<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Drop with Packet Capture?help in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618957#M592743</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Paul&lt;/P&gt;&lt;P&gt;Is the 100.100.100.100 on the inside network? or on the outside?&lt;/P&gt;&lt;P&gt;the SIP Server is 100.100.100.100 in H.Q other site&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My Site asa's&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; inside lan&lt;/P&gt;&lt;P&gt;172.16.3.0&lt;/P&gt;&lt;P&gt;outside&lt;/P&gt;&lt;P&gt;50.50.50.50&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 04 Feb 2011 17:38:20 GMT</pubDate>
    <dc:creator>Ibrahim Jamil</dc:creator>
    <dc:date>2011-02-04T17:38:20Z</dc:date>
    <item>
      <title>Drop with Packet Capture?help</title>
      <link>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618920#M592706</link>
      <description>&lt;P&gt;Hi Folks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;how to start troubleshoot the Below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the user source address 172.16.3.2 (Behind ASA-1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the destination SIP Server: 10.100.100.100 (Behind ASA-2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input outside udp 172.16.3.2 4263&amp;nbsp; 10.100.100.100 sip&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: DMZ&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: DMZ&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;!-- [DocumentBodyEnd:703e230d-ad41-441f-8b45-41d0ff17a628] --&gt;&lt;!-- BEGIN attachments --&gt;&lt;/P&gt;&lt;P&gt;&lt;!-- END attachments --&gt;&lt;!-- )--&gt;&lt;/P&gt;&lt;P&gt;&lt;!-- BEGIN helpful &amp;amp; correct buttons --&gt;&lt;!-- END helpful &amp;amp; correct buttons --&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:44:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618920#M592706</guid>
      <dc:creator>Ibrahim Jamil</dc:creator>
      <dc:date>2019-03-11T19:44:23Z</dc:date>
    </item>
    <item>
      <title>Re: Drop with Packet Capture?help</title>
      <link>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618921#M592707</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;ibrahim.jamil wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi Folks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;how to start troubleshoot the Below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the user source address 172.16.3.2 (Behind ASA-1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the destination SIP Server: 10.100.100.100 (Behind ASA-2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input outside udp 172.16.3.2 4263&amp;nbsp; 10.100.100.100 sip&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;/SPAN&gt;&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: DMZ&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: DMZ&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Look at you access lists. normally packet-tracer will write the acl-statement which is blocking the connection&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rgds,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MiKa&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Feb 2011 16:58:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618921#M592707</guid>
      <dc:creator>m.kafka</dc:creator>
      <dc:date>2011-02-03T16:58:52Z</dc:date>
    </item>
    <item>
      <title>Re: Drop with Packet Capture?help</title>
      <link>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618922#M592708</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;on witch asa should i check ASA-1 or ASA-2&lt;SPAN style="background-color: #f8fafd;"&gt; ? on asa-1 i have an access-list permit ip any any,pls tell where?&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Feb 2011 17:04:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618922#M592708</guid>
      <dc:creator>Ibrahim Jamil</dc:creator>
      <dc:date>2011-02-03T17:04:08Z</dc:date>
    </item>
    <item>
      <title>Re: Drop with Packet Capture?help</title>
      <link>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618923#M592709</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;on the asa where you did the packe-trace&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then repeat on the other asa (packet-tracer and acl-verification)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Feb 2011 17:20:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618923#M592709</guid>
      <dc:creator>m.kafka</dc:creator>
      <dc:date>2011-02-03T17:20:10Z</dc:date>
    </item>
    <item>
      <title>Re: Drop with Packet Capture?help</title>
      <link>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618924#M592710</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dude,on the asa where i did packet-trace there is an access-list that match all traffic permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list cached ACL log flows: total 0, denied 0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Feb 2011 17:26:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618924#M592710</guid>
      <dc:creator>Ibrahim Jamil</dc:creator>
      <dc:date>2011-02-03T17:26:41Z</dc:date>
    </item>
    <item>
      <title>Re: Drop with Packet Capture?help</title>
      <link>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618925#M592711</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ibrahim,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then its somewhere else, the packet-tracer output "denied by implicit rule" doesn't neccessaryly point to the implicit "deny any" of the acl, it was just so tempting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have seen this message pointing to following problems:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Interfaces having the same security level without "same-security-traffic permit..."&lt;/LI&gt;&lt;LI&gt;NAT issues, I don't see an phase for NAT ont your packet-tracer output&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what does the show xlate detail and show conn detail tell you for 172.16.3.2?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;maybe you should post a sanitized sh run (obfuscate public IPs, keys and passwords, even the encrypted)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rgds,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MiKa&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Feb 2011 17:51:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618925#M592711</guid>
