<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SYN ACK Flags blocked in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841326#M489528</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Mike. Thanks for the link. Unfortunately, if I am reading the document right, it only applies to NAT statements. I have a router in front of this firewall so I'm not using NAT at the firewall level. I tried to apply the command to the only two NAT statements I have (listed below) and it won't let me because of the 0 in the statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (VLAN2) 0 access-list VLAN2_nat0_outbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I understand these statements correctly, it simply means DO NOT NAT traffic going out from these interfaces.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 05 Jan 2012 19:35:36 GMT</pubDate>
    <dc:creator>Robert Craig</dc:creator>
    <dc:date>2012-01-05T19:35:36Z</dc:date>
    <item>
      <title>SYN ACK Flags blocked</title>
      <link>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841312#M489514</link>
      <description>&lt;P&gt;OK, strange problem starting appearing recently. I can't for the life of me remember what I could have possibly changed to cause this problem. Below is architecture.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Internet---Cisco 2600 (Dynamic IP)--PIX 515E----Interface VLAN2 (192.168.2.1)----Wireless Router (local lan 192.168.3.0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using my laptop and trying to access a device on the VLAN2 network and can't. I can ping all day long, but nothing beyond that. The only thing appearing in my logs is the below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Deny TCP (no connection) from 192.168.2.5/2000 to 192.168.3.100/35670 flags SYN ACK on interface vlan2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've looked in the interface configs and made sure that "traffic between two more interfaces with same security levels" is configured and looked everywhere else. This problem just started and really doesn't make any sense. Anyone know where I can doublecheck? Thanks for any help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Robert&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:09:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841312#M489514</guid>
      <dc:creator>Robert Craig</dc:creator>
      <dc:date>2019-03-11T22:09:39Z</dc:date>
    </item>
    <item>
      <title>SYN ACK Flags blocked</title>
      <link>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841313#M489515</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Robert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The connection is being closed because the ASA is receiving a Syn ACK packet that he was not expecting to receive ( No Syn packet, No connection).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to configure U-turning or a TCP bypass rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What version are you running??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate helpful posts!!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Jan 2012 23:48:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841313#M489515</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-03T23:48:45Z</dc:date>
    </item>
    <item>
      <title>Re: SYN ACK Flags blocked</title>
      <link>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841314#M489516</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Version 8.0(4). I’ve never configured either one of those. Any pointers?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Robert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Jan 2012 00:38:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841314#M489516</guid>
      <dc:creator>Robert Craig</dc:creator>
      <dc:date>2012-01-04T00:38:06Z</dc:date>
    </item>
    <item>
      <title>Re: SYN ACK Flags blocked</title>
      <link>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841315#M489517</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can I have a diagram of your network with the internal ip address of both devices ( the ones are trying to communicate on the same interface and each default gateway)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Jan 2012 00:51:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841315#M489517</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-04T00:51:34Z</dc:date>
    </item>
    <item>
      <title>Re: SYN ACK Flags blocked</title>
      <link>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841316#M489518</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not a problem. Attached is a diagram I threw together. Basically, laptop on wireless is 192.168.3.100 is trying to access anything on VLAN2. I can't ping or do anything, but can out to the internet and anything else on the network no problem, to include the 192.168.1.0 network. It's almost like 192.168.2.0 and 3.0 aren't allowed to talk to each other. In the diagram, the server represents a Cisco Call Manager, 192.168.2.5.&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/8/8/5/71588-Craig-Home-Network.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Jan 2012 02:26:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841316#M489518</guid>
      <dc:creator>Robert Craig</dc:creator>
      <dc:date>2012-01-04T02:26:24Z</dc:date>
    </item>
    <item>
      <title>Re: SYN ACK Flags blocked</title>
      <link>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841317#M489519</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Robert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So problem is with the communication from 192.168.2.0 and 3.0!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the thing!!&lt;/P&gt;&lt;P&gt;When a packet from the wireless local network host&amp;nbsp; tries to go to 192.168.2.x the packet will go to the wireless router and then as he is on the same network he will send it&amp;nbsp; to the host(Syn)&lt;/P&gt;&lt;P&gt;The host will send the (Syn Ack) to thedefautl gateway =&amp;nbsp; ASA, the ASA will say&amp;nbsp; wait a minute a SYN ACK but where is the SYN, and Drop the packet the session does not get established.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So in order to allow this communication to be biderectional lets do a tcp state bypass:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list test permit tcp 192.168.2.0 255.255.255.0 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map tcp_bypass&lt;/P&gt;&lt;P&gt;match access-list test&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class tcp_bypass&lt;/P&gt;&lt;P&gt;set connection advanced-option tcp-state-bypass&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate helpful posts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Jan 2012 03:18:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841317#M489519</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-04T03:18:07Z</dc:date>
    </item>
    <item>
      <title>Re: SYN ACK Flags blocked</title>
