<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA is dropping packets between two internal hosts in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698798#M535776</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Here is the latest ASA Config. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the latest xlate :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show xlate&lt;/P&gt;&lt;P&gt;20 in use, 54 most used&lt;/P&gt;&lt;P&gt;Global 10.1.3.120 Local 192.168.1.7&lt;/P&gt;&lt;P&gt;Global 192.168.1.0 Local 255.255.255.0&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(32688) Local 192.168.1.9(58688)&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(46254) Local 192.168.1.9(58684)&lt;/P&gt;&lt;P&gt;PAT Global 192.168.1.1(186) Local 192.168.1.9(137)&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(10194) Local 192.168.1.9(58648)&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(37728) Local 192.168.1.9(58634)&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(62317) Local 192.168.1.9(58631)&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(24753) Local 192.168.1.9(58627)&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(30360) Local 192.168.1.9(58626)&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(19754) Local 192.168.1.9(58625)&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(80) Local 192.168.1.9(137)&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(11450) Local 192.168.1.9(58611)&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(28166) Local 192.168.1.7(3733)&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(47319) Local 192.168.1.7 ICMP id 512&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(32084) Local 192.168.1.7(3732)&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(3633) Local 192.168.1.7(3731)&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(24362) Local 192.168.1.7(3728)&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(29073) Local 192.168.1.7(3695)&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(371) Local 192.168.1.7(137)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ASA Version 8.2(1)&lt;BR /&gt;!&lt;BR /&gt;hostname kidsmedasa&lt;BR /&gt;domain-name phx.xxxxxx.com&lt;BR /&gt;enable password xxxxxxxx encrypted&lt;BR /&gt;passwd xxxxxxx encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;pppoe client vpdn group pppoex&lt;BR /&gt;ip address pppoe setroute&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 205.171.3.65&lt;BR /&gt;name-server 205.171.2.65&lt;BR /&gt;domain-name phx.xxxxxxx.com&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;access-list icmp_ping extended permit icmp any any echo-reply&lt;BR /&gt;access-list ICMPACL extended permit icmp any any&lt;BR /&gt;access-list emds-nat extended permit ip host 192.168.1.7 192.168.50.0 255.255.255.0&lt;BR /&gt;access-list inside_acl extended permit ip 192.168.1.0 255.255.255.0 any&lt;BR /&gt;access-list inside_acl extended permit tcp 192.168.1.0 255.255.255.0 any&lt;BR /&gt;access-list inside_acl extended permit tcp 192.168.1.0 255.255.255.0 any eq telnet&lt;BR /&gt;access-list inside_acl extended permit ip any any&lt;BR /&gt;access-list inside_acl extended permit udp 192.168.1.0 255.255.255.0 any&lt;BR /&gt;access-list emds-crypto extended permit ip host 10.1.3.120 192.168.50.0 255.255.255.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging monitor debugging&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-621.bin&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (inside) 10 interface&lt;BR /&gt;global (outside) 10 interface&lt;BR /&gt;nat (inside) 10 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,outside) 10.1.3.120&amp;nbsp; access-list emds-nat&lt;BR /&gt;static (inside,inside) 192.168.1.0 255.255.255.0 netmask 255.255.255.0&lt;BR /&gt;access-group inside_acl in interface inside&lt;BR /&gt;access-group inside_acl out interface inside&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.1.0 255.255.255.0 outside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 20 match address emds-crypto&lt;BR /&gt;crypto map outside_map 20 set peer 66.179.80.108&lt;BR /&gt;crypto map outside_map 20 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 20 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 1&lt;BR /&gt;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;vpdn group pppoex request dialout pppoe&lt;BR /&gt;vpdn group pppoex localname &lt;A href="mailto:xxxxxxxxx@qwest.net"&gt;xxxxxxxxx@qwest.net&lt;/A&gt;&lt;BR /&gt;vpdn group pppoex ppp authentication chap&lt;BR /&gt;vpdn username &lt;A href="mailto:xxxxxxx@qwest.net"&gt;xxxxxxx@qwest.net&lt;/A&gt; password *********&lt;BR /&gt;dhcpd dns 205.171.3.65 205.171.2.65&lt;BR /&gt;dhcpd lease 4500&lt;BR /&gt;dhcpd domain phx.kidsmed.com&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.10-192.168.1.137 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;tftp-server inside 192.168.1.9 config-20110710&lt;BR /&gt;webvpn&lt;BR /&gt;username kidsmed-it password xxxxxxxxx encrypted privilege 15&lt;BR /&gt;username admin password xxxxxxxx encrypted privilege 15&lt;BR /&gt;username cisco password xxxxxxxxxxx encrypted privilege 15&lt;BR /&gt;tunnel-group 66.179.80.108 type ipsec-l2l&lt;BR /&gt;tunnel-group 66.179.80.108 ipsec-attributes&lt;BR /&gt;pre-shared-key *&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:7cd5d8d9ce88603364924a99b6f9499f&lt;BR /&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 19 Jul 2011 06:12:38 GMT</pubDate>
    <dc:creator>kidsmed-it</dc:creator>
    <dc:date>2011-07-19T06:12:38Z</dc:date>
    <item>
      <title>ASA is dropping packets between two internal hosts</title>
      <link>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698790#M535768</link>
      <description>&lt;P&gt;I am a newbie to configuring a router and am setting one up for a small business that uses a client-server application against a SQL Server 2008 database. The router connectivity is working fine getting out to the Internet. An IPSEC VPN Tunnel has been built and working fine. It is the internal client to server access that's causing my headaches.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My problem is that I am not able to logon to the Server Database from my client workstations which are all part of a Windows 2008 Domain.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Connectivity is fine, I am able to ping between ASA and clients and DB server. The std ports 1433, 1434&amp;nbsp; used by Microsft Sql Services are listening. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the ASDM, by running packet trace, any packets between the two servers are being dropped, even though I am able to ping, telnet all servers involved. The latest error messages show 'No Matching Global'.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would be greatly appreciated and needed GREATLY.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MY ASA config is such:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(1)&lt;BR /&gt;!&lt;BR /&gt;hostname xxxxxasa&lt;BR /&gt;domain-name phx.xxxxx.com&lt;BR /&gt;enable password xxxxxxxxxx encrypted&lt;BR /&gt;passwd xxxxxxx encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;pppoe client vpdn group pppoex&lt;BR /&gt;ip address pppoe setroute&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 205.171.3.65&lt;BR /&gt;name-server 205.171.2.65&lt;BR /&gt;domain-name phx.xxxxxxx.com&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;access-list icmp_ping extended permit icmp any any echo-reply&lt;BR /&gt;access-list ICMPACL extended permit icmp any any&lt;BR /&gt;access-list emds-nat extended permit ip host 192.168.1.7 192.168.50.0 255.255.255.0&lt;BR /&gt;access-list inside_acl extended permit ip 192.168.1.0 255.255.255.0 any&lt;BR /&gt;access-list inside_acl extended permit tcp 192.168.1.0 255.255.255.0 any&lt;BR /&gt;access-list inside_acl extended permit tcp 192.168.1.0 255.255.255.0 any eq telnet&lt;BR /&gt;access-list inside_acl extended permit ip any any&lt;BR /&gt;access-list emds-crypto extended permit ip host 10.1.3.120 192.168.50.0 255.255.255.