<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA Traffic Flows in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-traffic-flows/m-p/1805636#M530855</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Andrew,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are trying to access the internet from your internal lan, then:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Request would come to ASA inside interface&lt;/P&gt;&lt;P&gt;NAT statement would be checked and it would PAT to your external public ip.&lt;/P&gt;&lt;P&gt;The return traffic would hit external ip on ASA&lt;/P&gt;&lt;P&gt;ASA would see that this is the reply packet to your connection request.&lt;/P&gt;&lt;P&gt;It would un-nat the external ip to internal lan ip and send it to your lan machine&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is how ASA would work, so yes this would work on ASA if thats your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 14 Sep 2011 15:25:11 GMT</pubDate>
    <dc:creator>varrao</dc:creator>
    <dc:date>2011-09-14T15:25:11Z</dc:date>
    <item>
      <title>ASA Traffic Flows</title>
      <link>https://community.cisco.com/t5/network-security/asa-traffic-flows/m-p/1805633#M530851</link>
      <description>&lt;P&gt;Hey all, hopefully this should be a nice easy one!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I remember being told a while back that ASA devices don't handle traffic very well that goes outbound out of an interface, and then comes back inbound on the same interface.&amp;nbsp; For example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- traffic leaves an internal LAN bound for it internet&lt;/P&gt;&lt;P&gt;- hits the ASA on an internal interface&lt;/P&gt;&lt;P&gt;- leaves the ASA external interface on a PAT address (public IP)&lt;/P&gt;&lt;P&gt;- hits same ASA external interface on a public IP that NATs through to an internal LAN address&lt;/P&gt;&lt;P&gt;- NATs through to internal LAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could anyone confirm that this is the case and if this behaviour has a particular name?&amp;nbsp; Like I say, I remember being told that this wouldn't work (I couldn't VPN to our external address from inside our network for example), but I'd like to read up a bit more about it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:24:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-traffic-flows/m-p/1805633#M530851</guid>
      <dc:creator>andrewburridge</dc:creator>
      <dc:date>2019-03-11T21:24:42Z</dc:date>
    </item>
    <item>
      <title>ASA Traffic Flows</title>
      <link>https://community.cisco.com/t5/network-security/asa-traffic-flows/m-p/1805634#M530853</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Andrew,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The flow below is correct as you have stated, but I am not really sure about your question?? Are you doubtful taht the firewall woudl drop the return traffic, because tahts not the case. Firewall is a ststeful device, which means it maintains the state table of the connections and carries out inspection and knows that the return packet is a part of the connection already established.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know what you exact query is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Sep 2011 13:29:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-traffic-flows/m-p/1805634#M530853</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-14T13:29:07Z</dc:date>
    </item>
    <item>
      <title>ASA Traffic Flows</title>
      <link>https://community.cisco.com/t5/network-security/asa-traffic-flows/m-p/1805635#M530854</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="color: #333333; font-family: arial, helvetica, sans-serif; font-size: 10pt; text-align: left; padding: 8px;"&gt;Hi Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply. I guess the key to my question is I've always thought that such a traffic flow wouldn't actually work.&amp;nbsp; It doesn't work in our environment at least, and I was always told that this was just due to the inherent nature by which the ASA handles traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Sep 2011 15:06:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-traffic-flows/m-p/1805635#M530854</guid>
      <dc:creator>andrewburridge</dc:creator>
      <dc:date>2011-09-14T15:06:43Z</dc:date>
    </item>
    <item>
      <title>ASA Traffic Flows</title>
      <link>https://community.cisco.com/t5/network-security/asa-traffic-flows/m-p/1805636#M530855</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Andrew,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are trying to access the internet from your internal lan, then:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Request would come to ASA inside interface&lt;/P&gt;&lt;P&gt;NAT statement would be checked and it would PAT to your external public ip.&lt;/P&gt;&lt;P&gt;The return traffic would hit external ip on ASA&lt;/P&gt;&lt;P&gt;ASA would see that this is the reply packet to your connection request.&lt;/P&gt;&lt;P&gt;It would un-nat the external ip to internal lan ip and send it to your lan machine&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is how ASA would work, so yes this would work on ASA if thats your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Sep 2011 15:25:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-traffic-flows/m-p/1805636#M530855</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-14T15:25:11Z</dc:date>
    </item>
  </channel>
</rss>