      <dc:creator>m.kafka</dc:creator>
      <dc:date>2011-02-03T17:51:20Z</dc:date>
    </item>
    <item>
      <title>Re: Drop with Packet Capture?help</title>
      <link>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618926#M592712</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;What do mean below?&lt;/P&gt;&lt;OL start="1"&gt;&lt;LI&gt;NAT issues, I don't see an phase for NAT ont your packet-tracer output&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;sh xlate&lt;/P&gt;&lt;OL start="1"&gt;&lt;LI&gt;Global 50.50.50.10 Local 172.16.3.2&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Feb 2011 17:56:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618926#M592712</guid>
      <dc:creator>Ibrahim Jamil</dc:creator>
      <dc:date>2011-02-03T17:56:24Z</dc:date>
    </item>
    <item>
      <title>Re: Drop with Packet Capture?help</title>
      <link>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618927#M592713</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ibrahim,&lt;/P&gt;&lt;P&gt;So, the topology is like this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;host(172.16.3.2)-- (in)ASA-1(out)----(out)ASA2(in)---SIP server (100.100.100.100)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, pls. verify the following:&lt;/P&gt;&lt;P&gt;On ASA1:&lt;/P&gt;&lt;P&gt;1. Do you have a route for 100.100.100.x pointing to ASA2?&lt;/P&gt;&lt;P&gt;2. What translation are you using for this host 172.16.3.2?&lt;/P&gt;&lt;P&gt;3. what do the syslogs show on ASA when it fails?&lt;/P&gt;&lt;P&gt;5. Do you have SIP inspection enabled?&lt;/P&gt;&lt;P&gt;6. Is 100.100.100.100 the mapped IP of the SIP server behind ASA2?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On ASA2:&lt;/P&gt;&lt;P&gt;1. what do the syslogs show when the connection fails?&lt;/P&gt;&lt;P&gt;2. What kind of translation is the SIP server IP configured to use on ASA2. It has to be static if you will be trying to reach it from the outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable logging and post the output:&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging buffered 7&lt;/P&gt;&lt;P&gt;sh logg | i x.x.x.x&lt;/P&gt;&lt;P&gt;where x.x.x.x is 172.16.3.2 on ASA1 and 100.100.100.100 on ASA2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Feb 2011 18:14:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618927#M592713</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2011-02-03T18:14:22Z</dc:date>
    </item>
    <item>
      <title>Re: Drop with Packet Capture?help</title>
      <link>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618928#M592714</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;OL start="1"&gt;&lt;LI&gt;'yeah i can ping 100.100.100.100 form asa-1&lt;/LI&gt;&lt;LI&gt;Global 50.50.50.10 Local 172.16.3.2&lt;/LI&gt;&lt;LI&gt;Teardown TCP connection 2687341 for outside:100.100.100.100/4443 to inside:172.16.3.2/3128 duration 0:00:00 bytes 0 TCP Reset-O&lt;/LI&gt;&lt;LI&gt;SIP is enable under policy&lt;/LI&gt;&lt;LI&gt;no mapping&lt;/LI&gt;&lt;LI&gt;BTH the coonection betweeen two sites r MPLS &lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pls Help&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Feb 2011 18:38:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618928#M592714</guid>
      <dc:creator>Ibrahim Jamil</dc:creator>
      <dc:date>2011-02-03T18:38:10Z</dc:date>
    </item>
    <item>
      <title>Re: Drop with Packet Capture?help</title>
      <link>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618929#M592715</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Reset-O means the reset came from the lower security interface.&lt;/P&gt;&lt;P&gt;We need captures to see which mac address is responsible for the reset.&lt;/P&gt;&lt;P&gt;It would be better to gather the capture on the ingress and egress interface of ASA-2.&lt;/P&gt;&lt;P&gt;It would be better to open a TAC case as we will need simultaneous captures ingress and egress on both ASAs as well as gather the debug level syslogs from both the ASAs during the problem to figure out where the reset is coming from.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Feb 2011 22:45:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618929#M592715</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2011-02-03T22:45:40Z</dc:date>
    </item>
    <item>
      <title>Re: Drop with Packet Capture?help</title>
      <link>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618930#M592716</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sankar!&lt;/P&gt;&lt;P&gt;might the AIP-SSM sensor block traffic? if so how to check that?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Feb 2011 08:41:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618930#M592716</guid>
      <dc:creator>Ibrahim Jamil</dc:creator>
      <dc:date>2011-02-04T08:41:01Z</dc:date>
    </item>
    <item>
      <title>Re: Drop with Packet Capture?help</title>
      <link>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618931#M592717</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can certainly try to remove the IPS module from the policy-map from ASA2 and try the flow. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Feb 2011 09:10:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618931#M592717</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2011-02-04T09:10:27Z</dc:date>
    </item>
    <item>
      <title>Re: Drop with Packet Capture?help</title>