      <link>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841318#M489520</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;     I’m almost there. I figured out I had to manually create the TCP Map “tcp-state-bypass”. However, even with no options selected (I am doing this in ASDM), traffic still won’t go through. I’ve messed with several settings in the tcp map, but no luck.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Robert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Jan 2012 14:13:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841318#M489520</guid>
      <dc:creator>Robert Craig</dc:creator>
      <dc:date>2012-01-04T14:13:36Z</dc:date>
    </item>
    <item>
      <title>Re: SYN ACK Flags blocked</title>
      <link>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841319#M489521</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Robert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way you could do it via CLI, you just will need to copy paste the information I have provided you....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Jan 2012 15:05:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841319#M489521</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-04T15:05:13Z</dc:date>
    </item>
    <item>
      <title>Re: SYN ACK Flags blocked</title>
      <link>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841320#M489522</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That’s what I tried first. I got stuck at the tcp-state-bypass command. It said no TCP map exists. I did some digging on Cisco. I should have that option in ASDM under a new TCP MAP as well under the Advanced section. For whatever reason, it doesn’t exist. Just to make sure we are on the same page, I am using a PIX 515E running IOS 8.0(4) with ASDM 6.1.5. According to all of the documentation, the bypass command should work, but it isn’t. Any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Robert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Jan 2012 15:14:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841320#M489522</guid>
      <dc:creator>Robert Craig</dc:creator>
      <dc:date>2012-01-04T15:14:37Z</dc:date>
    </item>
    <item>
      <title>Re: SYN ACK Flags blocked</title>
      <link>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841321#M489523</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Robert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know what you mean! but the pix should take the command, on the TCP map options we do not configure the TCP state bypass.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please confirm if you are doing it like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; class test&lt;/P&gt;&lt;P&gt;&amp;nbsp; set connection advanced-options tcp-state-bypass&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Jan 2012 17:06:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841321#M489523</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-04T17:06:07Z</dc:date>
    </item>
    <item>
      <title>Re: SYN ACK Flags blocked</title>
      <link>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841322#M489524</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;     Even used the tab button to make sure I am putting the commands in correctly. But, as soon as I press enter on that statement I get “ERROR: Can’t find map tcp-state-bypass”&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Robert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Jan 2012 19:42:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841322#M489524</guid>
      <dc:creator>Robert Craig</dc:creator>
      <dc:date>2012-01-04T19:42:37Z</dc:date>
    </item>
    <item>
      <title>SYN ACK Flags blocked</title>
      <link>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841323#M489525</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Robert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After doing a little of research I got the answer of why this is not possible, TCP state-bypass is a feature available until 8.2....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me do a little bit of research on this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jan 2012 05:51:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841323#M489525</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-05T05:51:53Z</dc:date>
    </item>
    <item>
      <title>Re: SYN ACK Flags blocked</title>
      <link>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841324#M489526</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, that would make sense why all of the documentation online references an ASA, not a PIX. Let me know what you find. Thanks Julio!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Robert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jan 2012 12:22:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841324#M489526</guid>
      <dc:creator>Robert Craig</dc:creator>
      <dc:date>2012-01-05T12:22:08Z</dc:date>
    </item>
    <item>
      <title>Re: SYN ACK Flags blocked</title>
      <link>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841325#M489527</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Robert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just to add some background to the thread, this document explains why this problem occurs and suggests a few mitigation techniques that you might find useful:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-14491"&gt;https://supportforums.cisco.com/docs/DOC-14491&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jan 2012 15:45:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841325#M489527</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2012-01-05T15:45:05Z</dc:date>
    </item>
    <item>
      <title>Re: SYN ACK Flags blocked</title>
      <link>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841326#M489528</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Mike. Thanks for the link. Unfortunately, if I am reading the document right, it only applies to NAT statements. I have a router in front of this firewall so I'm not using NAT at the firewall level. I tried to apply the command to the only two NAT statements I have (listed below) and it won't let me because of the 0 in the statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (VLAN2) 0 access-list VLAN2_nat0_outbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I understand these statements correctly, it simply means DO NOT NAT traffic going out from these interfaces.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jan 2012 19:35:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841326#M489528</guid>
      <dc:creator>Robert Craig</dc:creator>
      <dc:date>2012-01-05T19:35:36Z</dc:date>
    </item>
    <item>
      <title>Re: SYN ACK Flags blocked</title>
