<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA route ping but not TCP packets between two internal LANs in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863467#M489173</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will wait for the other post &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 06 Jan 2012 17:53:10 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2012-01-06T17:53:10Z</dc:date>
    <item>
      <title>ASA route ping but not TCP packets between two internal LANs</title>
      <link>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863464#M489170</link>
      <description>&lt;P&gt;I need to connect two internal LANs each of which has ASA as a firewall to outside. One has ASA 5505 with two interfaces and another - ASA 5510 with three interfaces. I managed to pass echo packets from one internal LAN to another, but not the TCP packets. It must be something simple that I missed. Any help will be highly appreciated! Here is the network diagram:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/9/2/9/71929-Capture.PNG" alt="Capture.PNG" class="jive-image-thumbnail jive-image" onclick="" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is Config from &lt;STRONG style="text-decoration: underline; "&gt;ASA 5510&lt;/STRONG&gt; (i removed obvious settings to save space):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;interface Ethernet0/0
 nameif outside
 security-level 0
 ip address YY.YY.YY.YY 255.255.255.224 
!
interface Ethernet0/1
 nameif inside
 security-level 100
 ip address 192.168.35.1 255.255.255.0 
!
interface Ethernet0/2
 nameif a-02
 security-level 100
 ip address 192.168.30.250 255.255.255.0 
!
interface Ethernet0/3
 shutdown
 no nameif
 no security-level
 no ip address
!
ftp mode passive
clock timezone EST -5
clock summer-time EDT recurring
dns server-group DefaultDNS
 domain-name latista.local
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
access-list outside_access_in extended permit icmp any any inactive 
access-list a-02_access_in extended permit ip any any 
access-list a-02_access_in extended permit icmp any any inactive 
access-list inside_access_in extended permit ip any any 
access-list inside_access_in extended permit icmp any any inactive 
access-list inside_access_out extended permit ip any any 
access-list inside_access_out extended permit icmp any any inactive 
access-list inside_nat0_outbound_1 extended permit ip 192.168.35.0 255.255.255.0 192.168.30.0 255.255.255.0 
access-list inside_nat0_outbound extended permit ip 192.168.35.0 255.255.255.0 192.168.30.0 255.255.255.0 
access-list a-02_nat0_outbound extended permit ip 192.168.30.0 255.255.255.0 192.168.35.0 255.255.255.0 
access-list a-02_nat0_outbound_1 extended permit ip 192.168.30.0 255.255.255.0 192.168.35.0 255.255.255.0 
pager lines 24
logging enable
logging asdm informational
mtu outside 1500
mtu inside 1500
mtu a-02 1500
mtu management 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 0 access-list inside_nat0_outbound_1 outside
nat (a-02) 0 access-list a-02_nat0_outbound
nat (a-02) 0 access-list a-02_nat0_outbound_1 outside
access-group outside_access_in in interface outside
access-group inside_access_in in interface inside
access-group inside_access_out out interface inside
access-group a-02_access_in in interface a-02
!
router rip
 version 1
!
route outside 0.0.0.0 0.0.0.0 205.251.79.33 1
route inside 192.168.30.0 255.255.255.0 192.168.30.250 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
http server enable
http 192.168.1.0 255.255.255.0 management
http 192.168.35.0 255.255.255.0 inside
http 67.208.89.64 255.255.255.224 outside
http 4.26.115.0 255.255.255.240 outside
http 192.168.30.0 255.255.255.0 a-02
http 192.168.20.0 255.255.255.0 a-02
http 96.255.26.199 255.255.255.255 outside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
telnet timeout 5
ssh timeout 5
console timeout 0
!
