<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CISCO ASA Packet Inspection Sequence in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-packet-inspection-sequence/m-p/1757187#M496149</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; thanks for the update svaish,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in cisco we use interface based NAT means the NAT decisions are taken place on the basis of the firection of traffic, and direction can be found in route means route occurs first and then NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is what i have seen my hands on experiance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 05 Mar 2012 08:54:51 GMT</pubDate>
    <dc:creator>gourav007</dc:creator>
    <dc:date>2012-03-05T08:54:51Z</dc:date>
    <item>
      <title>CISCO ASA Packet Inspection Sequence</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-packet-inspection-sequence/m-p/1757182#M496139</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am curious to understand the concept of packet flow (or) (inspection /order of operation) in CISCO ASA 8.2 version. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. What happens to packet during the outbound flow (Inside to Outside) and Inbound flow (Outside to Inside). I would like to understand specifically whether Route is checked first or NAT in each direction ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. What the correct NAT order of operation?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Till now i have an understanding that for the&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inbound flow --- ACL ---&amp;gt; NAT --&amp;gt; Route is checked &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Outbound flow ---ACL --&amp;gt;Route ---NAT is checked&amp;nbsp;&amp;nbsp; -----------&amp;nbsp; Just wanted to know&amp;nbsp; whether I am right with this??????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would be great if an explanation from the expert in CISCO ASA or an CISCO document that gives a clear idea of this concept. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It will be helpful for me when troubleshooting connections !!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks-Pragatheesh&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:35:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-packet-inspection-sequence/m-p/1757182#M496139</guid>
      <dc:creator>praga1986</dc:creator>
      <dc:date>2019-03-11T21:35:57Z</dc:date>
    </item>
    <item>
      <title>CISCO ASA Packet Inspection Sequence</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-packet-inspection-sequence/m-p/1757183#M496140</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Pragatheesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To understand the flow of traffic, i would suggest you make use of packet-tracer command, this gives you a detailed flow of packet in ASA. Lets say you want to test the packet flow, when someone access your web server (1.1.1.1) on its public ip, then the command would be:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 2.2.2.2 2345 1.1.1.1 443 detailed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would give you avery good idea. The source here (2.2.2.2) could be any IP on the outsidfe, and 2345 is your source port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the command reference:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/partner/docs/security/asa/asa82/command/reference/p.html#wp1913020"&gt;http://www.cisco.com/en/US/partner/docs/security/asa/asa82/command/reference/p.html#wp1913020&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just for troubleshooting purpose, always make use of packet-captures and logs:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-17814"&gt;https://supportforums.cisco.com/docs/DOC-17814&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Oct 2011 18:06:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-packet-inspection-sequence/m-p/1757183#M496140</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-10-10T18:06:03Z</dc:date>
    </item>
    <item>
      <title>CISCO ASA Packet Inspection Sequence</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-packet-inspection-sequence/m-p/1757184#M496141</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The packet-flow is different, pre 8.3 and post 8.3, in pre acl is hit first and then natting, but in post 8.3 first nat is done and then ACL is hit, thats why we use private ip's in ACL instead of public, in post 8.3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Oct 2011 18:07:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-packet-inspection-sequence/m-p/1757184#M496141</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-10-10T18:07:24Z</dc:date>
    </item>
    <item>
      <title>CISCO ASA Packet Inspection Sequence</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-packet-inspection-sequence/m-p/1757185#M496142</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I above statement is true in case of NAT-C is enabled however in other case the routing check will occur first after ACL then NAT will be checked...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Mar 2012 06:31:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-packet-inspection-sequence/m-p/1757185#M496142</guid>