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging monitor debugging&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-621.bin&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 10 interface&lt;BR /&gt;nat (inside) 10 192.168.1.0 255.255.255.0&lt;BR /&gt;static (inside,outside) 10.1.3.120&amp;nbsp; access-list emds-nat&lt;BR /&gt;access-group inside_acl in interface inside&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.1.0 255.255.255.0 outside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 20 match address emds-crypto&lt;BR /&gt;crypto map outside_map 20 set peer xxx.xxx.xxx.xxx&lt;BR /&gt;crypto map outside_map 20 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 20 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 1&lt;BR /&gt;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;vpdn group pppoex request dialout pppoe&lt;BR /&gt;vpdn group pppoex localname &lt;A href="mailto:xxxxxxxx@qwest.net" target="_blank"&gt;xxxxxxxx@qwest.net&lt;/A&gt;&lt;BR /&gt;vpdn group pppoex ppp authentication chap&lt;BR /&gt;vpdn username &lt;A href="mailto:xxxxxxxx@qwest.net" target="_blank"&gt;xxxxxxxx@qwest.net&lt;/A&gt; password *********&lt;BR /&gt;dhcpd dns 205.171.3.65 205.171.2.65&lt;BR /&gt;dhcpd lease 4500&lt;BR /&gt;dhcpd domain phx.xxxxxx.com&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.10-192.168.1.137 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;tftp-server inside 192.168.1.9 config-20110710&lt;BR /&gt;webvpn&lt;BR /&gt;username xxxxxx-it password xxxxxxxxxxx encrypted privilege 15&lt;BR /&gt;username admin password xxxxxxxxxx encrypted privilege 15&lt;BR /&gt;username cisco password xxxxxxxxxx encrypted privilege 15&lt;BR /&gt;tunnel-group 66.999.99.999 type ipsec-l2l&lt;BR /&gt;tunnel-group 66.999.99.999 ipsec-attributes&lt;BR /&gt;pre-shared-key *&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:404416f0d532bfe08e01c59a29252c31&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My latest Packet trace:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;kidsmedasa(config)# packet-tracer input inside udp 192.168.1.7 1434 192.168.1.$&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 192.168.1.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside_acl in interface inside&lt;BR /&gt;access-list inside_acl extended permit ip 192.168.1.0 255.255.255.0 any&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in&amp;nbsp; id=0xc9ca1578, priority=12, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=14308, user_data=0xc78c7170, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=192.168.1.0, mask=255.255.255.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in&amp;nbsp; id=0xc957b5c8, priority=0, domain=permit-ip-option, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=30455, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (inside,outside) 10.1.3.120&amp;nbsp; access-list emds-nat&lt;BR /&gt;&amp;nbsp; match ip inside host 192.168.1.7 outside 192.168.50.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 10.1.3.120&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 16, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in&amp;nbsp; id=0xc95ea260, priority=5, domain=host, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=10423, user_data=0xca0dc768, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=192.168.1.7, mask=255.255.255.255, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside) 10 0.0.0.0 0.0.0.0&lt;BR /&gt;&amp;nbsp; match ip inside any inside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 10 (No matching global)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 4, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in&amp;nbsp; id=0xc95dff60, priority=1, domain=nat, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3, user_data=0xc95de600, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:00:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698790#M535768</guid>
      <dc:creator>kidsmed-it</dc:creator>
      <dc:date>2019-03-11T21:00:02Z</dc:date>
    </item>
    <item>
      <title>ASA is dropping packets between two internal hosts</title>
      <link>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698791#M535769</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dustin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes couple of thing missing in here, I guess you are try to do u-turning on the firewall, you would need the following config for it:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (inside) 10 interface&lt;/P&gt;&lt;P&gt;static (inside,inside) 10.1.3.120 &lt;REAL ip="" of="" server=""&gt;&lt;/REAL&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This shoudl u-turn the traffic on the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Plz let me know the real ip of th server and the mapped ip as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Jul 2011 05:41:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698791#M535769</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-18T05:41:23Z</dc:date>
    </item>
    <item>
      <title>ASA is dropping packets between two internal hosts</title>
      <link>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698792#M535770</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; The only mapping was for my web server and I am handling that with the following for vpn traffic. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; static (inside,outside) 10.1.3.120&amp;nbsp; access-list emds-nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; My internal hosts are on 192.168.1.0/24.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Jul 2011 06:08:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698792#M535770</guid>
      <dc:creator>kidsmed-it</dc:creator>
      <dc:date>2011-07-18T06:08:04Z</dc:date>
    </item>
    <item>
      <title>ASA is dropping packets between two internal hosts</title>
      <link>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698793#M535771</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Not a web server but an iis server as required by the application.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Jul 2011 06:17:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698793#M535771</guid>
      <dc:creator>kidsmed-it</dc:creator>
      <dc:date>2011-07-18T06:17:41Z</dc:date>
    </item>
    <item>
      <title>ASA is dropping packets between two internal hosts</title>
      <link>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698794#M535772</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Varun,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;﻿&lt;/P&gt;&lt;P&gt;﻿&amp;nbsp;&amp;nbsp;&amp;nbsp; Your Global and Static commands did the trick allowing packetys to go through. YEAHHH! &lt;/P&gt;&lt;P&gt;Unfortunately, I am unable to ping my database server from my clients.&amp;nbsp; The ASDM software and via the CLI packet tracing says the packets are going through.&amp;nbsp; And still not able to logon.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for getting me this far!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dustin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Jul 2011 06:41:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698794#M535772</guid>
      <dc:creator>kidsmed-it</dc:creator>
      <dc:date>2011-07-18T06:41:38Z</dc:date>
    </item>
    <item>
      <title>ASA is dropping packets between two internal hosts</title>
      <link>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698795#M535773</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey thats great !!!!!! try taking packet-tracer and packet capture for the icmp issue:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-1222"&gt;https://supportforums.cisco.com/docs/DOC-1222&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know how it goes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Jul 2011 07:19:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698795#M535773</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-18T07:19:56Z</dc:date>
    </item>
    <item>
      <title>ASA is dropping packets between two internal hosts</title>
      <link>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698796#M535774</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Hope you are out there. I have been doing my Packet sniffing with Wireshark and here is what I am getting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;3&lt;/TD&gt;&lt;TD&gt;Jul 18 2011&lt;/TD&gt;&lt;TD&gt;18:59:09&lt;/TD&gt;&lt;TD&gt;305006&lt;/TD&gt;&lt;TD&gt;192.168.1.12&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;regular translation creation failed for icmp src inside:192.168.1.9 dst inside:192.168.1.12 (type 0, code 0)&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is more bizarre is that this seems to be intermittent. I have kicked off 'ping -n 25 192.168.1.9'&amp;nbsp; several times. Sometimes the Pings go thru, other times not. Getting the error above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASDM offered this solution but since it is intermittent I am really stumped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;%&lt;SPAN style="color: #000000;"&gt;A&lt;/SPAN&gt;SA-3-305006: {outbound static|identity|portmap|regular) translation 
