<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Accessing Exchange Server from DMZ in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761388#M533291</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ASA# sh capture capin&lt;/P&gt;&lt;P&gt;1 packet captured&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 09:15:58.300414 10.2.2.2.25 &amp;gt; 10.2.2.30.25: S 1910509976:1910509976(0) win 8192&lt;/P&gt;&lt;P&gt;1 packet shown&lt;/P&gt;&lt;P&gt;ASA# sh capture capo&lt;/P&gt;&lt;P&gt;1 packet captured&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 09:15:58.300414 10.2.2.2.25 &amp;gt; 10.2.2.30.25: S 1910509976:1910509976(0) win 8192&lt;/P&gt;&lt;P&gt;1 packet shown&lt;SPAN id="mce_marker"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 18 Aug 2011 15:28:54 GMT</pubDate>
    <dc:creator>sholiday666</dc:creator>
    <dc:date>2011-08-18T15:28:54Z</dc:date>
    <item>
      <title>Accessing Exchange Server from DMZ</title>
      <link>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761380#M533283</link>
      <description>&lt;P&gt;Good morning, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have a ASA5510 with a webserver in the DMZ network 10.2.2.0/24. We now want this web server to be able to access the Exchange server in the Inside network 10.1.1.0/24. I researched this and it seemed straight forward according the the Cisco document below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807fc191.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807fc191.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm looking to do this with smtp so I added these lines to the config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,DMZ) 10.2.2.30 10.1.1.11 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-list dmz extended permit tcp host 10.2.2.2 host 10.2.2.30 eq smtp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration line:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group DMZ in interface DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Already existed in the configuration so didn't need to be re-entered.&lt;/P&gt;&lt;P&gt;ASA Version 8.0(4)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname xxxx&lt;/P&gt;&lt;P&gt;domain-name xxxx.com&lt;/P&gt;&lt;P&gt;enable password xxxxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;passwd xxxxxxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address xxx.xxx.141.85 255.255.255.224&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 10.1.255.254 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;nameif dmz&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;ip address 10.2.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt;nameif management&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa804-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone MDT -7&lt;/P&gt;&lt;P&gt;clock summer-time MDT recurring&lt;/P&gt;&lt;P&gt;dns domain-lookup outside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;name-server 4.2.2.1&lt;/P&gt;&lt;P&gt;domain-name mjfirm.com&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host xxx.xxx.141.83 eq www&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host xxx.xxx.141.83 eq https&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host xxx.xxx.141.83 eq ftp&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host xxx.xxx.141.83 eq ftp-data&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host xxx.xxx.141.83 eq ssh&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host xxx.xxx.141.84 eq imap4&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host xxx.xxx.141.84 eq pop3&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host xxx.xxx.141.84 eq www&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host xxx.xxx.141.84 eq https&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host xxx.xxx.141.84 eq smtp&lt;/P&gt;&lt;P&gt;access-list inbound extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list dmz extended deny ip any 10.1.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list dmz extended permit tcp host 10.2.2.2 host 10.2.2.30 eq smtp&lt;/P&gt;&lt;P&gt;access-list dmz extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 10.1.0.0 255.255.0.0 172.16.22.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 10.1.0.0 255.255.0.0 10.1.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 10.1.10.0 255.255.255.0 10.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 10.1.1.0 255.255.255.0 10.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list vpnsplit extended permit ip 10.1.0.0 255.255.0.0 172.16.22.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list encrypt_acl extended permit ip 10.1.10.0 255.255.255.0 10.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list encrypt_acl extended permit ip 10.1.1.0 255.255.255.0 10.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;ip local pool vpnpool 172.16.22.1-172.16.22.254 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-61551.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 10 xxx.xxx.141.82 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;global (dmz) 10 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 10 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (dmz) 10 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (dmz,outside) xxx.xxx.141.83 10.2.2.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) xxx.xxx.141.84 10.1.1.11 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,dmz) 10.2.2.30 10.1.1.11 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group inbound in interface outside&lt;/P&gt;&lt;P&gt;access-group dmz in interface dmz&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 xxx.xxx.141.81 1&lt;/P&gt;&lt;P&gt;route inside 10.1.0.0 255.255.0.0 10.1.255.249 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa-server vpn protocol radius&lt;/P&gt;&lt;P&gt;aaa-server vpn (inside) host 10.1.1.12&lt;/P&gt;&lt;P&gt;key --&amp;gt;&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL&lt;/P&gt;&lt;P&gt;aaa local authentication attempts max-fail 16&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 172.16.22.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 10.1.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;sysopt noproxyarp inside&lt;/P&gt;&lt;P&gt;sysopt noproxyarp dmz&lt;/P&gt;&lt;P&gt;sysopt noproxyarp management&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set HQset esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 10 set transform-set ESP-3DES-MD5&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 10 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 10 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 10 set reverse-route&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 match address encrypt_acl&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 set peer 207.202.195.198&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 set transform-set HQset&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption 3des&lt;/P&gt;&lt;P&gt;hash md5&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp nat-traversal 50&lt;/P&gt;&lt;P&gt;telnet 10.1.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 15&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh 10.1.