      <dc:creator>gourav007</dc:creator>
      <dc:date>2012-03-05T06:31:02Z</dc:date>
    </item>
    <item>
      <title>CISCO ASA Packet Inspection Sequence</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-packet-inspection-sequence/m-p/1757186#M496145</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV&gt;&lt;P&gt;When an ASA passes traffic inside to outside it is as follows.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inside inbound acl (if used)&lt;/P&gt;&lt;P&gt;nat&lt;/P&gt;&lt;P&gt;crypto map (if used)&lt;/P&gt;&lt;P&gt;outside outbound acl (if used)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When an ASA passes traffic from the outside to the inside.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;outside inbound acl&lt;/P&gt;&lt;P&gt;crypto map (if used)&lt;/P&gt;&lt;P&gt;nat&lt;/P&gt;&lt;P&gt;inside outbound acl (if used)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That&amp;nbsp; is pretty straightforward.&amp;nbsp; What is really confusing is the order of&amp;nbsp; operation between different types of nats.&amp;nbsp; For that, I would take a&amp;nbsp; look at the following document.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/nat_overview.html#wp1079279" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/nat_overview.html#wp1079279&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically, it says--&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A name="wp1079284"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; 1. &lt;/STRONG&gt;&lt;A href="http://www.cisco.com/en/US/i/templates/blank.gif"&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;&lt;/A&gt;NAT exemption (&lt;STRONG&gt;nat 0 access-list&lt;/STRONG&gt;)—In&amp;nbsp; order, until the first match. Identity NAT is not included in this&amp;nbsp; category; it is included in the regular static NAT or regular NAT&amp;nbsp; category. We do not recommend overlapping addresses in NAT exemption&amp;nbsp; statements because unexpected results can occur.&lt;/P&gt;&lt;P&gt;&lt;A name="wp1079285"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; 2. &lt;/STRONG&gt;&lt;A href="http://www.cisco.com/en/US/i/templates/blank.gif"&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;&lt;/A&gt;Static NAT and Static PAT (regular and policy) (&lt;STRONG&gt;static&lt;/STRONG&gt;)—In order, until the first match. Static identity NAT is included in this category.&lt;/P&gt;&lt;P&gt;&lt;A name="wp1079286"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; 3. &lt;/STRONG&gt;&lt;A href="http://www.cisco.com/en/US/i/templates/blank.gif"&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;&lt;/A&gt;Policy dynamic NAT (&lt;STRONG&gt;nat access-list&lt;/STRONG&gt;)—In order, until the first match. Overlapping addresses are allowed.&lt;/P&gt;&lt;P&gt;&lt;A name="wp1079287"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; 4. &lt;/STRONG&gt;&lt;A href="http://www.cisco.com/en/US/i/templates/blank.gif"&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;&lt;/A&gt;Regular dynamic NAT (&lt;STRONG&gt;nat&lt;/STRONG&gt;)—Best match. Regular identity NAT is included in this category. The order of the NAT commands does not matter; the NAT&lt;STRONG&gt; &lt;/STRONG&gt;statement&amp;nbsp; that best matches the real address is used. For example, you can create&amp;nbsp; a general statement to translate all addresses (0.0.0.0) on an&amp;nbsp; interface. If you want to translate a subset of your network (10.1.1.1)&amp;nbsp; to a different address, then you can create a statement to translate&amp;nbsp; only 10.1.1.1. When 10.1.1.1 makes a connection, the specific statement&amp;nbsp; for 10.1.1.1 is used because it matches the real address best. We do not&amp;nbsp; recommend using overlapping statements; they use more memory and can&amp;nbsp; slow the performance of the adaptive security appliance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The&amp;nbsp; tricky part is #2 contains NAT and PAT as well as regular and policy.&amp;nbsp;&amp;nbsp; So there are 4 iterations in that one section. The go in the order they&amp;nbsp; were entered into the config.&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Mar 2012 08:30:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-packet-inspection-sequence/m-p/1757186#M496145</guid>
      <dc:creator>svaish</dc:creator>
      <dc:date>2012-03-05T08:30:40Z</dc:date>
    </item>
    <item>
      <title>CISCO ASA Packet Inspection Sequence</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-packet-inspection-sequence/m-p/1757187#M496149</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; thanks for the update svaish,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in cisco we use interface based NAT means the NAT decisions are taken place on the basis of the firection of traffic, and direction can be found in route means route occurs first and then NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is what i have seen my hands on experiance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Mar 2012 08:54:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-packet-inspection-sequence/m-p/1757187#M496149</guid>