threat-detection basic-threat
threat-detection statistics access-list
threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200
webvpn
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
&amp;nbsp; message-length maximum client auto
&amp;nbsp; message-length maximum 512
policy-map global_policy
 class inspection_default
&amp;nbsp; inspect dns preset_dns_map 
&amp;nbsp; inspect ftp 
&amp;nbsp; inspect h323 h225 
&amp;nbsp; inspect h323 ras 
&amp;nbsp; inspect rsh 
&amp;nbsp; inspect rtsp 
&amp;nbsp; inspect esmtp 
&amp;nbsp; inspect sqlnet 
&amp;nbsp; inspect skinny&amp;nbsp; 
&amp;nbsp; inspect sunrpc 
&amp;nbsp; inspect xdmcp 
&amp;nbsp; inspect sip&amp;nbsp; 
&amp;nbsp; inspect netbios 
&amp;nbsp; inspect tftp 
&amp;nbsp; inspect ip-options 
&amp;nbsp; inspect http 
!
service-policy global_policy global
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On another ASA (&lt;STRONG&gt;ASA 5505&lt;/STRONG&gt;) I only configured the Routing and NAT Exemption. Here is that portion:&lt;/P&gt;&lt;PRE&gt;same-security-traffic permit intra-interface
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;access-list inside_nat0_outbound extended permit ip NET_COLO_INT 255.255.255.0 192.168.35.0 255.255.255.0 
access-list inside_nat0_outbound extended permit ip 192.168.35.0 255.255.255.0 NET_COLO_INT 255.255.255.0 
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;route inside 192.168.35.0 255.255.255.0 192.168.30.250 1
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Please help! &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:11:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863464#M489170</guid>
      <dc:creator>atishin</dc:creator>
      <dc:date>2019-03-11T22:11:08Z</dc:date>
    </item>
    <item>
      <title>Re: ASA route ping but not TCP packets between two internal LANs</title>
      <link>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863465#M489171</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Anatoly,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would remove these nat statements and this static route&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no nat (a-02) 0 access-list a-02_nat0_outbound_1 outside&lt;/P&gt;&lt;PRE&gt;no nat (inside) 0 access-list inside_nat0_outbound_1 outside&lt;/PRE&gt;&lt;P&gt;no route inside 192.168.30.0 255.255.255.0 192.168.30.250 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now please provide the following packet tracer outputs from Asa 5510&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input inside tcp 192.168.35.15 1025 192.168.30.47 80&lt;/P&gt;&lt;P&gt;packet-tracer input a-02 tcp 192.168.30.47 1025 192.168.35.15 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jan 2012 17:26:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863465#M489171</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-06T17:26:48Z</dc:date>
    </item>
    <item>
      <title>ASA route ping but not TCP packets between two internal LANs</title>
      <link>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863466#M489172</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Julio, thank you for the answering! Here is the packet tracers info. I ran tracers without removing Route and Nat Exemptions. I will remove them and create another reply with results as well...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "packet-tracer input inside tcp 192.168.35.15 1025 192.168.30.47 80"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.30.0&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; a-02&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: INSPECT&lt;/P&gt;&lt;P&gt;Subtype: np-inspect&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http &lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: NAT-EXEMPT&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside 192.168.35.0 255.255.255.0 a-02 192.168.30.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAT exempt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 101, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT-EXEMPT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 3230, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: a-02&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;---------------------------- here is the second one ----------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "packet-tracer input a-02 tcp 192.168.30.47 1025 192.168.35.15 80"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.35.0&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group a-02_access_in in interface a-02&lt;/P&gt;&lt;P&gt;access-list a-02_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: INSPECT&lt;/P&gt;&lt;P&gt;Subtype: np-inspect&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http &lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: NAT-EXEMPT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT-EXEMPT&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (a-02) 0 access-list a-02_nat0_outbound&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip a-02 192.168.30.0 255.255.255.0 inside 192.168.35.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAT exempt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1, untranslate_hits = 104&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group inside_access_out out interface inside&lt;/P&gt;&lt;P&gt;access-list inside_access_out extended permit ip any any &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 3236, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: a-02&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jan 2012 17:51:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863466#M489172</guid>