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 30&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P&gt;ntp server 192.43.244.18&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;enable outside&lt;/P&gt;&lt;P&gt;svc image disk0:/anyconnect-win-2.3.0254-k9.pkg 1&lt;/P&gt;&lt;P&gt;svc enable&lt;/P&gt;&lt;P&gt;tunnel-group-list enable&lt;/P&gt;&lt;P&gt;group-policy vpnclients internal&lt;/P&gt;&lt;P&gt;group-policy vpnclients attributes&lt;/P&gt;&lt;P&gt;wins-server value 10.1.1.12&lt;/P&gt;&lt;P&gt;dns-server value 10.1.1.12&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol IPSec&lt;/P&gt;&lt;P&gt;ipsec-udp enable&lt;/P&gt;&lt;P&gt;split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt;split-tunnel-network-list value vpnsplit&lt;/P&gt;&lt;P&gt;default-domain value mjfirm.local&lt;/P&gt;&lt;P&gt;split-dns value mjfirm.local&lt;/P&gt;&lt;P&gt;address-pools value vpnpool&lt;/P&gt;&lt;P&gt;group-policy clientgroup internal&lt;/P&gt;&lt;P&gt;group-policy clientgroup attributes&lt;/P&gt;&lt;P&gt;wins-server value 10.1.1.12&lt;/P&gt;&lt;P&gt;dns-server value 10.1.1.12&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol svc webvpn&lt;/P&gt;&lt;P&gt;split-tunnel-policy tunnelall&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;svc keep-installer installed&lt;/P&gt;&lt;P&gt;svc rekey time 30&lt;/P&gt;&lt;P&gt;svc rekey method ssl&lt;/P&gt;&lt;P&gt;svc ask none default svc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group M&amp;amp;J type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group M&amp;amp;J general-attributes&lt;/P&gt;&lt;P&gt;address-pool vpnpool&lt;/P&gt;&lt;P&gt;authentication-server-group vpn&lt;/P&gt;&lt;P&gt;default-group-policy vpnclients&lt;/P&gt;&lt;P&gt;tunnel-group M&amp;amp;J ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group sslgroup type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group sslgroup general-attributes&lt;/P&gt;&lt;P&gt;address-pool vpnpool&lt;/P&gt;&lt;P&gt;authentication-server-group vpn&lt;/P&gt;&lt;P&gt;default-group-policy clientgroup&lt;/P&gt;&lt;P&gt;tunnel-group sslgroup webvpn-attributes&lt;/P&gt;&lt;P&gt;group-alias sslgroup_users enable&lt;/P&gt;&lt;P&gt;tunnel-group xxx.xxx.195.198 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group xxx.xxx.195.198 ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;message-length maximum 768&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt;inspect ftp&lt;/P&gt;&lt;P&gt;inspect h323 h225&lt;/P&gt;&lt;P&gt;inspect h323 ras&lt;/P&gt;&lt;P&gt;inspect rsh&lt;/P&gt;&lt;P&gt;inspect rtsp&lt;/P&gt;&lt;P&gt;inspect sqlnet&lt;/P&gt;&lt;P&gt;inspect skinny&lt;/P&gt;&lt;P&gt;inspect sunrpc&lt;/P&gt;&lt;P&gt;inspect xdmcp&lt;/P&gt;&lt;P&gt;inspect sip&lt;/P&gt;&lt;P&gt;inspect netbios&lt;/P&gt;&lt;P&gt;inspect tftp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxxxxxxxxxxxxxxxxxxxxxxxxxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;It's not working.&amp;nbsp; Below is the output form Packet-Tracer using smtp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,dmz) 10.2.2.30 10.1.1.11 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;match ip inside host 10.1.1.11 dmz any&lt;/P&gt;&lt;P&gt;static translation to 10.2.2.30&lt;/P&gt;&lt;P&gt;translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt;out id=0xd5786190, priority=5, domain=nat-reverse, deny=false&lt;/P&gt;&lt;P&gt;hits=9, user_data=0xd627c598, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;dst ip=10.1.1.11, mask=255.255.255.255, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: dmz&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any assistance would be appreciated!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:13:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761380#M533283</guid>
      <dc:creator>sholiday666</dc:creator>
      <dc:date>2019-03-11T21:13:09Z</dc:date>
    </item>
    <item>
      <title>Accessing Exchange Server from DMZ</title>
      <link>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761381#M533284</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Scott,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you provide the complete output of the packet-tracer, that will be helpful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Aug 2011 16:14:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761381#M533284</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-17T16:14:10Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing Exchange Server from DMZ</title>
      <link>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761382#M533285</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Varun, here it is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# packet-tracer input dmz tcp 10.2.2.2 smtp 10.1.1.11 smtp detailed&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 10.1.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group dmz in interface dmz&lt;BR /&gt;access-list dmz extended permit ip any any&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in&amp;nbsp; id=0xd56cdc20, priority=12, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=18, user_data=0xd5785640, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in&amp;nbsp; id=0xd56f8458, priority=0, domain=permit-ip-option, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=905436, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (dmz,outside) xxx.xxx.141.83 10.2.2.2 netmask 255.255.255.255&lt;BR /&gt;&amp;nbsp; match ip dmz host 10.2.2.2 outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to xxx.xxx.141.83&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 29659, untranslate_hits = 1026673&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in&amp;nbsp; id=0xd576e668, priority=5, domain=host, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=899340, user_data=0xd5786790, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=10.2.2.2, mask=255.255.255.255, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;static (inside,dmz) 10.2.2.30 10.1.1.11 netmask 255.255.255.255&lt;BR /&gt;&amp;nbsp; match ip inside host 10.1.1.11 dmz any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 10.2.2.30&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0xd967f210, priority=5, domain=nat-reverse, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=0, user_data=0xd96d12a0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=10.1.1.11, mask=255.255.255.255, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: dmz&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Aug 2011 17:15:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761382#M533285</guid>
      <dc:creator>sholiday666</dc:creator>
      <dc:date>2011-08-17T17:15:48Z</dc:date>
    </item>
    <item>
      <title>Accessing Exchange Server from DMZ</title>