creation failed for &lt;EM&gt;&lt;EM&gt;protocol&lt;/EM&gt;&lt;/EM&gt;&lt;SPAN style="color: #000000;"&gt; &lt;/SPAN&gt;src &lt;EM&gt;interface_name&lt;/EM&gt;&lt;EM&gt;&lt;EM&gt;:&lt;/EM&gt;&lt;/EM&gt;&lt;SPAN style="color: #000000;"&gt;source_address&lt;/SPAN&gt;&lt;EM&gt;&lt;EM&gt;/&lt;/EM&gt;&lt;/EM&gt;&lt;SPAN style="color: #000000;"&gt;source_port&lt;/SPAN&gt;&lt;SPAN style="color: #000000;"&gt; &lt;/SPAN&gt;dst 
&lt;EM&gt;interface_name&lt;/EM&gt;&lt;EM&gt;&lt;EM&gt;:&lt;/EM&gt;&lt;/EM&gt;&lt;SPAN style="color: #000000;"&gt;dest_address&lt;/SPAN&gt;&lt;EM&gt;&lt;EM&gt;/&lt;/EM&gt;&lt;/EM&gt;&lt;SPAN style="color: #000000;"&gt;dest_port&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;A protocol (UDP, TCP, or ICMP) failed to create a translation through the adaptive security appliance. &lt;SPAN style="color: #000000;"&gt;The adaptive security appliance&lt;/SPAN&gt; &lt;SPAN style="color: #000000;"&gt;does &lt;/SPAN&gt;not allow packets &lt;SPAN style="color: #000000;"&gt;through &lt;/SPAN&gt;that are destined for network or broadcast addresses. The adaptive security appliance provides this checking for addresses that are explicitly identified with &lt;SPAN style="color: #000000;"&gt;&lt;STRONG&gt;static&lt;/STRONG&gt;&lt;/SPAN&gt; command&lt;SPAN style="color: #000000;"&gt;s.&lt;/SPAN&gt; &lt;SPAN style="color: #000000;"&gt;Fo&lt;/SPAN&gt;r inbound traffic, the adaptive security appliance denies translations for a&lt;SPAN style="color: #000000;"&gt;n I&lt;/SPAN&gt;P address identified as a network or broadcast address. &lt;/P&gt;&lt;P&gt;&lt;A name="wp4770971"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The adaptive security appliance does not apply PAT to all ICMP message types; it only applies PAT ICMP echo and echo-reply packets (types 8 and 0). Specifically, only ICMP echo or echo-reply packets create a PAT &lt;SPAN style="color: #000000;"&gt;translation.&lt;/SPAN&gt; &lt;SPAN style="color: #000000;"&gt;As a result,&lt;/SPAN&gt; when the other ICMP messages types are dropped, &lt;SPAN style="color: #000000;"&gt;this message i&lt;/SPAN&gt;s generated. &lt;/P&gt;&lt;P&gt;&lt;A name="wp4770978"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The adaptive security appliance &lt;SPAN style="color: #000000;"&gt;uses t&lt;/SPAN&gt;he global IP &lt;SPAN style="color: #000000;"&gt;address a&lt;/SPAN&gt;nd mask from configured &lt;SPAN style="color: #000000;"&gt;&lt;STRONG&gt;static&lt;/STRONG&gt;&lt;/SPAN&gt; command&lt;SPAN style="color: #000000;"&gt;s t&lt;/SPAN&gt;o differ&lt;SPAN style="color: #000000;"&gt;entiate&lt;/SPAN&gt; regular IP addresses from network or broadcast IP addresses. If the global IP address is a valid network address with a matching network mask, then the adaptive security appliance does not create a translation for network or broadcast IP addresses with inbound packets. &lt;/P&gt;&lt;P&gt;&lt;A name="wp4770982"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;For example: &lt;/P&gt;&lt;P&gt;&lt;A name="wp4770983"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;PRE&gt;&lt;STRONG&gt;static (inside,outside) 10.2.2.128 10.1.1.128 netmask 255.255.255.128&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/P&gt;&lt;DIV&gt;&lt;PRE&gt;&lt;A name="wp4770984"&gt;
&lt;/A&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;A name="wp4770985"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;The adaptive security appliance responds to gl&lt;/SPAN&gt;obal address 10.2.2.128 &lt;SPAN style="color: #000000;"&gt;a&lt;/SPAN&gt;s a network address and &lt;SPAN style="color: #000000;"&gt;to &lt;/SPAN&gt;10.2.2.255 &lt;SPAN style="color: #000000;"&gt;a&lt;/SPAN&gt;s the broadcast address. Without an existing translation, &lt;SPAN style="color: #000000;"&gt;the &lt;/SPAN&gt;adaptive security appliance denies inbound packets destined for 10.2.2.128 or 10.2.2.255, and logs this &lt;SPAN style="color: #000000;"&gt;message.&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;A name="wp4770989"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;When the suspected IP &lt;SPAN style="color: #000000;"&gt;address &lt;/SPAN&gt;is a host IP&lt;SPAN style="color: #000000;"&gt; address&lt;/SPAN&gt;, configure a separate&lt;SPAN style="color: #000000;"&gt; &lt;/SPAN&gt;&lt;SPAN style="color: #000000;"&gt;&lt;STRONG&gt;s&lt;/STRONG&gt;&lt;STRONG&gt;tatic&lt;/STRONG&gt;&lt;/SPAN&gt; command &lt;SPAN style="color: #000000;"&gt;w&lt;/SPAN&gt;ith a host mask in front of the subnet &lt;STRONG&gt;static&lt;/STRONG&gt; &lt;SPAN style="color: #000000;"&gt;command (the &lt;/SPAN&gt;first match rule for &lt;SPAN style="color: #000000;"&gt;&lt;STRONG&gt;static&lt;/STRONG&gt;&lt;/SPAN&gt; command&lt;SPAN style="color: #000000;"&gt;s)&lt;/SPAN&gt;. The following &lt;STRONG&gt;static&lt;/STRONG&gt; &lt;SPAN style="color: #000000;"&gt;commands &lt;/SPAN&gt;cause&lt;SPAN style="color: #000000;"&gt; t&lt;/SPAN&gt;he adaptive security appliance to respond to 10.2.2.128 as a host address: &lt;/P&gt;&lt;P&gt;&lt;A name="wp4770993"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV&gt;&lt;PRE&gt;&lt;STRONG&gt;static (inside,outside) 10.2.2.128 10.2.2.128 netmask 255.255.255.255 
static (inside,outside) 10.2.2.128 10.2.2.128 netmask 255.255.255.128&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;PRE&gt;&lt;A name="wp4770994"&gt;
&lt;/A&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;A name="wp4770995"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The translation may be created by traffic started &lt;SPAN style="color: #000000;"&gt;from t&lt;/SPAN&gt;he inside host with the &lt;SPAN style="color: #000000;"&gt;I&lt;/SPAN&gt;P address&lt;SPAN style="color: #000000;"&gt; in question&lt;/SPAN&gt;. Because the adaptive security appliance views a network or broadcast IP address as a host IP address with &lt;SPAN style="color: #000000;"&gt;an &lt;/SPAN&gt;overlapped subnet static configuration, the network address translation for both &lt;STRONG&gt;static&lt;/STRONG&gt; command&lt;SPAN style="color: #000000;"&gt;s m&lt;/SPAN&gt;ust be the same. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have NO IDEA what this means but maybe you could provide some insights. NEXT STEPS?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jul 2011 02:55:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698796#M535774</guid>
      <dc:creator>kidsmed-it</dc:creator>
      <dc:date>2011-07-19T02:55:47Z</dc:date>
    </item>
    <item>
      <title>ASA is dropping packets between two internal hosts</title>
      <link>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698797#M535775</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dustin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am definitely here &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;, to isolate the issue, I would request you to tell me the following info:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;behind whihc interfaces are these two machines in question&lt;/P&gt;&lt;P&gt;you would need to check the captures on the ASA to check if the packets are being dropped by the firewall.&lt;/P&gt;&lt;P&gt;the log tells us that the packet was dropped because there was no relevant translation for it.&lt;/P&gt;&lt;P&gt;so could you provide me the latest running-config from the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you chjeck what translation is being created for the source and the destination on the firewall:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show xlate | in 192.168.1.9&lt;/P&gt;&lt;P&gt;show xlate | in 192.168.1.12&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since it is an intermittent issue, I would suggest you to have a continuous ping initiated and wait for the drop to occur and collect the details.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;-Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jul 2011 04:41:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698797#M535775</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-19T04:41:41Z</dc:date>
    </item>
    <item>
      <title>Re: ASA is dropping packets between two internal hosts</title>