      <dc:creator>atishin</dc:creator>
      <dc:date>2012-01-06T17:51:41Z</dc:date>
    </item>
    <item>
      <title>Re: ASA route ping but not TCP packets between two internal LANs</title>
      <link>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863467#M489173</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will wait for the other post &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jan 2012 17:53:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863467#M489173</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-06T17:53:10Z</dc:date>
    </item>
    <item>
      <title>ASA route ping but not TCP packets between two internal LANs</title>
      <link>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863468#M489174</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was not able to remove ROUTE - ASA gave error stating Cannnot remove Connected Route. Here are results of tracers without NAT rules:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "packet-tracer input inside tcp 192.168.35.15 1025 192.168.30.47 80"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.30.0&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; a-02&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: INSPECT&lt;/P&gt;&lt;P&gt;Subtype: np-inspect&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http &lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: NAT-EXEMPT&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside 192.168.35.0 255.255.255.0 a-02 192.168.30.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAT exempt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT-EXEMPT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 3248, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: a-02&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-------------------- Here is the second one ---------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "packet-tracer input a-02 tcp 192.168.30.47 1025 192.168.35.15 80"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.35.0&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group a-02_access_in in interface a-02&lt;/P&gt;&lt;P&gt;access-list a-02_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: INSPECT&lt;/P&gt;&lt;P&gt;Subtype: np-inspect&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http &lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: NAT-EXEMPT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT-EXEMPT&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip a-02 192.168.30.0 255.255.255.0 inside 192.168.35.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAT exempt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1, untranslate_hits = 1&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group inside_access_out out interface inside&lt;/P&gt;&lt;P&gt;access-list inside_access_out extended permit ip any any &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 3250, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: a-02&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jan 2012 17:54:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863468#M489174</guid>
      <dc:creator>atishin</dc:creator>
      <dc:date>2012-01-06T17:54:35Z</dc:date>
    </item>
    <item>
      <title>ASA route ping but not TCP packets between two internal LANs</title>
      <link>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863469#M489175</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hmm on the packet tracer everything is fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets do a capture from the host 192.168.35.2 to the host 192.168.30.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list capture permit ip host 192.168.35.2 host 192.168.30.2&lt;/P&gt;&lt;P&gt;access-list capture permit ip host 192.168.30.2 host 192.168.35.2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture capin access-list capture interface inside&lt;/P&gt;&lt;P&gt;capture capa-02 access-list capture interface a-02&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I want you to generate some TCP traffic between those hosts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then please go to a browser on the inside interface and do the following&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://192.168.30.250/capture/capin/pcap"&gt;https://192.168.30.250/capture/capin/pcap&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://192.168.30.250/capture/capa-02/pcap"&gt;https://192.168.30.250/capture/capa-02/pcap&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And please upload to this case the two files you will get.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate if helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jan 2012 18:05:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863469#M489175</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-06T18:05:08Z</dc:date>
    </item>
    <item>
      <title>ASA route ping but not TCP packets between two internal LANs</title>
      <link>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863470#M489176</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you mentioned that I should use browser in "inside" interface (which is 192.168.35.0 net) - it didn't connect to the firewall. I did it from a-02 net (192.168.30.0) and it did. Although both files had size 0 (e.g. were empty). &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jan 2012 18:13:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863470#M489176</guid>