      <link>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761383#M533286</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Scott,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Something doesn't seem right to me, if you see on the tracer, on phase 5, the packets are falling into the wrong nat statement, because the tracer command&amp;nbsp; used is not correct, it should be:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input dmz tcp 10.2.2.2 2345 10.2.2.30 smtp detailed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember, you are trying to access the server on inside on IP 10.2.2.30, so it should be this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i would also take captures on the firewall;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list cap permit ip host 10.2.2.2 host 10.2.2.30&lt;/P&gt;&lt;P&gt;access-list cap permit ip host 10.2.2.30 host 10.2.2.2&lt;/P&gt;&lt;P&gt;access-list cap permit ip host 10.1.1.11 host 10.2.2.2&lt;/P&gt;&lt;P&gt;access-list cap permit ip host 10.2.2.2 host 10.1.1.11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cap capin access-list cap interface inside&lt;/P&gt;&lt;P&gt;cap capo access-list cap interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Generate some traffic and then collect the captures and logs for it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show cap capin&lt;/P&gt;&lt;P&gt;show cap capo&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, as a test, can you add:&lt;/P&gt;&lt;P&gt;global (inside) 10 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know the results.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Aug 2011 17:49:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761383#M533286</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-17T17:49:11Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing Exchange Server from DMZ</title>
      <link>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761384#M533287</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Varun.&amp;nbsp; That did the trick as far as packet-tracer.&amp;nbsp; Below is the output.&amp;nbsp; But why did you ahve me use port 2345?&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (inside,dmz) 10.2.2.30 10.1.1.11 netmask 255.255.255.255&lt;BR /&gt;&amp;nbsp; match ip inside host 10.1.1.11 dmz any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 10.2.2.30&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 1&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate 10.2.2.30/0 to 10.1.1.11/0 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group dmz in interface dmz&lt;BR /&gt;access-list dmz extended permit tcp host 10.2.2.2 host 10.2.2.30 eq smtp&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in&amp;nbsp; id=0xd9dc16d8, priority=12, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=0, user_data=0xd56ae608, cs_id=0x0, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=10.2.2.2, mask=255.255.255.255, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=10.2.2.30, mask=255.255.255.255, port=25, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in&amp;nbsp; id=0xd56f8458, priority=0, domain=permit-ip-option, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=906425, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (dmz,outside) xxx.xxx.141.83 10.2.2.2 netmask 255.255.255.255&lt;BR /&gt;&amp;nbsp; match ip dmz host 10.2.2.2 outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to xxx.xxx.141.83&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 29663, untranslate_hits = 1026933&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in&amp;nbsp; id=0xd576e668, priority=5, domain=host, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=900329, user_data=0xd5786790, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=10.2.2.2, mask=255.255.255.255, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (inside,dmz) 10.2.2.30 10.1.1.11 netmask 255.255.255.255&lt;BR /&gt;&amp;nbsp; match ip inside host 10.1.1.11 dmz any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 10.2.2.30&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 1&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0xd967f210, priority=5, domain=nat-reverse, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1, user_data=0xd96d12a0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=10.1.1.11, mask=255.255.255.255, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (inside,outside) xxx.xxx.141.84 10.1.1.11 netmask 255.255.255.255&lt;BR /&gt;&amp;nbsp; match ip inside host 10.1.1.11 outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to xxx.xxx.141.84&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 19832486, untranslate_hits = 5484763&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in&amp;nbsp; id=0xd56093b0, priority=5, domain=host, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=23010699, user_data=0xd5915db8, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=10.1.1.11, mask=255.255.255.255, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in&amp;nbsp; id=0xd56a5470, priority=0, domain=permit-ip-option, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=145735197, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 149903633, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: output and adjacency&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 10.1.255.249 using egress ifc inside&lt;BR /&gt;adjacency Active&lt;BR /&gt;next-hop mac address 0017.0e3b.82bf hits 3981329&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: dmz&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Aug 2011 19:07:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761384#M533287</guid>
      <dc:creator>sholiday666</dc:creator>
      <dc:date>2011-08-17T19:07:03Z</dc:date>
    </item>
    <item>
      <title>Accessing Exchange Server from DMZ</title>
      <link>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761385#M533288</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Scott,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you take the captures and logs as well???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Aug 2011 02:25:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761385#M533288</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-18T02:25:49Z</dc:date>
    </item>
    <item>
      <title>Accessing Exchange Server from DMZ</title>
      <link>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761386#M533289</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Varuna,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes set up the captures but i didn't get anything.&amp;nbsp; I generated telnet, icmp, and smtp from 10.2.2.2 to 10.2.2.30 then added captures for the dmz interface and again no captures.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Aug 2011 04:25:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761386#M533289</guid>
      <dc:creator>sholiday666</dc:creator>
      <dc:date>2011-08-18T04:25:15Z</dc:date>
    </item>
    <item>
      <title>Accessing Exchange Server from DMZ</title>
      <link>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761387#M533290</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Scott,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what we would need to identify is, apply both the captures on the inside and dmz together and then generate traffic. Reason 1 - This would identify whether tnhe traffic is reaching the ASA dmthz interface, if not then routing on the etwork needs to be checked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reason 2- If the packets are seen on the dmz, do those packets reach the inside interface?? If not, its ASA dropping them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Collect logs as well, it would help greatly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Aug 2011 04:34:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761387#M533290</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-18T04:34:03Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing Exchange Server from DMZ</title>