      <link>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698798#M535776</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Here is the latest ASA Config. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the latest xlate :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show xlate&lt;/P&gt;&lt;P&gt;20 in use, 54 most used&lt;/P&gt;&lt;P&gt;Global 10.1.3.120 Local 192.168.1.7&lt;/P&gt;&lt;P&gt;Global 192.168.1.0 Local 255.255.255.0&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(32688) Local 192.168.1.9(58688)&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(46254) Local 192.168.1.9(58684)&lt;/P&gt;&lt;P&gt;PAT Global 192.168.1.1(186) Local 192.168.1.9(137)&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(10194) Local 192.168.1.9(58648)&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(37728) Local 192.168.1.9(58634)&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(62317) Local 192.168.1.9(58631)&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(24753) Local 192.168.1.9(58627)&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(30360) Local 192.168.1.9(58626)&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(19754) Local 192.168.1.9(58625)&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(80) Local 192.168.1.9(137)&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(11450) Local 192.168.1.9(58611)&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(28166) Local 192.168.1.7(3733)&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(47319) Local 192.168.1.7 ICMP id 512&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(32084) Local 192.168.1.7(3732)&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(3633) Local 192.168.1.7(3731)&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(24362) Local 192.168.1.7(3728)&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(29073) Local 192.168.1.7(3695)&lt;/P&gt;&lt;P&gt;PAT Global 70.56.200.30(371) Local 192.168.1.7(137)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ASA Version 8.2(1)&lt;BR /&gt;!&lt;BR /&gt;hostname kidsmedasa&lt;BR /&gt;domain-name phx.xxxxxx.com&lt;BR /&gt;enable password xxxxxxxx encrypted&lt;BR /&gt;passwd xxxxxxx encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;pppoe client vpdn group pppoex&lt;BR /&gt;ip address pppoe setroute&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 205.171.3.65&lt;BR /&gt;name-server 205.171.2.65&lt;BR /&gt;domain-name phx.xxxxxxx.com&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;access-list icmp_ping extended permit icmp any any echo-reply&lt;BR /&gt;access-list ICMPACL extended permit icmp any any&lt;BR /&gt;access-list emds-nat extended permit ip host 192.168.1.7 192.168.50.0 255.255.255.0&lt;BR /&gt;access-list inside_acl extended permit ip 192.168.1.0 255.255.255.0 any&lt;BR /&gt;access-list inside_acl extended permit tcp 192.168.1.0 255.255.255.0 any&lt;BR /&gt;access-list inside_acl extended permit tcp 192.168.1.0 255.255.255.0 any eq telnet&lt;BR /&gt;access-list inside_acl extended permit ip any any&lt;BR /&gt;access-list inside_acl extended permit udp 192.168.1.0 255.255.255.0 any&lt;BR /&gt;access-list emds-crypto extended permit ip host 10.1.3.120 192.168.50.0 255.255.255.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging monitor debugging&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-621.bin&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (inside) 10 interface&lt;BR /&gt;global (outside) 10 interface&lt;BR /&gt;nat (inside) 10 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,outside) 10.1.3.120&amp;nbsp; access-list emds-nat&lt;BR /&gt;static (inside,inside) 192.168.1.0 255.255.255.0 netmask 255.255.255.0&lt;BR /&gt;access-group inside_acl in interface inside&lt;BR /&gt;access-group inside_acl out interface inside&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.1.0 255.255.255.0 outside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 20 match address emds-crypto&lt;BR /&gt;crypto map outside_map 20 set peer 66.179.80.108&lt;BR /&gt;crypto map outside_map 20 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 20 set security-association lifetime seconds 28800&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 1&lt;BR /&gt;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;vpdn group pppoex request dialout pppoe&lt;BR /&gt;vpdn group pppoex localname &lt;A href="mailto:xxxxxxxxx@qwest.net"&gt;xxxxxxxxx@qwest.net&lt;/A&gt;&lt;BR /&gt;vpdn group pppoex ppp authentication chap&lt;BR /&gt;vpdn username &lt;A href="mailto:xxxxxxx@qwest.net"&gt;xxxxxxx@qwest.net&lt;/A&gt; password *********&lt;BR /&gt;dhcpd dns 205.171.3.65 205.171.2.65&lt;BR /&gt;dhcpd lease 4500&lt;BR /&gt;dhcpd domain phx.kidsmed.com&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.10-192.168.1.137 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;tftp-server inside 192.168.1.9 config-20110710&lt;BR /&gt;webvpn&lt;BR /&gt;username kidsmed-it password xxxxxxxxx encrypted privilege 15&lt;BR /&gt;username admin password xxxxxxxx encrypted privilege 15&lt;BR /&gt;username cisco password xxxxxxxxxxx encrypted privilege 15&lt;BR /&gt;tunnel-group 66.179.80.108 type ipsec-l2l&lt;BR /&gt;tunnel-group 66.179.80.108 ipsec-attributes&lt;BR /&gt;pre-shared-key *&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:7cd5d8d9ce88603364924a99b6f9499f&lt;BR /&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jul 2011 06:12:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698798#M535776</guid>
      <dc:creator>kidsmed-it</dc:creator>
      <dc:date>2011-07-19T06:12:38Z</dc:date>
    </item>
    <item>
      <title>Re: ASA is dropping packets between two internal hosts</title>
      <link>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698799#M535777</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; I have to get some sleep. It is 11:30pm on the 18th and have put in an 11 hr day already, don't know your time. &lt;/P&gt;&lt;P&gt;I hope you have some ideas. I will try to be back at it tomorrow nite.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you give me some idea of what hours you&amp;nbsp; are available?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx in advance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jul 2011 06:20:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698799#M535777</guid>
      <dc:creator>kidsmed-it</dc:creator>
      <dc:date>2011-07-19T06:20:07Z</dc:date>
    </item>
    <item>
      <title>ASA is dropping packets between two internal hosts</title>
      <link>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698800#M535778</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can catch me from 7:00 am to 12 noon and 7:30 pm to 11:00 pm your time, thats the only time that overlaps for us, I work in Uk timezone.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jul 2011 06:28:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698800#M535778</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-19T06:28:34Z</dc:date>
    </item>
    <item>
      <title>ASA is dropping packets between two internal hosts</title>
      <link>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698801#M535779</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hey Varun, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; I have been sniffing packets with Wireshark, Thru a lot of perseverance, have finally gotten some clear messages to debug. I don't know if you can help but below is a sniffer packet capture . showing issues with SMB or LANMAN protocol , I believe. The IP Address for the DB Server that I am trying to access is 192.168.1.9 and doing it from a WIN XP Pro Client, 192.168.1.11.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; If you look at Frames 14 and 15, I think I see where my problem is in regards to being able to logon to the DB Server. There is a packet with a&amp;nbsp; /sql qry and then a STATUS_ACCESS_DENIED. See what you think. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol Info&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 0.000000&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.11&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; TCP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dfoxserver &amp;gt; netbios-ssn [SYN] Seq=0 Win=64512 Len=0 MSS=1460&lt;/P&gt;&lt;P&gt;Frame 1 (62 bytes on wire, 62 bytes captured)&lt;BR /&gt;Ethernet II, Src: 00:26:b9:79:6e:ee (00:26:b9:79:6e:ee), Dst: 78:2b:cb:25:51:02 (78:2b:cb:25:51:02)&lt;BR /&gt;Internet Protocol, Src: 192.168.1.11 (192.168.1.11), Dst: 192.168.1.9 (192.168.1.9)&lt;BR /&gt;Transmission Control Protocol, Src Port: dfoxserver (2960), Dst Port: netbios-ssn (139), Seq: 0, Len: 0&lt;/P&gt;&lt;P&gt;No.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol Info&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2 0.000340&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.11&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; TCP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; netbios-ssn &amp;gt; dfoxserver [SYN, ACK] Seq=0 Ack=1 Win=8192 Len=0 MSS=1460&lt;/P&gt;&lt;P&gt;Frame 2 (62 bytes on wire, 62 bytes captured)&lt;BR /&gt;Ethernet II, Src: 78:2b:cb:25:51:02 (78:2b:cb:25:51:02), Dst: 00:26:b9:79:6e:ee (00:26:b9:79:6e:ee)&lt;BR /&gt;Internet Protocol, Src: 192.168.1.9 (192.168.1.9), Dst: 192.168.1.11 (192.168.1.11)&lt;BR /&gt;Transmission Control Protocol, Src Port: netbios-ssn (139), Dst Port: dfoxserver (2960), Seq: 0, Ack: 1, Len: 0&lt;/P&gt;&lt;P&gt;No.