      <dc:creator>gourav007</dc:creator>
      <dc:date>2012-03-05T08:54:51Z</dc:date>
    </item>
    <item>
      <title>CISCO ASA Packet Inspection Sequence</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-packet-inspection-sequence/m-p/1757188#M496151</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the complete explanation on how a packte is processed through the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL type="1"&gt;&lt;LI&gt;&lt;P&gt;Packet is reached at the ingress interface.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Once the packet reaches the internal buffer of the interface, the input counter of the interface is incremented by one.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Cisco ASA will first verify if this is an existing connection by&amp;nbsp; looking at its internal connection table details. If the packet flow&amp;nbsp; matches an existing connection, then the access-control list (ACL) check&amp;nbsp; is bypassed, and the packet is moved forward.&lt;/P&gt;&lt;P&gt;If packet flow does not match an existing connection, then TCP state&amp;nbsp; is verified. If it is a SYN packet or UDP packet, then the connection&amp;nbsp; counter is incremented by one and the packet is sent for an ACL check.&amp;nbsp; If it is not a SYN packet, the packet is dropped and the event is&amp;nbsp; logged.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The packet is processed as per the interface ACLs. It is verified in&amp;nbsp; sequential order of the ACL entries and if it matches any of the ACL&amp;nbsp; entries, it moves forward. Otherwise, the packet is dropped and the&amp;nbsp; information is logged. The ACL hit count will be incremented by one when&amp;nbsp; the packet matches the ACL entry.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The packet is verified for the translation rules. If a packet passes&amp;nbsp; through this check, then a connection entry is created for this flow,&amp;nbsp; and the packet moves forward. Otherwise, the packet is dropped and the&amp;nbsp; information is logged.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The packet is subjected to an Inspection Check. This inspection&amp;nbsp; verifies whether or not this specific packet flow is in compliance with&amp;nbsp; the protocol. Cisco ASA has a built-in inspection engine that inspects&amp;nbsp; each connection as per its pre-defined set of application-level&amp;nbsp; functionalities. If it passed the inspection, it is moved forward.&amp;nbsp; Otherwise, the packet is dropped and the information is logged.&lt;/P&gt;&lt;P&gt;Additional Security-Checks will be implemented if a CSC module is involved.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The IP header information is translated as per the NAT/PAT rule and&amp;nbsp; checksums are updated accordingly. The packet is forwarded to AIP-SSM&amp;nbsp; for IPS related security checks, when the AIP module is involved.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The packet is forwarded to the egress interface based on the&amp;nbsp; translation rules. If no egress interface is specified in the&amp;nbsp; translation rule, then the destination interface is decided based on&amp;nbsp; global route lookup.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;On the egress interface, the interface route lookup is performed.&amp;nbsp; Remember, the egress interface is determined by the translation rule&amp;nbsp; that will take the priority.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Once a Layer 3 route has been found and the next hop identified,&amp;nbsp; Layer 2 resolution is performed. Layer 2 rewrite of MAC header happens&amp;nbsp; at this stage.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The packet is transmitted on wire, and Interface counters increment on the egress interface.&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Steps 7 and 8 are referring to NAT configuration which has its own order of operation which I already explained above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sachin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Mar 2012 09:06:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-packet-inspection-sequence/m-p/1757188#M496151</guid>
      <dc:creator>svaish</dc:creator>
      <dc:date>2012-03-05T09:06:30Z</dc:date>
    </item>
    <item>
      <title>https://supportforums.cisco</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-packet-inspection-sequence/m-p/1757189#M496152</link>
      <description>&lt;P&gt;https://supportforums.cisco.com/discussion/11788851/cisco-asa-traffic-flow&lt;/P&gt;&lt;P&gt;Well this was the doc i prepared.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Apr 2014 18:19:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-packet-inspection-sequence/m-p/1757189#M496152</guid>
      <dc:creator>secureIT</dc:creator>
      <dc:date>2014-04-01T18:19:34Z</dc:date>
    </item>
  </channel>
</rss>