      <link>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761388#M533291</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ASA# sh capture capin&lt;/P&gt;&lt;P&gt;1 packet captured&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 09:15:58.300414 10.2.2.2.25 &amp;gt; 10.2.2.30.25: S 1910509976:1910509976(0) win 8192&lt;/P&gt;&lt;P&gt;1 packet shown&lt;/P&gt;&lt;P&gt;ASA# sh capture capo&lt;/P&gt;&lt;P&gt;1 packet captured&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 09:15:58.300414 10.2.2.2.25 &amp;gt; 10.2.2.30.25: S 1910509976:1910509976(0) win 8192&lt;/P&gt;&lt;P&gt;1 packet shown&lt;SPAN id="mce_marker"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Aug 2011 15:28:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761388#M533291</guid>
      <dc:creator>sholiday666</dc:creator>
      <dc:date>2011-08-18T15:28:54Z</dc:date>
    </item>
    <item>
      <title>Accessing Exchange Server from DMZ</title>
      <link>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761389#M533292</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Scott,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The captures shows me that the request is going to the server but no replies coming back, which means the server is not responding back.&lt;/P&gt;&lt;P&gt;But before jumpimg to conclusions, I think after applying the captures, you ran a packet tracer and collected the cap tures, because the source port is also 25, in actual traffic, the source port would always be a higherseries port number. Also packet-tracer is just a helping tool and never always the clear picture. We now need to depend on the real traffic, and it would be good to take logs and captures when you actually initiate traffic from the dmz host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For collecting logs you would need:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;logging buffered 7&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;after generating traffic:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show logg | in 10.2.2.2&lt;/P&gt;&lt;P&gt;show logg | in 10.2.2.30&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess we would nail the problem this way, and also could you please test with:&lt;/P&gt;&lt;P&gt;global (inside) 10 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Aug 2011 15:42:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761389#M533292</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-18T15:42:56Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing Exchange Server from DMZ</title>
      <link>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761390#M533293</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I added the entry &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (inside) 10 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and enabled logging and initiated traffic from the web server using the form that will contact the Exchange server, but nothing is showing up in the logs for 10.2.2.2 or 10.2.2.30.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Aug 2011 16:51:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761390#M533293</guid>
      <dc:creator>sholiday666</dc:creator>
      <dc:date>2011-08-18T16:51:40Z</dc:date>
    </item>
    <item>
      <title>Accessing Exchange Server from DMZ</title>
      <link>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761391#M533294</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Scott,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you do not see anything in the logs and the captures, then it might be posible that the packets are not even reaching the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Aug 2011 17:00:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761391#M533294</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-18T17:00:56Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing Exchange Server from DMZ</title>
      <link>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761392#M533295</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you look at my configuration you probably noticed that I attempted to enable telnet and ICMP to test.&amp;nbsp; Telnet and ping are not working either.&amp;nbsp; Is there something you can see in the config that is not right?&amp;nbsp; these were the entries I created for telnet and ICMP:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz extended permit tcp host 10.2.2.2 host 10.2.2.30 eq telnet&lt;/P&gt;&lt;P&gt;access-list dmz extended permit icmp host 10.2.2.2 host 10.2.2.30 echo&lt;/P&gt;&lt;P&gt;access-list dmz extended permit icmp host 10.2.2.2 host 10.2.2.30 echo-reply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Shouldn't these work.&amp;nbsp; If I could get telnet going i could try the old "telnet 10.2.2.30 25" command from the 10.2.2.2 host.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Aug 2011 17:10:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761392#M533295</guid>
      <dc:creator>sholiday666</dc:creator>
      <dc:date>2011-08-18T17:10:40Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing Exchange Server from DMZ</title>
      <link>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761393#M533296</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the output from sh xlate detail:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MJASA# sh xlate detail&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT from inside:10.1.1.11 to dmz:10.2.2.30 flags s&lt;/P&gt;&lt;P&gt;NAT from dmz:10.2.2.2 to inside:10.2.2.2 flags s&lt;/P&gt;&lt;P&gt;NAT from dmz:10.2.2.2 to outside:xxx.xxx.141.83 flags s&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Aug 2011 17:25:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761393#M533296</guid>
      <dc:creator>sholiday666</dc:creator>
      <dc:date>2011-08-18T17:25:17Z</dc:date>
    </item>
    <item>
      <title>Accessing Exchange Server from DMZ</title>