      <dc:creator>atishin</dc:creator>
      <dc:date>2012-01-06T18:13:22Z</dc:date>
    </item>
    <item>
      <title>ASA route ping but not TCP packets between two internal LANs</title>
      <link>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863471#M489177</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My bad -&amp;nbsp; I haven't actually put any traffic through! Let me do that real quick...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jan 2012 18:14:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863471#M489177</guid>
      <dc:creator>atishin</dc:creator>
      <dc:date>2012-01-06T18:14:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA route ping but not TCP packets between two internal LANs</title>
      <link>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863472#M489178</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No - still size is 0. I was trying to initiate RDP connection from both sides (TCP 3389) and also did PING. Ping went fine, RDP session timed out. But neither made those pcap had any data in them.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jan 2012 18:18:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863472#M489178</guid>
      <dc:creator>atishin</dc:creator>
      <dc:date>2012-01-06T18:18:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA route ping but not TCP packets between two internal LANs</title>
      <link>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863473#M489179</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Anatolly,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you do a sh capture capin and show capture capa-02 on the ASA what do you see?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One question you send the ping and the RDP request ( between hosts 192.168.30.2 and 192.168.35.2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can I see the capture and ACL configuration for the capture?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jan 2012 18:31:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863473#M489179</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-06T18:31:15Z</dc:date>
    </item>
    <item>
      <title>ASA route ping but not TCP packets between two internal LANs</title>
      <link>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863474#M489180</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good point - it was actually NOT between those. I just did it again for these two IPs. Here is capture for both captures:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asa5510# show capture capa-02&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;14 packets captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 13:48:29.135704 192.168.35.2 &amp;gt; 192.168.30.2: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2: 13:48:29.136070 192.168.30.2 &amp;gt; 192.168.35.2: icmp: echo reply&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 3: 13:48:30.132698 192.168.35.2 &amp;gt; 192.168.30.2: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 4: 13:48:30.132912 192.168.30.2 &amp;gt; 192.168.35.2: icmp: echo reply&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 5: 13:48:34.636853 192.168.35.2.4654 &amp;gt; 192.168.30.2.23: S 1810127933:1810127933(0) win 65535 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 6: 13:48:37.507893 192.168.35.2.4654 &amp;gt; 192.168.30.2.23: S 1810127933:1810127933(0) win 65535 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 7: 13:48:43.523715 192.168.35.2.4654 &amp;gt; 192.168.30.2.23: S 1810127933:1810127933(0) win 65535 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 8: 13:49:15.998681 192.168.30.2.54837 &amp;gt; 192.168.35.2.23: S 4043652038:4043652038(0) win 5840 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;35 0,nop,wscale 7&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 9: 13:49:15.999093 192.168.35.2.23 &amp;gt; 192.168.30.2.54837: R 661765980:661765980(0) ack 4043652039 win 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10: 13:49:20.155768 192.168.30.2.39499 &amp;gt; 192.168.35.2.3389: S 824236920:824236920(0) win 5840 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;74 0,nop,wscale 7&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11: 13:49:20.156150 192.168.35.2.3389 &amp;gt; 192.168.30.2.39499: S 1344822113:1344822113(0) ack 824236921 win 16384 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;ale 0,nop,nop,timestamp 0 0,nop,nop,sackOK&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12: 13:49:20.156363 192.168.30.2.39499 &amp;gt; 192.168.35.2.3389: R 2366458597:2366458597(0) win 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; 13: 13:49:22.462607 192.168.35.2.3389 &amp;gt; 192.168.30.2.39499: S 1344822113:1344822113(0) ack 824236921 win 16384 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;ale 0,nop,nop,timestamp 0 0,nop,nop,sackOK&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 14: 13:49:23.154151 192.168.30.2.39499 &amp;gt; 192.168.35.2.3389: S 233265947:233265947(0) win 5840 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;24 0,nop,wscale 7&amp;gt;&lt;/P&gt;&lt;P&gt;14 packets shown&lt;/P&gt;&lt;P&gt;asa5510# show capture capain&lt;/P&gt;&lt;P&gt;ERROR: Capture &lt;CAPAIN&gt; does not exist&lt;/CAPAIN&gt;&lt;/P&gt;&lt;P&gt;asa5510# show