.7.11.53 &amp;gt; 192.168.15.101.56902:&amp;nbsp; udp 55&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jan 2012 23:15:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857086#M456301</guid>
      <dc:creator>peterhammerl</dc:creator>
      <dc:date>2012-01-24T23:15:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Internal Routing Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857087#M456304</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The&lt;STRONG&gt; show asp drop frame&lt;/STRONG&gt; command can identify the number of DNS packets that the DNS guard function&amp;nbsp; (with the counter name&amp;nbsp; &lt;STRONG&gt;inspect-dns-id-not-matched&lt;/STRONG&gt; )&amp;nbsp; has dropped because&amp;nbsp; the transaction ID in the DNS response message&amp;nbsp; does not match any transaction&amp;nbsp; IDs for DNS queries that have passed&amp;nbsp; across the firewall earlier on the same&amp;nbsp; connection. As shown in the&amp;nbsp; following example, the counter&amp;nbsp; &lt;STRONG&gt;inspect-dns-id-not-matched&lt;/STRONG&gt; is represented in the command output as DNS Inspect id not matched.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So in this case I think we are having the same problem, the thing is that the TCP state by pass as its name says its only for TCP, so the only thing I can see here is to disable inspection for DNS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please give it a try to this and let me know:&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;policy-map global_policy&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;class inspection_default&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt; no&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate all the helpful posts!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jan 2012 23:49:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857087#M456304</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-24T23:49:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Internal Routing Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857088#M456306</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I will give it a try tomorrow night and let you (and the community) know.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jan 2012 23:52:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857088#M456306</guid>
      <dc:creator>peterhammerl</dc:creator>
      <dc:date>2012-01-24T23:52:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Internal Routing Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857089#M456308</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sure!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jan 2012 23:57:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857089#M456308</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-24T23:57:01Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 Internal Routing Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857090#M456310</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tried to turn off dns inspection but the command didn't work:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HPAFW01(config)# class inspection_default&lt;/P&gt;&lt;P&gt;HPAFW01(config-cmap)# no inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ^&lt;/P&gt;&lt;P&gt;ERROR: % Invalid input detected at '^' marker.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It didn't like inspect.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Last night before I switched back to the firebox, I trued turning off the DNS guard and it didn't help either.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Jan 2012 15:53:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857090#M456310</guid>
      <dc:creator>peterhammerl</dc:creator>
      <dc:date>2012-01-25T15:53:54Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 Internal Routing Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857091#M456312</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Peter,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do it like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;-policy-map global_policy&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;--class inspection_default&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;----no&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Jan 2012 17:11:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-internal-routing-problem/m-p/1857091#M456312</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-25T17:11:48Z</dc:date>
    </item>
  </channel>
</rss>