      <link>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841327#M489529</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Robert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is actually a routing issue and is unrelated to NAT, though NAT can certainly contribute to the problem. You are correct that NAT 0 statements mean that any traffic matching the ACLs will not be translated, but again this would not necessarily be a fix for the problem of asymmetric routing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jan 2012 20:22:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841327#M489529</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2012-01-05T20:22:50Z</dc:date>
    </item>
    <item>
      <title>Re: SYN ACK Flags blocked</title>
      <link>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841328#M489533</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;     Is this a design flaw or something on my end? I put a static route from the inside interface to the perimeter interface of my wireless router. Traffic works great both ways except for the way I mentioned earlier. I'm really at a loss here on how to resolve this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Robert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jan 2012 20:27:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841328#M489533</guid>
      <dc:creator>Robert Craig</dc:creator>
      <dc:date>2012-01-05T20:27:36Z</dc:date>
    </item>
    <item>
      <title>Re: SYN ACK Flags blocked</title>
      <link>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841329#M489548</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Robert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on the syslog you posted originally, the problem is that traffic sourced from 192.168.3.100 destined to 192.168.2.5 does not go through the firewall at all. The ASA is only seeing traffic sourced from 192.168.2.5 destined to 192.168.3.100. Since the ASA can only see half of the bi-directional connection, it cannot properly firewall the traffic and thus drops the packets. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The solution is to fix the routing in your design such that either a) 192.168.3.100 sends traffic through the firewall before it reaches 192.168.2.5, or b) 192.168.2.5 does not send traffic for 192.168.3.100 through the firewall at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As Julio mentioned, TCP state bypass can be used to configure the ASA to ignore this problem and pass the traffic anyway, but this is just a workaround. Since the PIX doesn't support this feature, the workarounds listed in the above document can help get things working for you until you're ready to adjust the routing config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jan 2012 20:51:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841329#M489548</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2012-01-05T20:51:03Z</dc:date>
    </item>
    <item>
      <title>Re: SYN ACK Flags blocked</title>
      <link>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841330#M489550</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I see what you are saying, but unfortunately I don’t understand how to implement a routing change like that. Consider this. Interface inside is 192.168.1.1. The Wireless router (internet interface) is 192.168.1.7. Now, clients on the wireless side get an IP from the wireless router on the 192.168.3.0 network. Now, 3.0 can go through the firewall and access something on another vlan or another interface no problem. But, the problem is accessing devices on the 1.0 network. I rebuilt the PIX last night because there were some things going on other than this that I couldn’t rectify. The wireless router only has a default route (as it should in this case) and that is to 192.168.1.1. So, in this situation, how would I adjust the routing if it has to go to 1.1 no matter what?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Robert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jan 2012 21:37:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841330#M489550</guid>
      <dc:creator>Robert Craig</dc:creator>
      <dc:date>2012-01-05T21:37:37Z</dc:date>
    </item>
    <item>
      <title>Re: SYN ACK Flags blocked</title>
      <link>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841331#M489554</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Robert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I understand the network correctly based on the above posts, you have something like this (correct me if I'm wrong):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;Internet---Router---(outside)PIX(inside)---VLAN 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (vlan2)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; | &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; VLAN 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; | &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Wireless Router&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; VLAN 3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Wireless hosts&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assuming this is correct, the problem happens when wireless hosts (192.168.3.x) talk to VLAN 2 hosts (192.168.2.x), right? So the problem looks like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. 192.168.3.x sends a packet for 192.168.2.x to it's default gateway (the wireless router).&lt;/P&gt;&lt;P&gt;2. The wireless router checks its routing table and sees that it already has an interface in the 192.168.2.x subnet, so it sends the packet directly to the destination. The PIX never sees this initial packet.&lt;/P&gt;&lt;P&gt;3. 192.168.2.x needs to send its response destined to 192.168.3.x. It checks its routing table and sees that it has a default gateway configured on the host that points to the PIX's VLAN 2 interface.&lt;/P&gt;&lt;P&gt;4. The PIX receives the packet but knowing that it never saw the SYN for the connection, it drops the 192.168.2.x host's response and the connection fails.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To fix this, you have a couple of options:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Add a static route on the hosts in the 192.168.2.x network that sends all traffic for 192.168.3.x to the Wireless router's interface, instead of the PIX's interface. For example, on MS Windows, this is done with the 'route add' command.&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;2. Add a static route on the Wireless Router that sends all traffic destined for 192.168.2.x to the PIX's interface instead of directly to the hosts themselves. If you choose this option, you also need to enable the 'same-security-traffic permit intra-interface' command on the PIX to allow the packet to enter and leave on the same VLAN 2 interface (this is denied by default). You also need to make sure the packet is allowed by your security policy (ACLs, NAT, etc.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jan 2012 22:03:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syn-ack-flags-blocked/m-p/1841331#M489554</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2012-01-05T22:03:28Z</dc:date>
    </item>
  </channel>
</rss>