capture capin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;15 packets captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 13:48:29.135552 192.168.35.2 &amp;gt; 192.168.30.2: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2: 13:48:29.136208 192.168.30.2 &amp;gt; 192.168.35.2: icmp: echo reply&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 3: 13:48:30.132683 192.168.35.2 &amp;gt; 192.168.30.2: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 4: 13:48:30.132912 192.168.30.2 &amp;gt; 192.168.35.2: icmp: echo reply&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 5: 13:48:34.636655 192.168.35.2.4654 &amp;gt; 192.168.30.2.23: S 581861776:581861776(0) win 65535 &lt;MSS 1460=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 6: 13:48:37.507862 192.168.35.2.4654 &amp;gt; 192.168.30.2.23: S 581861776:581861776(0) win 65535 &lt;MSS 1460=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 7: 13:48:43.523669 192.168.35.2.4654 &amp;gt; 192.168.30.2.23: S 581861776:581861776(0) win 65535 &lt;MSS 1460=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 8: 13:49:15.998895 192.168.30.2.54837 &amp;gt; 192.168.35.2.23: S 964875669:964875669(0) win 5840 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt; 0,nop,wscale 7&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 9: 13:49:15.999032 192.168.35.2.23 &amp;gt; 192.168.30.2.54837: R 0:0(0) ack 964875670 win 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10: 13:49:20.155967 192.168.30.2.39499 &amp;gt; 192.168.35.2.3389: S 2181402077:2181402077(0) win 5840 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;4674 0,nop,wscale 7&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11: 13:49:20.156089 192.168.35.2.3389 &amp;gt; 192.168.30.2.39499: S 290418727:290418727(0) ack 2181402078 win 16384 &lt;MSS 1460=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;le 0,nop,nop,timestamp 0 0,nop,nop,sackOK&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12: 13:49:22.462561 192.168.35.2.3389 &amp;gt; 192.168.30.2.39499: S 290418727:290418727(0) ack 2181402078 win 16384 &lt;MSS 1460=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;le 0,nop,nop,timestamp 0 0,nop,nop,sackOK&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 13: 13:49:29.025251 192.168.35.2.3389 &amp;gt; 192.168.30.2.39499: S 290418727:290418727(0) ack 2181402078 win 16384 &lt;MSS 1460=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;le 0,nop,nop,timestamp 0 0,nop,nop,sackOK&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 14: 13:50:05.156806 192.168.30.2.39499 &amp;gt; 192.168.35.2.3389: S 1438335957:1438335957(0) win 5840 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;5924 0,nop,wscale 7&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 15: 13:50:05.156928 192.168.35.2.3389 &amp;gt; 192.168.30.2.39499: S 302100830:302100830(0) ack 1438335958 win 16384 &lt;MSS 1460=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;le 0,nop,nop,timestamp 0 0,nop,nop,sackOK&amp;gt;&lt;/P&gt;&lt;P&gt;15 packets shown&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jan 2012 18:52:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863474#M489180</guid>
      <dc:creator>atishin</dc:creator>
      <dc:date>2012-01-06T18:52:20Z</dc:date>
    </item>
    <item>
      <title>ASA route ping but not TCP packets between two internal LANs</title>
      <link>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863475#M489181</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the capture ACL info:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any inactive&lt;/P&gt;&lt;P&gt;access-list a-02_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list a-02_access_in extended permit icmp any any inactive&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit icmp any any inactive&lt;/P&gt;&lt;P&gt;access-list inside_access_out extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list inside_access_out extended permit icmp any any inactive&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound_1 extended permit ip 192.168.35.0 255.255.255.0 192.168.30.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.35.0 255.255.255.0 192.168.30.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list a-02_nat0_outbound extended permit ip 192.168.30.0 255.255.255.0 192.168.35.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list a-02_nat0_outbound_1 extended permit ip 192.168.30.0 255.255.255.0 192.168.35.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list capture extended permit ip host 192.168.35.2 host 192.168.30.2&lt;/P&gt;&lt;P&gt;access-list capture extended permit ip host 192.168.30.2 host 192.168.35.2&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu a-02 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (a-02) 0 access-list a-02_nat0_outbound&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group inside_access_out out interface inside&lt;/P&gt;&lt;P&gt;access-group a-02_access_in in interface a-02&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jan 2012 19:44:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863475#M489181</guid>
      <dc:creator>atishin</dc:creator>
      <dc:date>2012-01-06T19:44:40Z</dc:date>
    </item>
    <item>
      <title>ASA route ping but not TCP packets between two internal LANs</title>