      <link>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761394#M533297</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Scott, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you have is correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets try one thing, use the following config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) 10.1.1.11 10.1.1.11&lt;/P&gt;&lt;P&gt;nat (dmz) 10 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;global (inside) 10 interface&lt;/P&gt;&lt;P&gt;access-list dmz extended permit tcp host 10.2.2.2 host 10.1.1.11 eq telnet&lt;/P&gt;&lt;P&gt;access-list dmz extended permit icmp host 10.2.2.2 host 10.1.1.11 echo&lt;/P&gt;&lt;P&gt;access-list dmz extended permit icmp host 10.2.2.2 host 10.1.1.11 echo-reply&lt;/P&gt;&lt;P&gt;access-list dmz extended permit icmp host 10.2.2.2 host 10.1.1.11 eq 25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;once you have this, apply fresh captures:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list test permit ip host 10.1.1.11 host 10.2.2.2&lt;/P&gt;&lt;P&gt;access-list test permit ip host 10.2.2.2 host 10.1.1.11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cap capi access-list test interface inside&lt;/P&gt;&lt;P&gt;cap capdmz access-list test interface dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once you have everything setup, try initiating telnet or ping traffic, and collect captures. If we atleast have this info, we woudl be able to identify the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope everything goes well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Aug 2011 17:30:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761394#M533297</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-18T17:30:07Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing Exchange Server from DMZ</title>
      <link>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761395#M533298</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Do I need to erase the other configuration entries related to telnet and ICMP using 10.2.2.30 first?&amp;nbsp; Also do i need to erase the "access-list dmz extended permit ip any any" and then add it back at the end so it shows up last?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I appreciate your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Aug 2011 17:37:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761395#M533298</guid>
      <dc:creator>sholiday666</dc:creator>
      <dc:date>2011-08-18T17:37:54Z</dc:date>
    </item>
    <item>
      <title>Accessing Exchange Server from DMZ</title>
      <link>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761396#M533299</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you have ip any any in dmz interface, let it be for testing purpose, just remove the previous static and add the new statement, along with the global.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Aug 2011 17:40:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761396#M533299</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-18T17:40:01Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing Exchange Server from DMZ</title>
      <link>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761397#M533300</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ping and telnet are working and I was able to connect to Exchange.&amp;nbsp; Here is a small sample of the capture.&amp;nbsp; There are hundreds of lines:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MJASA(config)# sh capture capin&lt;/P&gt;&lt;P&gt;1917 packets captured&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 09:15:58.300414 10.2.2.2.25 &amp;gt; 10.2.2.30.25: S 1910509976:1910509976(0) win 8192&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2: 09:33:52.110010 10.2.2.2.25 &amp;gt; 10.2.2.30.25: S 1614045430:1614045430(0) win 8192&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 3: 11:59:13.552141 10.2.2.2 &amp;gt; 10.1.1.11: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 4: 11:59:13.552309 10.2.2.2 &amp;gt; 10.1.1.11: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 5: 11:59:13.552736 10.1.1.11 &amp;gt; 10.2.2.2: icmp: echo reply&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 6: 11:59:13.552873 10.1.1.11 &amp;gt; 10.2.2.2: icmp: echo reply&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 7: 11:59:14.544207 10.2.2.2 &amp;gt; 10.1.1.11: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 8: 11:59:14.544237 10.2.2.2 &amp;gt; 10.1.1.11: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 9: 11:59:14.544649 10.1.1.11 &amp;gt; 10.2.2.2: icmp: echo reply&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10: 11:59:14.544664 10.1.1.11 &amp;gt; 10.2.2.2: icmp: echo reply&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11: 11:59:15.544191 10.2.2.2 &amp;gt; 10.1.1.11: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12: 11:59:15.544222 10.2.2.2 &amp;gt; 10.1.1.11: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 13: 11:59:15.544573 10.1.1.11 &amp;gt; 10.2.2.2: icmp: echo reply&lt;/P&gt;&lt;P&gt;&amp;nbsp; 14: 11:59:15.544588 10.1.1.11 &amp;gt; 10.2.2.2: icmp: echo reply&lt;/P&gt;&lt;P&gt;&amp;nbsp; 15: 11:59:16.544252 10.2.2.2 &amp;gt; 10.1.1.11: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 16: 11:59:16.544268 10.2.2.2 &amp;gt; 10.1.1.11: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 17: 11:59:16.544619 10.1.1.11 &amp;gt; 10.2.2.2: icmp: echo reply&lt;/P&gt;&lt;P&gt;&amp;nbsp; 18: 11:59:16.544634 10.1.1.11 &amp;gt; 10.2.2.2: icmp: echo reply&lt;/P&gt;&lt;P&gt;&amp;nbsp; 19: 11:59:24.607527 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: S 3220685032:3220685032(0) win 65535 &lt;MSS 1460=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;op,nop,sackOK&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 20: 11:59:24.607726 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: S 3606219141:3606219141(0) win 65535 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;op,nop,sackOK&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 21: 11:59:24.608229 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: S 735101338:735101338(0) ack 3606219142 win 8192&lt;/P&gt;&lt;P&gt; &lt;MSS 1460=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 22: 11:59:24.608290 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: S 1680224940:1680224940(0) ack 3220685033 win 81&lt;/P&gt;&lt;P&gt;92 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 23: 11:59:24.608382 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: . ack 1680224941 win 65535&lt;/P&gt;&lt;P&gt;&amp;nbsp; 24: 11:59:24.608412 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: . ack 735101339 win 65535&lt;/P&gt;&lt;P&gt;&amp;nbsp; 25: 11:59:24.609862 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: P 735101339:735101438(99) ack 3606219142 win 648&lt;/P&gt;&lt;P&gt;60&lt;/P&gt;&lt;P&gt;&amp;nbsp; 26: 11:59:24.609877 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: P 1680224941:1680225040(99) ack 3220685033 win 6&lt;/P&gt;&lt;P&gt;4860&lt;/P&gt;&lt;P&gt;&amp;nbsp; 27: 11:59:24.856782 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: . ack 1680225040 win 65436&lt;/P&gt;&lt;P&gt;&amp;nbsp; 28: 11:59:24.856812 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: . ack 735101438 win 65436&lt;/P&gt;&lt;P&gt;&amp;nbsp; 29: 11:59:30.971827 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3220685033:3220685034(1) ack 1680225040 win 65&lt;/P&gt;&lt;P&gt;436&lt;/P&gt;&lt;P&gt;&amp;nbsp; 30: 11:59:30.971843 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3606219142:3606219143(1) ack 735101438 win 654&lt;/P&gt;&lt;P&gt;36&lt;/P&gt;&lt;P&gt;&amp;nbsp; 31: 11:59:31.174734 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3606219143 win 64859&lt;/P&gt;&lt;P&gt;&amp;nbsp; 32: 11:59:31.174749 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3220685034 win 64859&lt;/P&gt;&lt;P&gt;&amp;nbsp; 33: 11:59:31.306960 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3220685034:3220685035(1) ack 