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol Info&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3 0.000374&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.11&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; NBSS&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session request, to EMDSERVER01&amp;lt;20&amp;gt; from KIDSMED-MAIN&amp;lt;00&amp;gt;&lt;/P&gt;&lt;P&gt;Frame 3 (126 bytes on wire, 126 bytes captured)&lt;BR /&gt;Ethernet II, Src: 00:26:b9:79:6e:ee (00:26:b9:79:6e:ee), Dst: 78:2b:cb:25:51:02 (78:2b:cb:25:51:02)&lt;BR /&gt;Internet Protocol, Src: 192.168.1.11 (192.168.1.11), Dst: 192.168.1.9 (192.168.1.9)&lt;BR /&gt;Transmission Control Protocol, Src Port: dfoxserver (2960), Dst Port: netbios-ssn (139), Seq: 1, Ack: 1, Len: 72&lt;BR /&gt;NetBIOS Session Service&lt;/P&gt;&lt;P&gt;No.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol Info&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4 0.000717&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.11&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; NBSS&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Positive session response&lt;/P&gt;&lt;P&gt;Frame 4 (60 bytes on wire, 60 bytes captured)&lt;BR /&gt;Ethernet II, Src: 78:2b:cb:25:51:02 (78:2b:cb:25:51:02), Dst: 00:26:b9:79:6e:ee (00:26:b9:79:6e:ee)&lt;BR /&gt;Internet Protocol, Src: 192.168.1.9 (192.168.1.9), Dst: 192.168.1.11 (192.168.1.11)&lt;BR /&gt;Transmission Control Protocol, Src Port: netbios-ssn (139), Dst Port: dfoxserver (2960), Seq: 1, Ack: 73, Len: 4&lt;BR /&gt;NetBIOS Session Service&lt;/P&gt;&lt;P&gt;No.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol Info&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5 0.000794&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.11&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SMB&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Negotiate Protocol Request&lt;/P&gt;&lt;P&gt;Frame 5 (191 bytes on wire, 191 bytes captured)&lt;BR /&gt;Ethernet II, Src: 00:26:b9:79:6e:ee (00:26:b9:79:6e:ee), Dst: 78:2b:cb:25:51:02 (78:2b:cb:25:51:02)&lt;BR /&gt;Internet Protocol, Src: 192.168.1.11 (192.168.1.11), Dst: 192.168.1.9 (192.168.1.9)&lt;BR /&gt;Transmission Control Protocol, Src Port: dfoxserver (2960), Dst Port: netbios-ssn (139), Seq: 73, Ack: 5, Len: 137&lt;BR /&gt;NetBIOS Session Service&lt;BR /&gt;SMB (Server Message Block Protocol)&lt;/P&gt;&lt;P&gt;No.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol Info&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6 0.002623&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.11&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SMB&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Negotiate Protocol Response&lt;/P&gt;&lt;P&gt;Frame 6 (263 bytes on wire, 263 bytes captured)&lt;BR /&gt;Ethernet II, Src: 78:2b:cb:25:51:02 (78:2b:cb:25:51:02), Dst: 00:26:b9:79:6e:ee (00:26:b9:79:6e:ee)&lt;BR /&gt;Internet Protocol, Src: 192.168.1.9 (192.168.1.9), Dst: 192.168.1.11 (192.168.1.11)&lt;BR /&gt;Transmission Control Protocol, Src Port: netbios-ssn (139), Dst Port: dfoxserver (2960), Seq: 5, Ack: 210, Len: 209&lt;BR /&gt;NetBIOS Session Service&lt;BR /&gt;SMB (Server Message Block Protocol)&lt;/P&gt;&lt;P&gt;No.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol Info&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7 0.002968&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.11&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; TCP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [TCP segment of a reassembled PDU]&lt;/P&gt;&lt;P&gt;Frame 7 (1514 bytes on wire, 1514 bytes captured)&lt;BR /&gt;Ethernet II, Src: 00:26:b9:79:6e:ee (00:26:b9:79:6e:ee), Dst: 78:2b:cb:25:51:02 (78:2b:cb:25:51:02)&lt;BR /&gt;Internet Protocol, Src: 192.168.1.11 (192.168.1.11), Dst: 192.168.1.9 (192.168.1.9)&lt;BR /&gt;Transmission Control Protocol, Src Port: dfoxserver (2960), Dst Port: netbios-ssn (139), Seq: 210, Ack: 214, Len: 1460&lt;/P&gt;&lt;P&gt;No.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol Info&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8 0.002983&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.11&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; TCP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [TCP segment of a reassembled PDU]&lt;/P&gt;&lt;P&gt;Frame 8 (1514 bytes on wire, 1514 bytes captured)&lt;BR /&gt;Ethernet II, Src: 00:26:b9:79:6e:ee (00:26:b9:79:6e:ee), Dst: 78:2b:cb:25:51:02 (78:2b:cb:25:51:02)&lt;BR /&gt;Internet Protocol, Src: 192.168.1.11 (192.168.1.11), Dst: 192.168.1.9 (192.168.1.9)&lt;BR /&gt;Transmission Control Protocol, Src Port: dfoxserver (2960), Dst Port: netbios-ssn (139), Seq: 1670, Ack: 214, Len: 1460&lt;/P&gt;&lt;P&gt;No.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol Info&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9 0.002994&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.11&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SMB&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session Setup AndX Request&lt;/P&gt;&lt;P&gt;Frame 9 (164 bytes on wire, 164 bytes captured)&lt;BR /&gt;Ethernet II, Src: 00:26:b9:79:6e:ee (00:26:b9:79:6e:ee), Dst: 78:2b:cb:25:51:02 (78:2b:cb:25:51:02)&lt;BR /&gt;Internet Protocol, Src: 192.168.1.11 (192.168.1.11), Dst: 192.168.1.9 (192.168.1.9)&lt;BR /&gt;Transmission Control Protocol, Src Port: dfoxserver (2960), Dst Port: netbios-ssn (139), Seq: 3130, Ack: 214, Len: 110&lt;BR /&gt;[Reassembled TCP Segments (3030 bytes): #7(1460), #8(1460), #9(110)]&lt;BR /&gt;NetBIOS Session Service&lt;BR /&gt;SMB (Server Message Block Protocol)&lt;/P&gt;&lt;P&gt;No.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol Info&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10 0.003702&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.11&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; TCP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; netbios-ssn &amp;gt; dfoxserver [ACK] Seq=214 Ack=3240 Win=64240 Len=0&lt;/P&gt;&lt;P&gt;Frame 10 (60 bytes on wire, 60 bytes captured)&lt;BR /&gt;Ethernet II, Src: 78:2b:cb:25:51:02 (78:2b:cb:25:51:02), Dst: 00:26:b9:79:6e:ee (00:26:b9:79:6e:ee)&lt;BR /&gt;Internet Protocol, Src: 192.168.1.9 (192.168.1.9), Dst: 192.168.1.11 (192.168.1.11)&lt;BR /&gt;Transmission Control Protocol, Src Port: netbios-ssn (139), Dst Port: dfoxserver (2960), Seq: 214, Ack: 3240, Len: 0&lt;/P&gt;&lt;P&gt;No.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol Info&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 11 0.004540&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.11&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SMB&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session Setup AndX Response&lt;/P&gt;&lt;P&gt;Frame 11 (439 bytes on wire, 439 bytes captured)&lt;BR /&gt;Ethernet II, Src: 78:2b:cb:25:51:02 (78:2b:cb:25:51:02), Dst: 00:26:b9:79:6e:ee (00:26:b9:79:6e:ee)&lt;BR /&gt;Internet Protocol, Src: 192.168.1.9 (192.168.1.9), Dst: 192.168.1.11 (192.168.1.11)&lt;BR /&gt;Transmission Control Protocol, Src Port: netbios-ssn (139), Dst Port: dfoxserver (2960), Seq: 214, Ack: 3240, Len: 385&lt;BR /&gt;NetBIOS Session Service&lt;BR /&gt;SMB (Server Message Block Protocol)&lt;/P&gt;&lt;P&gt;No.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol Info&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 12 0.004710&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.11&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SMB&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Tree Connect AndX Request, Path: &lt;A&gt;\\EMDSERVER01\IPC$&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Frame 12 (146 bytes on wire, 146 bytes captured)&lt;BR /&gt;Ethernet II, Src: 00:26:b9:79:6e:ee (00:26:b9:79:6e:ee), Dst: 78:2b:cb:25:51:02 (78:2b:cb:25:51:02)&lt;BR /&gt;Internet Protocol, Src: 192.168.1.11 (192.168.1.11), Dst: 192.168.1.9 (192.168.1.9)&lt;BR /&gt;Transmission Control Protocol, Src Port: dfoxserver (2960), Dst Port: netbios-ssn (139), Seq: 3240, Ack: 599, Len: 92&lt;BR /&gt;NetBIOS Session Service&lt;BR /&gt;SMB (Server Message Block Protocol)&lt;/P&gt;&lt;P&gt;No.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol Info&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 13 0.005110&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.11&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SMB&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Tree Connect AndX Response&lt;/P&gt;&lt;P&gt;Frame 13 (114 bytes on wire, 114 bytes captured)&lt;BR /&gt;Ethernet II, Src: 78:2b:cb:25:51:02 (78:2b:cb:25:51:02), Dst: 00:26:b9:79:6e:ee (00:26:b9:79:6e:ee)&lt;BR /&gt;Internet Protocol, Src: 192.168.1.9 (192.168.1.9), Dst: 192.168.1.11 (192.168.1.11)&lt;BR /&gt;Transmission Control Protocol, Src Port: netbios-ssn (139), Dst Port: dfoxserver (2960), Seq: 599, Ack: 3332, Len: 60&lt;BR /&gt;NetBIOS Session Service&lt;BR /&gt;SMB (Server Message Block Protocol)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;No.