      <link>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863476#M489182</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Anatoly,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So we are almost done here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please provide the following capture&lt;/P&gt;&lt;P&gt;capture asp type asp-drop all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then provide the show capture asp | include 192.168.30.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then provide the show capture asp | include 192.168.35.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and also :&lt;/P&gt;&lt;P&gt;&lt;A href="https://192.168.30.250/capture/capin/pcap"&gt;https://192.168.30.250/capture/capin/pcap&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://192.168.30.250/capture/capa-02/pcap"&gt;https://192.168.30.250/capture/capa-02/pcap&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jan 2012 19:52:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863476#M489182</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-06T19:52:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASA route ping but not TCP packets between two internal LANs</title>
      <link>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863477#M489183</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is printout from capture commands in ASA shell:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asa5510(config)# capture asp type asp-drop all&lt;/P&gt;&lt;P&gt;asa5510(config)# show capture asp | include 192.168.30.2&lt;/P&gt;&lt;P&gt;asa5510(config)# show capture asp | include 192.168.35.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 14:54:02.191625 192.168.35.2.138 &amp;gt; 192.168.35.255.138:&amp;nbsp; udp 201 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;asa5510(config)#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Files also attached below (pcap from capin and pcap2 is from capa-02)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Anatoliy&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jan 2012 20:00:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863477#M489183</guid>
      <dc:creator>atishin</dc:creator>
      <dc:date>2012-01-06T20:00:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA route ping but not TCP packets between two internal LANs</title>
      <link>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863478#M489184</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is some more from those two new captures after generating traffic (I was attempting to telnet from 192.168.30.2 to 192.168.35.2 port 3389):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asa5510# show capture asp | include 192.168.30.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2: 14:54:15.457495 192.168.30.21.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 209 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 3: 14:54:31.464957 192.168.30.21.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 209 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 4: 14:54:32.656948 192.168.30.9.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 204 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 5: 14:54:47.477621 192.168.30.21.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 209 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 6: 14:55:03.493413 192.168.30.21.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 209 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 7: 14:55:10.272950 192.168.30.25.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 201 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 8: 14:55:19.515583 192.168.30.21.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 209 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 9: 14:55:35.512088 192.168.30.21.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 209 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10: 14:55:51.528994 192.168.30.21.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 209 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11: 14:56:07.551225 192.168.30.21.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 209 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12: 14:56:23.561860 192.168.30.21.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 209 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp; 13: 14:56:23.561997 192.168.30.2.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 236 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp; 14: 14:56:39.564271 192.168.30.21.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 209 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp; 16: 14:56:50.015349 192.168.30.23.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 215&lt;/P&gt;&lt;P&gt;&amp;nbsp; 17: 14:56:55.586746 192.168.30.21.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 209 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp; 18: 14:57:05.585602 192.168.30.2.137 &amp;gt; 192.168.30.255.137:&amp;nbsp; udp 50 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp; 19: 14:57:05.585647 192.168.30.2.137 &amp;gt; 192.168.30.255.137:&amp;nbsp; udp 50 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp; 20: 14:57:07.585678 192.168.30.2.137 &amp;gt; 192.168.30.255.137:&amp;nbsp; udp 50 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp; 21: 14:57:07.585724 192.168.30.2.137 &amp;gt; 192.168.30.255.137:&amp;nbsp; udp 50 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp; 22: 14:57:11.593170 192.168.30.21.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 209 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp; 23: 14:57:27.600081 192.168.30.21.