<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Webex issues consistent through ASA firewalls in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/webex-issues-consistent-through-asa-firewalls/m-p/3905634#M5769</link>
    <description>&lt;P&gt;Thanks Peter,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've excluded Webex traffic from FirePower inspection, yet the problems remained.&lt;/P&gt;&lt;P&gt;I did packet-trace command on typical Webex connection and confirmed it wasn't sent to IPS policy for inspection...&lt;/P&gt;&lt;P&gt;Any more ideas? Do you think there's much difference in using implicit allow (for traffic initiated from higher security level to lower) and explicitly defining Webex traffic (Network Objects - Webex URL-s and public IP-s, as well as UDP/TCP ports)?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Alex&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 08 Aug 2019 21:38:41 GMT</pubDate>
    <dc:creator>aleksa</dc:creator>
    <dc:date>2019-08-08T21:38:41Z</dc:date>
    <item>
      <title>Webex issues consistent through ASA firewalls</title>
      <link>https://community.cisco.com/t5/network-security/webex-issues-consistent-through-asa-firewalls/m-p/3900726#M5765</link>
      <description>&lt;P&gt;&amp;nbsp;Hi all,&lt;/P&gt;&lt;P&gt;I got a client and they use Webex stations and Webex apps on PC-s.&lt;/P&gt;&lt;P&gt;They got fibre service, yet performance is poor most of the time.&lt;/P&gt;&lt;P&gt;Read an article about allowing outbound UDP 9000 through the firewall, but implicit policies are in place, so all traffic allowed from inside to the outside.&lt;/P&gt;&lt;P&gt;Other apps like Skype and TeamViewer, have no issues on the same PC-s and network. All hosts hardwired (no WiFi in use)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm getting confused as to what could be the issue, especially that I can't see UDP 9000 used on the PC (in netstat -an command),&lt;/P&gt;&lt;P&gt;however, there is session on each site ASA using both UDP 9000 and TCP 443, both sessions incrementing packets...&lt;/P&gt;&lt;P&gt;Wonder if anyone had similar experience?&lt;/P&gt;&lt;P&gt;I'll have to digest the configuration, I'll paste it later, but for now,&lt;/P&gt;&lt;P&gt;Here are the sessions from two different branches:&lt;/P&gt;&lt;P&gt;ASA5516X-FW01/act# sh conn | inc 10.7.10.87&lt;BR /&gt;...&lt;BR /&gt;TCP OUTSIDE 188.172.208.138:5938 INSIDE 10.7.10.87:49462, idle 0:00:20, bytes 191513, flags UxIOX&lt;BR /&gt;UDP OUTSIDE 114.29.192.95:9000 INSIDE 10.7.10.87:60573, idle 0:00:00, bytes 9849856, flags X&lt;BR /&gt;UDP OUTSIDE 114.29.192.95:9000 INSIDE 10.7.10.87:64336, idle 0:00:00, bytes 201397360 , flags X&lt;BR /&gt;TCP OUTSIDE 114.29.192.95:443 INSIDE 10.7.10.87:51560, idle 0:00:00, bytes 672621, fl ags UxIO&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;B-ASA5516X-FW01/act# sh conn | inc 10.2.1.249&lt;BR /&gt;...&lt;BR /&gt;UDP OUTSIDE 114.29.192.95:9000 INSIDE 10.2.1.249:61169, idle 0:00:00, bytes 1802320, flags X&lt;BR /&gt;UDP OUTSIDE 114.29.192.95:9000 INSIDE 10.2.1.249:51851, idle 0:00:00, bytes 324618730, flags X&lt;BR /&gt;TCP OUTSIDE 114.29.192.95:443 INSIDE 10.2.1.249:53553, idle 0:00:02, bytes 1107153, flags UxIO&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:21:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/webex-issues-consistent-through-asa-firewalls/m-p/3900726#M5765</guid>
      <dc:creator>aleksa</dc:creator>
      <dc:date>2020-02-21T17:21:36Z</dc:date>
    </item>
    <item>
      <title>Re: Webex issues consistent through ASA firewalls</title>
      <link>https://community.cisco.com/t5/network-security/webex-issues-consistent-through-asa-firewalls/m-p/3901044#M5766</link>
      <description>&lt;P&gt;And here is the relevant config...&lt;/P&gt;&lt;P&gt;Please let me know of any thoughts?&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2019 21:13:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/webex-issues-consistent-through-asa-firewalls/m-p/3901044#M5766</guid>
      <dc:creator>aleksa</dc:creator>
      <dc:date>2019-07-31T21:13:39Z</dc:date>
    </item>
    <item>
      <title>Re: Webex issues consistent through ASA firewalls</title>
      <link>https://community.cisco.com/t5/network-security/webex-issues-consistent-through-asa-firewalls/m-p/3901918#M5767</link>
      <description>&lt;P&gt;Sorry, my bad, wrong file.&lt;/P&gt;&lt;P&gt;Here is the config file attached.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Aug 2019 09:48:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/webex-issues-consistent-through-asa-firewalls/m-p/3901918#M5767</guid>
      <dc:creator>aleksa</dc:creator>
      <dc:date>2019-08-02T09:48:11Z</dc:date>
    </item>
    <item>
      <title>Re: Webex issues consistent through ASA firewalls</title>
      <link>https://community.cisco.com/t5/network-security/webex-issues-consistent-through-asa-firewalls/m-p/3902533#M5768</link>
      <description>&lt;P&gt;Flag X indicates that the flow is handled by Firepower module so you should check it. If no clues, try excluding this port from the service module inspection ACL.&lt;/P&gt;</description>
      <pubDate>Sat, 03 Aug 2019 19:50:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/webex-issues-consistent-through-asa-firewalls/m-p/3902533#M5768</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2019-08-03T19:50:26Z</dc:date>
    </item>
    <item>
      <title>Re: Webex issues consistent through ASA firewalls</title>
      <link>https://community.cisco.com/t5/network-security/webex-issues-consistent-through-asa-firewalls/m-p/3905634#M5769</link>
      <description>&lt;P&gt;Thanks Peter,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've excluded Webex traffic from FirePower inspection, yet the problems remained.&lt;/P&gt;&lt;P&gt;I did packet-trace command on typical Webex connection and confirmed it wasn't sent to IPS policy for inspection...&lt;/P&gt;&lt;P&gt;Any more ideas? Do you think there's much difference in using implicit allow (for traffic initiated from higher security level to lower) and explicitly defining Webex traffic (Network Objects - Webex URL-s and public IP-s, as well as UDP/TCP ports)?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Alex&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Aug 2019 21:38:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/webex-issues-consistent-through-asa-firewalls/m-p/3905634#M5769</guid>
      <dc:creator>aleksa</dc:creator>
      <dc:date>2019-08-08T21:38:41Z</dc:date>
    </item>
  </channel>
</rss>