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol Info&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 14 0.005171&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.11&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SMB&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; NT Create AndX Request, Path: \sql\query&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Frame 14 (164 bytes on wire, 164 bytes captured)&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Ethernet II, Src: 00:26:b9:79:6e:ee (00:26:b9:79:6e:ee), Dst: 78:2b:cb:25:51:02 (78:2b:cb:25:51:02)&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Internet Protocol, Src: 192.168.1.11 (192.168.1.11), Dst: 192.168.1.9 (192.168.1.9)&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Transmission Control Protocol, Src Port: dfoxserver (2960), Dst Port: netbios-ssn (139), Seq: 3332, Ack: 659, Len: 110&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;NetBIOS Session Service&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;SMB (Server Message Block Protocol)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;No.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol Info&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 15 0.005518&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.11&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SMB&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; NT Create AndX Response, FID: 0x0000, Error: STATUS_ACCESS_DENIED&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Frame 15 (93 bytes on wire, 93 bytes captured)&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Ethernet II, Src: 78:2b:cb:25:51:02 (78:2b:cb:25:51:02), Dst: 00:26:b9:79:6e:ee (00:26:b9:79:6e:ee)&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Internet Protocol, Src: 192.168.1.9 (192.168.1.9), Dst: 192.168.1.11 (192.168.1.11)&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Transmission Control Protocol, Src Port: netbios-ssn (139), Dst Port: dfoxserver (2960), Seq: 659, Ack: 3442, Len: 39&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;NetBIOS Session Service&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;SMB (Server Message Block Protocol)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;No.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol Info&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 16 0.118990&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.11&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; TCP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dfoxserver &amp;gt; netbios-ssn [ACK] Seq=3442 Ack=698 Win=63815 Len=0&lt;/P&gt;&lt;P&gt;Frame 16 (54 bytes on wire, 54 bytes captured)&lt;BR /&gt;Ethernet II, Src: 00:26:b9:79:6e:ee (00:26:b9:79:6e:ee), Dst: 78:2b:cb:25:51:02 (78:2b:cb:25:51:02)&lt;BR /&gt;Internet Protocol, Src: 192.168.1.11 (192.168.1.11), Dst: 192.168.1.9 (192.168.1.9)&lt;BR /&gt;Transmission Control Protocol, Src Port: dfoxserver (2960), Dst Port: netbios-ssn (139), Seq: 3442, Ack: 698, Len: 0&lt;/P&gt;&lt;P&gt;No.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol Info&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 17 1.421998&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.11&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SMB&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; NT Create AndX Request, Path: \sql\query&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Jul 2011 04:28:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698801#M535779</guid>
      <dc:creator>kidsmed-it</dc:creator>
      <dc:date>2011-07-20T04:28:59Z</dc:date>
    </item>
    <item>
      <title>ASA is dropping packets between two internal hosts</title>
      <link>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698802#M535780</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; I hope you are there. We are very close! The ASDM logs yielded the following DENY from the ASA device. I am not sure what the informational message is trying to say.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dustin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6 Jul 19 2011 21:12:15 106015 192.168.1.9 139 192.168.1.11 3077 Deny TCP (no connection) from &lt;A href="http://192.168.1.9/139" target="_blank"&gt;192.168.1.9/139&lt;/A&gt; to &lt;A href="http://192.168.1.11/3077" target="_blank"&gt;192.168.1.11/3077&lt;/A&gt; flags SYN ACK&amp;nbsp; on interface inside&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;%ASA-6-106015: Deny TCP (no connection) from IP_address/port to &lt;BR /&gt;IP_address/port flags tcp_flags on interface interface_name.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;The adaptive security appliance discarded a TCP packet that has no associated connection&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; in the adaptive security appliance connection table&lt;/STRONG&gt;. The adaptive security appliance &lt;BR /&gt;looks for a SYN flag in the packet, which indicates a request to establish a new connection.&lt;BR /&gt; If the SYN flag is not set, and there&amp;nbsp; is not an existing connection, the adaptive security appliance &lt;/P&gt;&lt;P&gt;discards the packet. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Jul 2011 04:39:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698802#M535780</guid>
      <dc:creator>kidsmed-it</dc:creator>
      <dc:date>2011-07-20T04:39:30Z</dc:date>
    </item>
    <item>
      <title>ASA is dropping packets between two internal hosts</title>
      <link>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698803#M535781</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dustin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes these sniffers do suggest it could be an issue. But one morething that we need to verify is, if these sniffer pop up at the same moment you experience a drop in ping, then definitely we know where the issue lies, you can do the same thing, apply captures on the ASA, initiate constant pings, and then match the timestamp of the ping drop with the denied status sniffer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Jul 2011 04:43:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698803#M535781</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-20T04:43:18Z</dc:date>
    </item>
    <item>
      <title>ASA is dropping packets between two internal hosts</title>
      <link>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698804#M535782</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; I am troubleshooting two issues.&lt;/P&gt;&lt;P&gt;1) The Intermittent Ping blocks&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; and 2) Not being able to logon to the SQL*Server database.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So above packet information was for the SQL*Server Logon problem.&amp;nbsp; Just before that the Pings went thru fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now the&lt;STRONG&gt; Pings are being blocked &lt;/STRONG&gt;and I get the following ASDM syslogs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Jul 19 2011&lt;/TD&gt;&lt;TD&gt;21:30:48&lt;/TD&gt;&lt;TD&gt;305006&lt;/TD&gt;&lt;TD&gt;192.168.1.11&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;regular translation creation failed for icmp src inside:192.168.1.9 dst inside:192.168.1.11 (type 0, code 0)&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;SPAN style="font-size: 14pt;"&gt; &lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14pt;"&gt; &lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14pt;"&gt;%&lt;SPAN style="color: #000000;"&gt;A&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 14pt;"&gt;SA-3-305006: {outbound static|identity|portmap|regular) translation creation failed for &lt;EM&gt;&lt;EM&gt;protocol&lt;/EM&gt;&lt;/EM&gt;&lt;SPAN style="color: #000000;"&gt; &lt;/SPAN&gt;src &lt;EM&gt;interface_name&lt;/EM&gt;&lt;EM&gt;&lt;EM&gt;:&lt;/EM&gt;&lt;/EM&gt;&lt;SPAN style="color: #000000;"&gt;source_address&lt;/SPAN&gt;&lt;EM&gt;&lt;EM&gt;/&lt;/EM&gt;&lt;/EM&gt;&lt;SPAN style="color: #000000;"&gt;source_port&lt;/SPAN&gt;&lt;SPAN style="color: #000000;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 14pt;"&gt;dst &lt;EM&gt;interface_name&lt;/EM&gt;&lt;EM&gt;&lt;EM&gt;:&lt;/EM&gt;&lt;/EM&gt;&lt;SPAN style="color: #000000;"&gt;dest_address&lt;/SPAN&gt;&lt;EM&gt;&lt;EM&gt;/&lt;/EM&gt;&lt;/EM&gt;&lt;SPAN style="color: #000000;"&gt;dest_port&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;A protocol (UDP, TCP, or ICMP) failed to create a translation through the adaptive security appliance. &lt;SPAN style="color: #000000;"&gt;The adaptive security appliance&lt;/SPAN&gt; &lt;SPAN style="color: #000000;"&gt;does &lt;/SPAN&gt;not allow packets &lt;SPAN style="color: #000000;"&gt;through &lt;/SPAN&gt;that are destined for network or broadcast addresses. The adaptive security appliance provides this checking for addresses that are explicitly identified with &lt;SPAN style="color: #000000;"&gt;&lt;STRONG&gt;static&lt;/STRONG&gt;&lt;/SPAN&gt; command&lt;SPAN style="color: #000000;"&gt;s.