1680225040 win 65&lt;/P&gt;&lt;P&gt;436&lt;/P&gt;&lt;P&gt;&amp;nbsp; 34: 11:59:31.306975 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3606219143:3606219144(1) ack 735101438 win 654&lt;/P&gt;&lt;P&gt;36&lt;/P&gt;&lt;P&gt;&amp;nbsp; 35: 11:59:31.502278 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3606219144 win 64858&lt;/P&gt;&lt;P&gt;&amp;nbsp; 36: 11:59:31.502293 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3220685035 win 64858&lt;/P&gt;&lt;P&gt;&amp;nbsp; 37: 11:59:31.546846 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3220685035:3220685036(1) ack 1680225040 win 65&lt;/P&gt;&lt;P&gt;436&lt;/P&gt;&lt;P&gt;&amp;nbsp; 38: 11:59:31.546861 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3606219144:3606219145(1) ack 735101438 win 654&lt;/P&gt;&lt;P&gt;36&lt;/P&gt;&lt;P&gt;&amp;nbsp; 39: 11:59:31.751868 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3606219145 win 64857&lt;/P&gt;&lt;P&gt;&amp;nbsp; 40: 11:59:31.751898 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3220685036 win 64857&lt;/P&gt;&lt;P&gt;&amp;nbsp; 41: 11:59:31.754782 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3220685036:3220685037(1) ack 1680225040 win 65&lt;/P&gt;&lt;P&gt;436&lt;/P&gt;&lt;P&gt;&amp;nbsp; 42: 11:59:31.754813 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3606219145:3606219146(1) ack 735101438 win 654&lt;/P&gt;&lt;P&gt;36&lt;/P&gt;&lt;P&gt;&amp;nbsp; 43: 11:59:31.954738 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3606219146 win 64856&lt;/P&gt;&lt;P&gt;&amp;nbsp; 44: 11:59:31.954769 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3220685037 win 64856&lt;/P&gt;&lt;P&gt;&amp;nbsp; 45: 11:59:32.522617 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3220685037:3220685039(2) ack 1680225040 win 65&lt;/P&gt;&lt;P&gt;436&lt;/P&gt;&lt;P&gt;&amp;nbsp; 46: 11:59:32.522647 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3606219146:3606219148(2) ack 735101438 win 654&lt;/P&gt;&lt;P&gt;36&lt;/P&gt;&lt;P&gt;&amp;nbsp; 47: 11:59:32.523212 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: P 735101438:735101484(46) ack 3606219148 win 648&lt;/P&gt;&lt;P&gt;54&lt;/P&gt;&lt;P&gt;&amp;nbsp; 48: 11:59:32.523227 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: P 1680225040:1680225086(46) ack 3220685039 win 6&lt;/P&gt;&lt;P&gt;MJASA(config)# sh capture capo&lt;/P&gt;&lt;P&gt;965 packets captured&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 09:15:58.300414 10.2.2.2.25 &amp;gt; 10.2.2.30.25: S 1910509976:1910509976(0) win 8192&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2: 09:33:52.110010 10.2.2.2.25 &amp;gt; 10.2.2.30.25: S 1614045430:1614045430(0) win 8192&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 3: 11:59:13.552141 10.2.2.2 &amp;gt; 10.1.1.11: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 4: 11:59:13.552873 10.1.1.11 &amp;gt; 10.2.2.2: icmp: echo reply&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 5: 11:59:14.544207 10.2.2.2 &amp;gt; 10.1.1.11: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 6: 11:59:14.544664 10.1.1.11 &amp;gt; 10.2.2.2: icmp: echo reply&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 7: 11:59:15.544207 10.2.2.2 &amp;gt; 10.1.1.11: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 8: 11:59:15.544588 10.1.1.11 &amp;gt; 10.2.2.2: icmp: echo reply&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 9: 11:59:16.544252 10.2.2.2 &amp;gt; 10.1.1.11: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10: 11:59:16.544634 10.1.1.11 &amp;gt; 10.2.2.2: icmp: echo reply&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11: 11:59:24.607527 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: S 3220685032:3220685032(0) win 65535 &lt;MSS 1460=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;op,nop,sackOK&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12: 11:59:24.608290 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: S 1680224940:1680224940(0) ack 3220685033 win 81&lt;/P&gt;&lt;P&gt;92 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 13: 11:59:24.608382 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: . ack 1680224941 win 65535&lt;/P&gt;&lt;P&gt;&amp;nbsp; 14: 11:59:24.609877 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: P 1680224941:1680225040(99) ack 3220685033 win 6&lt;/P&gt;&lt;P&gt;4860&lt;/P&gt;&lt;P&gt;&amp;nbsp; 15: 11:59:24.856782 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: . ack 1680225040 win 65436&lt;/P&gt;&lt;P&gt;&amp;nbsp; 16: 11:59:30.971827 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3220685033:3220685034(1) ack 1680225040 win 65&lt;/P&gt;&lt;P&gt;436&lt;/P&gt;&lt;P&gt;&amp;nbsp; 17: 11:59:31.174765 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3220685034 win 64859&lt;/P&gt;&lt;P&gt;&amp;nbsp; 18: 11:59:31.306960 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3220685034:3220685035(1) ack 1680225040 win 65&lt;/P&gt;&lt;P&gt;436&lt;/P&gt;&lt;P&gt;&amp;nbsp; 19: 11:59:31.502293 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3220685035 win 64858&lt;/P&gt;&lt;P&gt;&amp;nbsp; 20: 11:59:31.546846 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3220685035:3220685036(1) ack 1680225040 win 65&lt;/P&gt;&lt;P&gt;436&lt;/P&gt;&lt;P&gt;&amp;nbsp; 21: 11:59:31.751898 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3220685036 win 64857&lt;/P&gt;&lt;P&gt;&amp;nbsp; 22: 11:59:31.754782 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3220685036:3220685037(1) ack 1680225040 win 65&lt;/P&gt;&lt;P&gt;436&lt;/P&gt;&lt;P&gt;&amp;nbsp; 23: 11:59:31.954769 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3220685037 win 64856&lt;/P&gt;&lt;P&gt;&amp;nbsp; 24: 11:59:32.522617 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3220685037:3220685039(2) ack 1680225040 win 65&lt;/P&gt;&lt;P&gt;436&lt;/P&gt;&lt;P&gt;&amp;nbsp; 25: 11:59:32.523227 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: P 1680225040:1680225086(46) ack 3220685039 win 6&lt;/P&gt;&lt;P&gt;4854&lt;/P&gt;&lt;P&gt;&amp;nbsp; 26: 11:59:32.841173 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: . ack 1680225086 win 65390&lt;/P&gt;&lt;P&gt;&amp;nbsp; 27: 12:01:29.930829 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3220685039:3220685040(1) ack 1680225086 win 65&lt;/P&gt;&lt;P&gt;390&lt;/P&gt;&lt;P&gt;&amp;nbsp; 28: 12:01:30.130867 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3220685040 win 64853&lt;/P&gt;&lt;P&gt;&amp;nbsp; 29: 12:01:30.131005 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3220685040:3220685041(1) ack 1680225086 win 65&lt;/P&gt;&lt;P&gt;390&lt;/P&gt;&lt;P&gt;&amp;nbsp; 30: 12:01:30.333738 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3220685041 win 64852&lt;/P&gt;&lt;P&gt;&amp;nbsp; 31: 12:01:30.333860 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3220685041:3220685042(1) ack 1680225086 win 65&lt;/P&gt;&lt;P&gt;390&lt;/P&gt;&lt;P&gt;&amp;nbsp; 32: 12:01:30.536486 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3220685042 win 64851&lt;/P&gt;&lt;P&gt;&amp;nbsp; 33: 12:01:30.536593 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3220685042:3220685043(1) ack 1680225086 win 65&lt;/P&gt;&lt;P&gt;390&lt;/P&gt;&lt;P&gt;&amp;nbsp; 