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 209 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp; 27: 14:57:43.621977 192.168.30.21.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 209 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp; 28: 14:57:44.483159 192.168.30.7.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 201 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp; 29: 14:57:54.962505 192.168.30.19.137 &amp;gt; 192.168.30.255.137:&amp;nbsp; udp 50 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp; 30: 14:57:59.533450 192.168.30.14.137 &amp;gt; 192.168.30.255.137:&amp;nbsp; udp 50&lt;/P&gt;&lt;P&gt;&amp;nbsp; 31: 14:57:59.629087 192.168.30.21.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 209 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp; 32: 14:58:01.953945 192.168.30.6.137 &amp;gt; 192.168.30.255.137:&amp;nbsp; udp 50 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp; 33: 14:58:08.341031 192.168.30.9.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 201&lt;/P&gt;&lt;P&gt;&amp;nbsp; 34: 14:58:09.391916 192.168.30.11.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 201&lt;/P&gt;&lt;P&gt;&amp;nbsp; 36: 14:58:15.048200 192.168.30.6.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 201 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp; 37: 14:58:15.636365 192.168.30.21.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 209 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp; 40: 14:58:31.657818 192.168.30.21.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 209&lt;/P&gt;&lt;P&gt;&amp;nbsp; 43: 14:58:47.664577 192.168.30.21.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 209 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp; 46: 14:59:03.670650 192.168.30.21.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 209 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp; 49: 14:59:19.692331 192.168.30.21.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 209 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp; 52: 14:59:35.700006 192.168.30.21.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 209&lt;/P&gt;&lt;P&gt;&amp;nbsp; 53: 14:59:51.707284 192.168.30.21.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 209&lt;/P&gt;&lt;P&gt;&amp;nbsp; 56: 15:00:07.744712 192.168.30.21.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 209&lt;/P&gt;&lt;P&gt;&amp;nbsp; 57: 15:00:07.744849 192.168.30.8.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 236&lt;/P&gt;&lt;P&gt;&amp;nbsp; 59: 15:00:23.750052 192.168.30.21.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 209&lt;/P&gt;&lt;P&gt;&amp;nbsp; 60: 15:00:39.757285 192.168.30.21.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 209&lt;/P&gt;&lt;P&gt;&amp;nbsp; 61: 15:00:55.779226 192.168.30.21.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 209&lt;/P&gt;&lt;P&gt;&amp;nbsp; 62: 15:01:11.779653 192.168.30.21.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 209&lt;/P&gt;&lt;P&gt;&amp;nbsp; 63: 15:01:14.614149 192.168.30.2.51264 &amp;gt; 192.168.35.2.3389: R 3892349827:3892349827(0) win 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; 64: 15:01:17.612135 192.168.30.2.51264 &amp;gt; 192.168.35.2.3389: S 3356852894:3356852894(0) win 5840 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;3977 0,nop,wscale 7&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 65: 15:01:17.767736 192.168.30.2.51264 &amp;gt; 192.168.35.2.3389: R 4049166377:4049166377(0) win 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; 66: 15:01:23.612471 192.168.30.2.51264 &amp;gt; 192.168.35.2.3389: S 2757161395:2757161395(0) win 5840 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;5477 0,nop,wscale 7&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 67: 15:01:24.330457 192.168.30.2.51264 &amp;gt; 192.168.35.2.3389: R 3449474878:3449474878(0) win 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; 68: 15:01:27.792561 192.168.30.21.138 &amp;gt; 192.168.30.255.138:&amp;nbsp; udp 209&lt;/P&gt;&lt;P&gt;&amp;nbsp; 69: 15:01:35.613219 192.168.30.2.51264 &amp;gt; 192.168.35.2.3389: S 2979565878:2979565878(0) win 5840 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;8477 0,nop,wscale 7&amp;gt;&lt;/P&gt;&lt;P&gt;asa5510# show capture asp | include 192.168.35.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 14:54:02.191625 192.168.35.2.138 &amp;gt; 192.168.35.255.138:&amp;nbsp; udp 201 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp; 24: 14:57:40.588928 192.168.35.2.137 &amp;gt; 192.168.35.255.137:&amp;nbsp; udp 50 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp; 25: 14:57:41.338819 192.168.35.2.137 &amp;gt; 192.168.35.255.137:&amp;nbsp; udp 50 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp; 26: 14:57:42.088862 192.168.35.2.137 &amp;gt; 192.168.35.255.137:&amp;nbsp; udp 50 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp; 63: 15:01:14.614149 192.168.30.2.51264 &amp;gt; 192.168.35.2.3389: R 3892349827:3892349827(0) win 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; 64: 15:01:17.612135 192.168.30.2.51264 &amp;gt; 192.168.35.2.3389: S 3356852894:3356852894(0) win 5840 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;3977 0,nop,wscale 7&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 65: 15:01:17.767736 192.168.30.2.51264 &amp;gt; 192.168.35.2.3389: R 4049166377:4049166377(0) win 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; 66: 15:01:23.612471 192.168.30.2.51264 &amp;gt; 192.168.35.2.3389: S 2757161395:2757161395(0) win 5840 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;5477 0,nop,wscale 7&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 67: 15:01:24.330457 192.168.30.2.51264 &amp;gt; 192.168.35.2.3389: R 3449474878:3449474878(0) win 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; 69: 15:01:35.613219 192.168.30.2.51264 &amp;gt; 192.168.35.2.3389: S 2979565878:2979565878(0) win 5840 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;8477 0,nop,wscale 7&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jan 2012 20:05:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863478#M489184</guid>