&lt;/SPAN&gt; &lt;SPAN style="color: #000000;"&gt;Fo&lt;/SPAN&gt;r inbound traffic, the adaptive security appliance denies translations for a&lt;SPAN style="color: #000000;"&gt;n I&lt;/SPAN&gt;P address identified as a network or broadcast address. &lt;/P&gt;&lt;P&gt;&lt;A name="13145e31c82b70aa_wp4770971"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The adaptive security appliance does not apply PAT to all ICMP message types; it only applies PAT ICMP echo and echo-reply packets (types 8 and 0). Specifically, only ICMP echo or echo-reply packets create a PAT &lt;SPAN style="color: #000000;"&gt;translation.&lt;/SPAN&gt; &lt;SPAN style="color: #000000;"&gt;As a result,&lt;/SPAN&gt; when the other ICMP messages types are dropped, &lt;SPAN style="color: #000000;"&gt;this message i&lt;/SPAN&gt;s generated. &lt;/P&gt;&lt;P&gt;&lt;A name="13145e31c82b70aa_wp4770978"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The adaptive security appliance &lt;SPAN style="color: #000000;"&gt;uses t&lt;/SPAN&gt;he global IP &lt;SPAN style="color: #000000;"&gt;address a&lt;/SPAN&gt;nd mask from configured &lt;SPAN style="color: #000000;"&gt;&lt;STRONG&gt;static&lt;/STRONG&gt;&lt;/SPAN&gt; command&lt;SPAN style="color: #000000;"&gt;s t&lt;/SPAN&gt;o differ&lt;SPAN style="color: #000000;"&gt;entiate&lt;/SPAN&gt; regular IP addresses from network or broadcast IP addresses. If the global IP address is a valid network address with a matching network mask, then the adaptive security appliance does not create a translation for network or broadcast IP addresses with inbound packets. &lt;/P&gt;&lt;P&gt;&lt;A name="13145e31c82b70aa_wp4770982"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;For example: &lt;/P&gt;&lt;P&gt;&lt;A name="13145e31c82b70aa_wp4770983"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;PRE&gt;&lt;STRONG&gt;static (inside,outside) 10.2.2.128 10.1.1.128 netmask 255.255.255.128&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/P&gt;&lt;DIV&gt;&lt;PRE&gt;&lt;A name="13145e31c82b70aa_wp4770984"&gt;
&lt;/A&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;A name="13145e31c82b70aa_wp4770985"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;The adaptive security appliance responds to gl&lt;/SPAN&gt;obal address 10.2.2.128 &lt;SPAN style="color: #000000;"&gt;a&lt;/SPAN&gt;s a network address and &lt;SPAN style="color: #000000;"&gt;to &lt;/SPAN&gt;10.2.2.255 &lt;SPAN style="color: #000000;"&gt;a&lt;/SPAN&gt;s the broadcast address. Without an existing translation, &lt;SPAN style="color: #000000;"&gt;the &lt;/SPAN&gt;adaptive security appliance denies inbound packets destined for 10.2.2.128 or 10.2.2.255, and logs this &lt;SPAN style="color: #000000;"&gt;message.&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;A name="13145e31c82b70aa_wp4770989"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;When the suspected IP &lt;SPAN style="color: #000000;"&gt;address &lt;/SPAN&gt;is a host IP&lt;SPAN style="color: #000000;"&gt; address&lt;/SPAN&gt;, configure a separate&lt;SPAN style="color: #000000;"&gt; &lt;/SPAN&gt;&lt;SPAN style="color: #000000;"&gt;&lt;STRONG&gt;s&lt;/STRONG&gt;&lt;STRONG&gt;tatic&lt;/STRONG&gt;&lt;/SPAN&gt; command &lt;SPAN style="color: #000000;"&gt;w&lt;/SPAN&gt;ith a host mask in front of the subnet &lt;STRONG&gt;static&lt;/STRONG&gt; &lt;SPAN style="color: #000000;"&gt;command (the &lt;/SPAN&gt;first match rule for &lt;SPAN style="color: #000000;"&gt;&lt;STRONG&gt;static&lt;/STRONG&gt;&lt;/SPAN&gt; command&lt;SPAN style="color: #000000;"&gt;s)&lt;/SPAN&gt;. The following &lt;STRONG&gt;static&lt;/STRONG&gt; &lt;SPAN style="color: #000000;"&gt;commands &lt;/SPAN&gt;cause&lt;SPAN style="color: #000000;"&gt; t&lt;/SPAN&gt;he adaptive security appliance to respond to 10.2.2.128 as a host address: &lt;/P&gt;&lt;P&gt;&lt;A name="13145e31c82b70aa_wp4770993"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV&gt;&lt;PRE&gt;&lt;STRONG&gt;static (inside,outside) 10.2.2.128 10.2.2.128 netmask 255.255.255.255 
static (inside,outside) 10.2.2.128 10.2.2.128 netmask 255.255.255.128&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;PRE&gt;&lt;A name="13145e31c82b70aa_wp4770994"&gt;
&lt;/A&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;A name="13145e31c82b70aa_wp4770995"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The translation may be created by traffic started &lt;SPAN style="color: #000000;"&gt;from t&lt;/SPAN&gt;he inside host with the &lt;SPAN style="color: #000000;"&gt;I&lt;/SPAN&gt;P address&lt;SPAN style="color: #000000;"&gt; in question&lt;/SPAN&gt;. Because the adaptive security appliance views a network &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Jul 2011 05:14:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698804#M535782</guid>
      <dc:creator>kidsmed-it</dc:creator>
      <dc:date>2011-07-20T05:14:41Z</dc:date>
    </item>
    <item>
      <title>ASA is dropping packets between two internal hosts</title>
      <link>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698805#M535783</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; I think my traffic is bein redirected. Here are th ASDM logs for the only thing happenning is the Blocked Pings. We are a very small shop.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; I am seeing traffic where it apears we are trying to handshake with an outside&amp;nbsp; 174.137.125.35 IP Address and don't know why.&amp;nbsp; Our static Global IP is 70.56.188.207.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dustin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3|Jul 19 2011|21:53:37|305006|192.168.1.11||||regular translation creation failed for icmp src inside:192.168.1.9 dst inside:192.168.1.11 (type 0, code 0)&lt;/P&gt;&lt;P&gt;6|Jul 19 2011|21:53:36|302014|&lt;STRONG&gt;174.137.125.35&lt;/STRONG&gt;|445|&lt;STRONG&gt;192.168.1.9&lt;/STRONG&gt;|51184|Teardown TCP connection 40123 for outside:&lt;STRONG&gt;174.137.125.35&lt;/STRONG&gt;/445 to inside:192.168.1.9/51184 duration 0:00:00 bytes 0 TCP Reset-O&lt;/P&gt;&lt;P&gt;6|Jul 19 2011|21:53:36|302013|174.137.125.35|445|192.168.1.9|51184|Built outbound TCP connection 40123 for outside:174.137.125.35/445 (174.137.125.35/445) to inside:192.168.1.9/51184 (&lt;STRONG&gt;70.56.188.207&lt;/STRONG&gt;/42240)&lt;/P&gt;&lt;P&gt;6|Jul 19 2011|21:53:36|302013|192.168.1.9|51185|255.255.255.11|139|Built inbound TCP connection 40122 for inside:192.168.1.9/51185 (192.168.1.1/47690) to inside:255.255.255.11/139 (192.168.1.11/139)&lt;/P&gt;&lt;P&gt;6|Jul 19 2011|21:53:36|305011|192.168.1.9|51185|192.168.1.1|47690|Built dynamic TCP translation from inside:192.168.1.9/51185 to inside:192.168.1.1/47690&lt;/P&gt;&lt;P&gt;6|Jul 19 2011|21:53:35|302014|174.137.125.35|445|192.168.1.9|51184|Teardown TCP connection 40121 for outside:174.137.125.35/445 to inside:192.168.1.9/51184 duration 0:00:00 bytes 0 TCP Reset-O&lt;/P&gt;&lt;P&gt;6|Jul 19 2011|21:53:35|302013|174.137.125.35|445|192.168.1.9|51184|Built outbound TCP connection 40121 for outside:174.137.125.35/445 (174.137.125.35/445) to inside:192.168.1.9/51184 (70.56.188.207/42240)&lt;/P&gt;&lt;P&gt;6|Jul 19 2011|21:53:35|302014|174.137.125.35|445|192.168.1.9|51184|Teardown TCP connection 40120 for outside:174.137.125.35/445 to inside:192.168.1.9/51184 duration 0:00:00 bytes 0 TCP Reset-O&lt;/P&gt;&lt;P&gt;6|Jul 19 2011|21:53:35|302013|174.137.125.35|445|192.168.1.9|51184|Built outbound TCP connection 40120 for outside:174.137.125.35/445 (174.137.125.35/445) to inside:192.168.1.9/51184 (70.56.188.207/42240)&lt;/P&gt;&lt;P&gt;6|Jul 19 2011|21:53:35|305011|192.168.1.9|51184|70.56.188.207|42240|Built dynamic TCP translation from inside:192.168.1.9/51184 to outside:70.56.188.207/42240&lt;/P&gt;&lt;P&gt;3|Jul 19 2011|21:53:32|305006|192.168.1.11||||regular translation creation failed for icmp src inside:192.168.1.9 dst inside:192.168.1.11 (type 0, code 0)&lt;/P&gt;&lt;P&gt;3|Jul 19 2011|21:53:26|305006|192.168.1.11||||regular translation creation failed for icmp src inside:192.168.1.9 dst inside:192.168.1.11 (type 0, code 0)&lt;/P&gt;&lt;P&gt;6|Jul 19 2011|21:53:23|305012|192.168.1.9|51178|192.168.1.1|5753|Teardown dynamic TCP translation from inside:192.168.1.9/51178 to inside:192.168.1.1/5753 duration 0:01:00&lt;/P&gt;&lt;P&gt;3|Jul 19 2011|21:53:21|305006|192.168.1.11||||regular translation creation failed for icmp src inside:192.168.1.9 dst inside:192.168.1.11 (type 