34: 12:01:30.739234 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3220685043 win 64850&lt;/P&gt;&lt;P&gt;&amp;nbsp; 35: 12:01:32.763052 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3220685043:3220685044(1) ack 1680225086 win 65&lt;/P&gt;&lt;P&gt;390&lt;/P&gt;&lt;P&gt;&amp;nbsp; 36: 12:01:32.970195 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3220685044 win 64849&lt;/P&gt;&lt;P&gt;&amp;nbsp; 37: 12:01:32.970866 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3220685044:3220685045(1) ack 1680225086 win 65&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MJASA(config)# sh capture capin&lt;/P&gt;&lt;P&gt;1917 packets captured&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 09:15:58.300414 10.2.2.2.25 &amp;gt; 10.2.2.30.25: S 1910509976:1910509976(0) win 8192&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2: 09:33:52.110010 10.2.2.2.25 &amp;gt; 10.2.2.30.25: S 1614045430:1614045430(0) win 8192&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 3: 11:59:13.552141 10.2.2.2 &amp;gt; 10.1.1.11: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 4: 11:59:13.552309 10.2.2.2 &amp;gt; 10.1.1.11: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 5: 11:59:13.552736 10.1.1.11 &amp;gt; 10.2.2.2: icmp: echo reply&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 6: 11:59:13.552873 10.1.1.11 &amp;gt; 10.2.2.2: icmp: echo reply&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 7: 11:59:14.544207 10.2.2.2 &amp;gt; 10.1.1.11: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 8: 11:59:14.544237 10.2.2.2 &amp;gt; 10.1.1.11: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 9: 11:59:14.544649 10.1.1.11 &amp;gt; 10.2.2.2: icmp: echo reply&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10: 11:59:14.544664 10.1.1.11 &amp;gt; 10.2.2.2: icmp: echo reply&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11: 11:59:15.544191 10.2.2.2 &amp;gt; 10.1.1.11: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12: 11:59:15.544222 10.2.2.2 &amp;gt; 10.1.1.11: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 13: 11:59:15.544573 10.1.1.11 &amp;gt; 10.2.2.2: icmp: echo reply&lt;/P&gt;&lt;P&gt;&amp;nbsp; 14: 11:59:15.544588 10.1.1.11 &amp;gt; 10.2.2.2: icmp: echo reply&lt;/P&gt;&lt;P&gt;&amp;nbsp; 15: 11:59:16.544252 10.2.2.2 &amp;gt; 10.1.1.11: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 16: 11:59:16.544268 10.2.2.2 &amp;gt; 10.1.1.11: icmp: echo request&lt;/P&gt;&lt;P&gt;&amp;nbsp; 17: 11:59:16.544619 10.1.1.11 &amp;gt; 10.2.2.2: icmp: echo reply&lt;/P&gt;&lt;P&gt;&amp;nbsp; 18: 11:59:16.544634 10.1.1.11 &amp;gt; 10.2.2.2: icmp: echo reply&lt;/P&gt;&lt;P&gt;&amp;nbsp; 19: 11:59:24.607527 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: S 3220685032:3220685032(0) win 65535 &lt;MSS 1460=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;op,nop,sackOK&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 20: 11:59:24.607726 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: S 3606219141:3606219141(0) win 65535 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;op,nop,sackOK&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 21: 11:59:24.608229 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: S 735101338:735101338(0) ack 3606219142 win 8192&lt;/P&gt;&lt;P&gt; &lt;MSS 1460=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 22: 11:59:24.608290 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: S 1680224940:1680224940(0) ack 3220685033 win 81&lt;/P&gt;&lt;P&gt;92 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 23: 11:59:24.608382 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: . ack 1680224941 win 65535&lt;/P&gt;&lt;P&gt;&amp;nbsp; 24: 11:59:24.608412 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: . ack 735101339 win 65535&lt;/P&gt;&lt;P&gt;&amp;nbsp; 25: 11:59:24.609862 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: P 735101339:735101438(99) ack 3606219142 win 648&lt;/P&gt;&lt;P&gt;60&lt;/P&gt;&lt;P&gt;&amp;nbsp; 26: 11:59:24.609877 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: P 1680224941:1680225040(99) ack 3220685033 win 6&lt;/P&gt;&lt;P&gt;4860&lt;/P&gt;&lt;P&gt;&amp;nbsp; 27: 11:59:24.856782 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: . ack 1680225040 win 65436&lt;/P&gt;&lt;P&gt;&amp;nbsp; 28: 11:59:24.856812 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: . ack 735101438 win 65436&lt;/P&gt;&lt;P&gt;&amp;nbsp; 29: 11:59:30.971827 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3220685033:3220685034(1) ack 1680225040 win 65&lt;/P&gt;&lt;P&gt;436&lt;/P&gt;&lt;P&gt;&amp;nbsp; 30: 11:59:30.971843 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3606219142:3606219143(1) ack 735101438 win 654&lt;/P&gt;&lt;P&gt;36&lt;/P&gt;&lt;P&gt;&amp;nbsp; 31: 11:59:31.174734 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3606219143 win 64859&lt;/P&gt;&lt;P&gt;&amp;nbsp; 32: 11:59:31.174749 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3220685034 win 64859&lt;/P&gt;&lt;P&gt;&amp;nbsp; 33: 11:59:31.306960 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3220685034:3220685035(1) ack 1680225040 win 65&lt;/P&gt;&lt;P&gt;436&lt;/P&gt;&lt;P&gt;&amp;nbsp; 34: 11:59:31.306975 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3606219143:3606219144(1) ack 735101438 win 654&lt;/P&gt;&lt;P&gt;36&lt;/P&gt;&lt;P&gt;&amp;nbsp; 35: 11:59:31.502278 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3606219144 win 64858&lt;/P&gt;&lt;P&gt;&amp;nbsp; 36: 11:59:31.502293 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3220685035 win 64858&lt;/P&gt;&lt;P&gt;&amp;nbsp; 37: 11:59:31.546846 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3220685035:3220685036(1) ack 1680225040 win 65&lt;/P&gt;&lt;P&gt;436&lt;/P&gt;&lt;P&gt;&amp;nbsp; 38: 11:59:31.546861 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3606219144:3606219145(1) ack 735101438 win 654&lt;/P&gt;&lt;P&gt;36&lt;/P&gt;&lt;P&gt;&amp;nbsp; 39: 11:59:31.751868 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3606219145 win 64857&lt;/P&gt;&lt;P&gt;&amp;nbsp; 40: 11:59:31.751898 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3220685036 win 64857&lt;/P&gt;&lt;P&gt;&amp;nbsp; 41: 11:59:31.754782 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3220685036:3220685037(1) ack 1680225040 win 65&lt;/P&gt;&lt;P&gt;436&lt;/P&gt;&lt;P&gt;&amp;nbsp; 42: 11:59:31.754813 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3606219145:3606219146(1) ack 735101438 win 654&lt;/P&gt;&lt;P&gt;36&lt;/P&gt;&lt;P&gt;&amp;nbsp; 43: 11:59:31.954738 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3606219146 win 64856&lt;/P&gt;&lt;P&gt;&amp;nbsp; 44: 11:59:31.954769 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3220685037 win 64856&lt;/P&gt;&lt;P&gt;&amp;nbsp; 45: 11:59:32.522617 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3220685037:3220685039(2) ack 1680225040 win 65&lt;/P&gt;&lt;P&gt;436&lt;/P&gt;&lt;P&gt;&amp;nbsp; 46: 11:59:32.522647 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3606219146:3606219148(2) ack 735101438 win 654&lt;/P&gt;&lt;P&gt;36&lt;/P&gt;&lt;P&gt;&amp;nbsp; 47: 11:59:32.523212 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: P 735101438:735101484(46) ack 