      <dc:creator>atishin</dc:creator>
      <dc:date>2012-01-06T20:05:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA route ping but not TCP packets between two internal LANs</title>
      <link>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863479#M489185</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;based on the ASA ASP capture, we can see that the ASA is only dropping packets on port 209 and 50 UPD between those two hosts, so no packets being dropped for the RDP or telnet traffic..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now on the other captures, we can see the host 192.168.30.2 sends a SYN packet, then the 192.168.35.2 responds with a SYN ACK, and the 192.168.30.2 never responds with the ACK so the three way handshake never happens and the connection does not get stablished, this regarding the RDP connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the Telnet connection, we can see that the host 192.168.30.2 sends a SYN packet, and the host 192.168.35.2 responds with a RST ACK so the connection gets closed due to this message from 192.168.35.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We can see the same packets on both interfaces so that means the ASA is only traversing the traffic at it should in this case..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jan 2012 21:14:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863479#M489185</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-06T21:14:27Z</dc:date>
    </item>
    <item>
      <title>ASA route ping but not TCP packets between two internal LANs</title>
      <link>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863480#M489186</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In other words you are saying that from ASA standpoint it works. Then what else can be not working? Why I still can't do RDP or SSH between these two networks? Any suggestions?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jan 2012 21:27:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863480#M489186</guid>
      <dc:creator>atishin</dc:creator>
      <dc:date>2012-01-06T21:27:50Z</dc:date>
    </item>
    <item>
      <title>ASA route ping but not TCP packets between two internal LANs</title>
      <link>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863481#M489187</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Correct the ASA is sending the traffic on both interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why I still can't do RDP or SSH between these two networks? &lt;/P&gt;&lt;P&gt;Becuase the host are refusing this connection. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can do a capture on each of the hosts while you send the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please install wireshark on both servers and catch the traffic, so then we will see if there is any difference between the traffic capture on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jan 2012 22:21:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863481#M489187</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-06T22:21:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASA route ping but not TCP packets between two internal LANs</title>
      <link>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863482#M489188</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK. Here are the files. Two first are from ASA (pcap and pcap2 from capin and capa-02) and third one - from Wireshark installed on 192.168.35.2. All three were capturing the same flow which I initiated from 192.168.30.2 by using command "telnet 192.168.35.2 3389".&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jan 2012 22:48:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863482#M489188</guid>
      <dc:creator>atishin</dc:creator>
      <dc:date>2012-01-06T22:48:08Z</dc:date>
    </item>
    <item>
      <title>Re: ASA route ping but not TCP packets between two internal LANs</title>
      <link>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863483#M489189</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are missing the capture on the 192.168.30.2!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On these ones I can tell you that there is just a syn, and syn ack. the host 192.168.30.2 is not sending a syn ack. If on the capture on that host we do not see that packet, it will mean the Server (30.2) is not working as properly unless on that particular connection because he is not establishing the connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jan 2012 22:53:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-route-ping-but-not-tcp-packets-between-two-internal-lans/m-p/1863483#M489189</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-06T22:53:45Z</dc:date>
    </item>
  </channel>
</rss>