0, code 0)&lt;/P&gt;&lt;P&gt;3|Jul 19 2011|21:53:15|305006|192.168.1.11||||regular translation creation failed for icmp src inside:192.168.1.9 dst inside:192.168.1.11 (type 0, code 0)&lt;/P&gt;&lt;P&gt;6|Jul 19 2011|21:53:14|302014|192.168.1.9|51182|255.255.255.11|139|Teardown TCP connection 40078 for inside:192.168.1.9/51182 to inside:255.255.255.11/139 duration 0:00:30 bytes 0 SYN Timeout&lt;/P&gt;&lt;P&gt;3|Jul 19 2011|21:53:10|305006|192.168.1.11||||regular translation creation failed for icmp src inside:192.168.1.9 dst inside:192.168.1.11 (type 0, code 0)&lt;/P&gt;&lt;P&gt;6|Jul 19 2011|21:53:06|305012|192.168.1.9|51172|70.56.188.207|42244|Teardown dynamic TCP translation from inside:192.168.1.9/51172 to outside:70.56.188.207/42244 duration 0:02:00&lt;/P&gt;&lt;P&gt;　&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;3|Jul 19 2011|21:53:37|305006|192.168.1.11||||regular translation creation failed for icmp src inside:192.168.1.9 dst inside:192.168.1.11 (type 0, code 0)&lt;/P&gt;&lt;P&gt;6|Jul 19 2011|21:53:36|302014|174.137.125.35|445|192.168.1.9|51184|Teardown TCP connection 40123 for outside:174.137.125.35/445 to inside:192.168.1.9/51184 duration 0:00:00 bytes 0 TCP Reset-O&lt;/P&gt;&lt;P&gt;6|Jul 19 2011|21:53:36|302013|174.137.125.35|445|192.168.1.9|51184|Built outbound TCP connection 40123 for outside:174.137.125.35/445 (174.137.125.35/445) to inside:192.168.1.9/51184 (70.56.188.207/42240)&lt;/P&gt;&lt;P&gt;6|Jul 19 2011|21:53:36|302013|192.168.1.9|51185|255.255.255.11|139|Built inbound TCP connection 40122 for inside:192.168.1.9/51185 (192.168.1.1/47690) to inside:255.255.255.11/139 (192.168.1.11/139)&lt;/P&gt;&lt;P&gt;6|Jul 19 2011|21:53:36|305011|192.168.1.9|51185|192.168.1.1|47690|Built dynamic TCP translation from inside:192.168.1.9/51185 to inside:192.168.1.1/47690&lt;/P&gt;&lt;P&gt;6|Jul 19 2011|21:53:35|302014|174.137.125.35|445|192.168.1.9|51184|Teardown TCP connection 40121 for outside:174.137.125.35/445 to inside:192.168.1.9/51184 duration 0:00:00 bytes 0 TCP Reset-O&lt;/P&gt;&lt;P&gt;6|Jul 19 2011|21:53:35|302013|174.137.125.35|445|192.168.1.9|51184|Built outbound TCP connection 40121 for outside:174.137.125.35/445 (174.137.125.35/445) to inside:192.168.1.9/51184 (70.56.188.207/42240)&lt;/P&gt;&lt;P&gt;6|Jul 19 2011|21:53:35|302014|174.137.125.35|445|192.168.1.9|51184|Teardown TCP connection 40120 for outside:174.137.125.35/445 to inside:192.168.1.9/51184 duration 0:00:00 bytes 0 TCP Reset-O&lt;/P&gt;&lt;P&gt;6|Jul 19 2011|21:53:35|302013|174.137.125.35|445|192.168.1.9|51184|Built outbound TCP connection 40120 for outside:174.137.125.35/445 (174.137.125.35/445) to inside:192.168.1.9/51184 (70.56.188.207/42240)&lt;/P&gt;&lt;P&gt;6|Jul 19 2011|21:53:35|305011|192.168.1.9|51184|70.56.188.207|42240|Built dynamic TCP translation from inside:192.168.1.9/51184 to outside:70.56.188.207/42240&lt;/P&gt;&lt;P&gt;3|Jul 19 2011|21:53:32|305006|192.168.1.11||||regular translation creation failed for icmp src inside:192.168.1.9 dst inside:192.168.1.11 (type 0, code 0)&lt;/P&gt;&lt;P&gt;3|Jul 19 2011|21:53:26|305006|192.168.1.11||||regular translation creation failed for icmp src inside:192.168.1.9 dst inside:192.168.1.11 (type 0, code 0)&lt;/P&gt;&lt;P&gt;6|Jul 19 2011|21:53:23|305012|192.168.1.9|51178|192.168.1.1|5753|Teardown dynamic TCP translation from inside:192.168.1.9/51178 to inside:192.168.1.1/5753 duration 0:01:00&lt;/P&gt;&lt;P&gt;3|Jul 19 2011|21:53:21|305006|192.168.1.11||||regular translation creation failed for icmp src inside:192.168.1.9 dst inside:192.168.1.11 (type 0, code 0)&lt;/P&gt;&lt;P&gt;3|Jul 19 2011|21:53:15|305006|192.168.1.11||||regular translation creation failed for icmp src inside:192.168.1.9 dst inside:192.168.1.11 (type 0, code 0)&lt;/P&gt;&lt;P&gt;6|Jul 19 2011|21:53:14|302014|192.168.1.9|51182|255.255.255.11|139|Teardown TCP connection 40078 for inside:192.168.1.9/51182 to inside:255.255.255.11/139 duration 0:00:30 bytes 0 SYN Timeout&lt;/P&gt;&lt;P&gt;3|Jul 19 2011|21:53:10|305006|192.168.1.11||||regular translation creation failed for icmp src inside:192.168.1.9 dst inside:192.168.1.11 (type 0, code 0)&lt;/P&gt;&lt;P&gt;6|Jul 19 2011|21:53:06|305012|192.168.1.9|51172|70.56.188.207|42244|Teardown dynamic TCP translation from inside:192.168.1.9/51172 to outside:70.56.188.207/42244 duration 0:02:00&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Jul 2011 05:19:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698805#M535783</guid>
      <dc:creator>kidsmed-it</dc:creator>
      <dc:date>2011-07-20T05:19:42Z</dc:date>
    </item>
    <item>
      <title>ASA is dropping packets between two internal hosts</title>
      <link>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698806#M535784</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dustin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you please change this static rule in your configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,inside) 192.168.1.0 255.255.255.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it should be:&lt;/P&gt;&lt;P&gt;static (inside,inside) 192.168.1.0 192.168.1.0 netmask 255.255.255.0 norand nailed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this should resolve one of the issues of ping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Jul 2011 05:59:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698806#M535784</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-20T05:59:06Z</dc:date>
    </item>
    <item>
      <title>ASA is dropping packets between two internal hosts</title>
      <link>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698807#M535785</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Are you there?? You aren't going to lunch yet, ru?&amp;nbsp; The fun is just beginning. What I was able to figure out, is that my base domain kidsmed.com of my internal fully-qualified domain name phx.kidsmed.com is someone else's external domain name, ie the 174.137.125.35. Hence the external IP showing up in my router traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am now trying to take out the references to my FQDN internally in relationship to my ASA Config and the DNS settings.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am getting this error message, can you help?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; clear configure dns&lt;/P&gt;&lt;P&gt;ERROR: dns server-group &lt;DEFAULTDNS&gt; is in use by tunnel-group &lt;DEFAULTRAGROUP&gt;. Please remove the relevant configuration before removing the dns server-group.&lt;/DEFAULTRAGROUP&gt;&lt;/DEFAULTDNS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I cannot see where in my ASA config there is any Tunnel Group referencing xxx.kidsmed.com, my domain name.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Jul 2011 06:09:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698807#M535785</guid>
      <dc:creator>kidsmed-it</dc:creator>
      <dc:date>2011-07-20T06:09:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASA is dropping packets between two internal hosts</title>
      <link>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698808#M535786</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;Please check the following outputs:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;&lt;STRONG&gt;show run all&amp;nbsp; | include tunnel-group&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;&lt;STRONG&gt; show run all | in dns&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;To verify where it is being used.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: calibri,verdana,arial,sans-serif;"&gt;Varun&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Jul 2011 06:22:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698808#M535786</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-20T06:22:13Z</dc:date>
    </item>
    <item>
      <title>ASA is dropping packets between two internal hosts</title>
      <link>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698809#M535787</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;kidsmedasa# show run tunnel-group&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group 66.179.80.108 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 66.179.80.108 ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;kidsmedasa# show run dns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DNS server-group DefaultDNS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; domain-name phx.kidsmed.com&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Jul 2011 06:35:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-is-dropping-packets-between-two-internal-hosts/m-p/1698809#M535787</guid>
      <dc:creator>kidsmed-it</dc:creator>
      <dc:date>2011-07-20T06:35:58Z</dc:date>
    </item>
  </channel>
</rss>