3606219148 win 648&lt;/P&gt;&lt;P&gt;54&lt;/P&gt;&lt;P&gt;&amp;nbsp; 48: 11:59:32.523227 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: P 1680225040:1680225086(46) ack 3220685039 win 6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And here is capo:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MJASA(config)# sh capture capo&lt;BR /&gt;965 packets captured&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 1: 09:15:58.300414 10.2.2.2.25 &amp;gt; 10.2.2.30.25: S 1910509976:1910509976(0) win 8192&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 09:33:52.110010 10.2.2.2.25 &amp;gt; 10.2.2.30.25: S 1614045430:1614045430(0) win 8192&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 11:59:13.552141 10.2.2.2 &amp;gt; 10.1.1.11: icmp: echo request&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 4: 11:59:13.552873 10.1.1.11 &amp;gt; 10.2.2.2: icmp: echo reply&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 5: 11:59:14.544207 10.2.2.2 &amp;gt; 10.1.1.11: icmp: echo request&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 6: 11:59:14.544664 10.1.1.11 &amp;gt; 10.2.2.2: icmp: echo reply&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 7: 11:59:15.544207 10.2.2.2 &amp;gt; 10.1.1.11: icmp: echo request&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 8: 11:59:15.544588 10.1.1.11 &amp;gt; 10.2.2.2: icmp: echo reply&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 9: 11:59:16.544252 10.2.2.2 &amp;gt; 10.1.1.11: icmp: echo request&lt;BR /&gt;&amp;nbsp; 10: 11:59:16.544634 10.1.1.11 &amp;gt; 10.2.2.2: icmp: echo reply&lt;BR /&gt;&amp;nbsp; 11: 11:59:24.607527 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: S 3220685032:3220685032(0) win 65535 &lt;MSS 1460=""&gt;&lt;/MSS&gt;op,nop,sackOK&amp;gt;&lt;BR /&gt;&amp;nbsp; 12: 11:59:24.608290 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: S 1680224940:1680224940(0) ack 3220685033 win 81&lt;BR /&gt;92 &lt;MSS 1380=""&gt;&lt;BR /&gt;&amp;nbsp; 13: 11:59:24.608382 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: . ack 1680224941 win 65535&lt;BR /&gt;&amp;nbsp; 14: 11:59:24.609877 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: P 1680224941:1680225040(99) ack 3220685033 win 6&lt;BR /&gt;4860&lt;BR /&gt;&amp;nbsp; 15: 11:59:24.856782 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: . ack 1680225040 win 65436&lt;BR /&gt;&amp;nbsp; 16: 11:59:30.971827 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3220685033:3220685034(1) ack 1680225040 win 65&lt;BR /&gt;436&lt;BR /&gt;&amp;nbsp; 17: 11:59:31.174765 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3220685034 win 64859&lt;BR /&gt;&amp;nbsp; 18: 11:59:31.306960 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3220685034:3220685035(1) ack 1680225040 win 65&lt;BR /&gt;436&lt;BR /&gt;&amp;nbsp; 19: 11:59:31.502293 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3220685035 win 64858&lt;BR /&gt;&amp;nbsp; 20: 11:59:31.546846 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3220685035:3220685036(1) ack 1680225040 win 65&lt;BR /&gt;436&lt;BR /&gt;&amp;nbsp; 21: 11:59:31.751898 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3220685036 win 64857&lt;BR /&gt;&amp;nbsp; 22: 11:59:31.754782 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3220685036:3220685037(1) ack 1680225040 win 65&lt;BR /&gt;436&lt;BR /&gt;&amp;nbsp; 23: 11:59:31.954769 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3220685037 win 64856&lt;BR /&gt;&amp;nbsp; 24: 11:59:32.522617 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3220685037:3220685039(2) ack 1680225040 win 65&lt;BR /&gt;436&lt;BR /&gt;&amp;nbsp; 25: 11:59:32.523227 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: P 1680225040:1680225086(46) ack 3220685039 win 6&lt;BR /&gt;4854&lt;BR /&gt;&amp;nbsp; 26: 11:59:32.841173 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: . ack 1680225086 win 65390&lt;BR /&gt;&amp;nbsp; 27: 12:01:29.930829 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3220685039:3220685040(1) ack 1680225086 win 65&lt;BR /&gt;390&lt;BR /&gt;&amp;nbsp; 28: 12:01:30.130867 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3220685040 win 64853&lt;BR /&gt;&amp;nbsp; 29: 12:01:30.131005 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3220685040:3220685041(1) ack 1680225086 win 65&lt;BR /&gt;390&lt;BR /&gt;&amp;nbsp; 30: 12:01:30.333738 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3220685041 win 64852&lt;BR /&gt;&amp;nbsp; 31: 12:01:30.333860 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3220685041:3220685042(1) ack 1680225086 win 65&lt;BR /&gt;390&lt;BR /&gt;&amp;nbsp; 32: 12:01:30.536486 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3220685042 win 64851&lt;BR /&gt;&amp;nbsp; 33: 12:01:30.536593 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3220685042:3220685043(1) ack 1680225086 win 65&lt;BR /&gt;390&lt;BR /&gt;&amp;nbsp; 34: 12:01:30.739234 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3220685043 win 64850&lt;BR /&gt;&amp;nbsp; 35: 12:01:32.763052 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3220685043:3220685044(1) ack 1680225086 win 65&lt;BR /&gt;390&lt;BR /&gt;&amp;nbsp; 36: 12:01:32.970195 10.1.1.11.25 &amp;gt; 10.2.2.2.2408: . ack 3220685044 win 64849&lt;BR /&gt;&amp;nbsp; 37: 12:01:32.970866 10.2.2.2.2408 &amp;gt; 10.1.1.11.25: P 3220685044:3220685045(1) ack 1680225086 win 65&lt;/MSS&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Aug 2011 18:19:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761397#M533300</guid>
      <dc:creator>sholiday666</dc:creator>
      <dc:date>2011-08-18T18:19:39Z</dc:date>
    </item>
    <item>
      <title>Accessing Exchange Server from DMZ</title>
      <link>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761398#M533301</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey thats great Scott, so wats the next worry for us???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Aug 2011 18:22:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761398#M533301</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-18T18:22:43Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing Exchange Server from DMZ</title>
      <link>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761399#M533302</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I was curious why there are hundreds of packets passing through now.&amp;nbsp; Does that point to someone on the outside trying to get in or something?&amp;nbsp; I only created two test emails.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Oh and by the way thanks for all your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I still have the access list:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz extended permit tcp host 10.2.2.2 host 10.2.2.30 eq smtp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in the config and not one pointing to 10.1.1.11.&amp;nbsp; Do I need to add that?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Aug 2011 18:35:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-exchange-server-from-dmz/m-p/1761399#M533302</guid>
      <dc:creator>sholiday666</dc:creator>
      <dc:date>2011-08-18T18:35:11Z</dc:date>
    </item>
  </channel>
</rss>