      <link>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618932#M592718</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sankar&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I realy Appreciate ur Help and ur Professional Support; how can i check that from the IPS module itself?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so to remove the IPS from the policy-map&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so i need the below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;no class ips-module&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Feb 2011 09:25:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618932#M592718</guid>
      <dc:creator>Ibrahim Jamil</dc:creator>
      <dc:date>2011-02-04T09:25:07Z</dc:date>
    </item>
    <item>
      <title>Re: Drop with Packet Capture?help</title>
      <link>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618933#M592719</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sunkar&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PLs chexk the below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5510# sh logg | in 10.0.4.25&lt;BR /&gt;%ASA-7-609001: Built local-host outside:100.100.100.100&lt;BR /&gt;%ASA-6-302013: Built outbound TCP connection 2697766 for outside:100.100.100.100/4443 (100.100.100.100/4443) to inside:172.16.3.2/3602 (50.50.50.10/3602)&lt;BR /&gt;%ASA-6-302014: Teardown TCP connection 2697766 for outside:100.100.100.100/4443 to inside:172.16.3.2/3602 duration 0:00:00 bytes 0 TCP Reset-O&lt;BR /&gt;%ASA-7-609002: Teardown local-host outside 100.100.100.100 duration 0:00:00&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Feb 2011 10:29:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618933#M592719</guid>
      <dc:creator>Ibrahim Jamil</dc:creator>
      <dc:date>2011-02-04T10:29:53Z</dc:date>
    </item>
    <item>
      <title>Re: Drop with Packet Capture?help</title>
      <link>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618934#M592720</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ibrahim,&lt;/P&gt;&lt;P&gt;Pls. enable logging timestamp.&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will give you a time stamp of when these syslogs are getting printed.&lt;/P&gt;&lt;P&gt;Now, I see that it is immediately getting torn down and there is no bytes passed "duration 0:00:00 bytes 0".&lt;/P&gt;&lt;P&gt;So, this may very well be reset by the IPS module&lt;/P&gt;&lt;P&gt;Why don't you exempt this traffic from being scanned by the module?&lt;/P&gt;&lt;P&gt; You can do this via MPF. As to how to check this in the IPS GUI, you should be able to see these event under the monitoring tab in the IDM GUI.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Feb 2011 11:09:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618934#M592720</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2011-02-04T11:09:11Z</dc:date>
    </item>
    <item>
      <title>Re: Drop with Packet Capture?help</title>
      <link>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618935#M592721</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sankar, r u sure its bolcked by IPS module? if so Pls How to exempt this traffic from being scanned by the ips module,ps help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this is my ACL regarding AIP-SSM&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list AIP-SSM&amp;nbsp; extended permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;btw sanker I learnt too much from this conversation,Thank you&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Feb 2011 14:44:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618935#M592721</guid>
      <dc:creator>Ibrahim Jamil</dc:creator>
      <dc:date>2011-02-04T14:44:01Z</dc:date>
    </item>
    <item>
      <title>Re: Drop with Packet Capture?help</title>
      <link>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618936#M592722</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is that ACL applied to an interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IF you could share the config that will help a lot.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Feb 2011 14:49:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618936#M592722</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-04T14:49:43Z</dc:date>
    </item>
    <item>
      <title>Re: Drop with Packet Capture?help</title>
      <link>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618937#M592723</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ibrahim,&lt;/P&gt;&lt;P&gt;You can add a deny line 1 for the flow in question and then test.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list AIP-SSM line 1 deny ip host x.x.x.x host y.y.y.y&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Feb 2011 15:00:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618937#M592723</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2011-02-04T15:00:05Z</dc:date>
    </item>
    <item>
      <title>Re: Drop with Packet Capture?help</title>
      <link>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618938#M592724</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sankar&lt;/P&gt;&lt;P&gt;see the below&lt;/P&gt;&lt;P&gt;Feb 04 2011 07:53:29: %ASA-2-106006: Deny inbound UDP from 172.16.3.2/5060 to 100.100.100.100/5060 on interface outside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Feb 2011 15:10:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618938#M592724</guid>
      <dc:creator>Ibrahim Jamil</dc:creator>
      <dc:date>2011-02-04T15:10:23Z</dc:date>
    </item>
    <item>
      <title>Re: Drop with Packet Capture?help</title>
      <link>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618939#M592725</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;that deny message says that it is being denied on the interface so that means that the ACL you mentioned is not applied on the interface coming in.You should allow the traffic on the interface otherwise the traffic will continue showing as denied on the packet-tracer.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Feb 2011 15:32:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-with-packet-capture-help/m-p/1618939#M592725</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-04T15:32:13Z</dc:date>
    </item>
  </channel>
</rss>

