<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5505 - *ALL* Outside Traffic In in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628313#M594127</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Traffic from Branch to HQ is not the problem - I have NAT under control.&amp;nbsp; How can I "disable" "filtering" of traffic coming from HQ to Branch?&amp;nbsp; It all needs to pass untouched and without having to configure statics and inbound ACL (although I already have one which didn't help).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nameif inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; security-level 100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; ip address 10.30.20.2 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nameif outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; security-level 100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; ip address 10.30.8.2 255.255.255.0&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;same-security-traffic permit inter-interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;access-list &lt;STRONG&gt;outin &lt;/STRONG&gt;extended permit &lt;STRONG&gt;ip any any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;access-group &lt;STRONG&gt;outin &lt;/STRONG&gt;in interface outside&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic coming from HQ to Branch is still filtered.&amp;nbsp; &lt;STRONG&gt;Short of setting up a site-to-site VPN or using 'firewall transparent' what can be done to allow HQ-to-Branch traffic to pass the 5505 untouched?&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 15 Jan 2011 05:32:00 GMT</pubDate>
    <dc:creator>jdlampard</dc:creator>
    <dc:date>2011-01-15T05:32:00Z</dc:date>
    <item>
      <title>ASA 5505 - *ALL* Outside Traffic In</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628305#M594119</link>
      <description>&lt;P&gt;At a branch MPLS site I have an ASA 5505 (Security Plus license and provides DHCP) with about a dozen devices behind it (PCs, phones, and a network printer).&amp;nbsp; The MPLS is the only connection outside of the office until it is replaced with a dedicated Internet and site-to-site VPN connection in a couple months.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need all traffic from the main office to flow through the ASA (without statics) to the branch systems and I don't want outbound traffic translated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I removed the NAT and global and thought/hoped simply changing vlan2 (outside) security-level to 100 would complete the objectives.&amp;nbsp; No luck.&amp;nbsp; I added same-security-traffic permit inter-interface - again, no luck.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way to achieve the goal other than using firewall transparent (it's remote and from what I understand once changed I'll lose access to it and it would have to be changed back when MPLS is replaced with Internet).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only option I see is to set up site-to-site VPN across MPLS.&amp;nbsp; Hopefully I'm missing something and there's a better/easy way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;JD&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:35:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628305#M594119</guid>
      <dc:creator>jdlampard</dc:creator>
      <dc:date>2019-03-11T19:35:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 - All *ALL* Outside Traffic In</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628306#M594120</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Don't quite understand your topology, can you pls share a topology diagram?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From what i understand, branch office and main office is connected via MPLS, and internet is also via MPLS. You have ASA at the branch office and would like to route traffic from the main office destined to the internet towards the branch office. However, if internet is also via the MPLS, traffic from the main office will never be routed towards the branch office because it will go straight out directly via the MPLS if the internet connection is routed via the MPLS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unless if i understand your topology incorrectly, you won't be able to force internet traffic from main office towards branch office if they are all using the same MPLS to route to each other. The only option as you said would be to set up site-to-site vpn.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Jan 2011 04:36:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628306#M594120</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-15T04:36:37Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 - *ALL* Outside Traffic In</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628307#M594121</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;5505&amp;nbsp; --&amp;nbsp; ISP-managed MPLS router&amp;nbsp; --&amp;nbsp; MPLS cloud&amp;nbsp; --&amp;nbsp; ISP-managed MPLS router&amp;nbsp; --&amp;nbsp; HQ Firewall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I simply need any traffic originating in HQ and destined for systems behind the Remote 5505 to pass thorugh the 5505 without any firewalling on the 5505... like it's a switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA is running Version 8.2(1).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Jan 2011 04:42:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628307#M594121</guid>
      <dc:creator>jdlampard</dc:creator>
      <dc:date>2011-01-15T04:42:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 - *ALL* Outside Traffic In</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628308#M594122</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Seems my previous, incomplete, response will not update.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5505&amp;nbsp; --&amp;nbsp; ISP-managed MPLS router&amp;nbsp; --&amp;nbsp; MPLS cloud&amp;nbsp; -- ISP-managed MPLS router&amp;nbsp; -- HQ Firewall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need traffic originating from HQ and destined for the Branch systems behind the 5505 to pass unfiltered... like the firewall is a simply a switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA is running 8.2(1).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your efforts!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Jan 2011 05:02:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628308#M594122</guid>
      <dc:creator>jdlampard</dc:creator>
      <dc:date>2011-01-15T05:02:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 - All *ALL* Outside Traffic In</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628309#M594123</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, so the internet connection is at HQ, and for your branch office to access the Internet, it will be routed via the MPLS towards the HQ, and out to the Internet via the HQ internet connection?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your statement: "I need all traffic from the main office to flow through the ASA (without&amp;nbsp; statics) to the branch systems and I don't want outbound traffic&amp;nbsp; translated."&lt;/P&gt;&lt;P&gt;--&amp;gt; do you mean, you would like traffic from branch office to flow through the ASA (without statics) to the main office, since the Internet connection is at the HQ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If that is correct, assuming that you have inside (security level 100) and outside (security level 0) interface on your ASA at the branch office, then you can configure the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat permit ip any any&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then "clear xlate", and traffic should not be translated from branch office towards the main office.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Jan 2011 05:03:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628309#M594123</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-15T05:03:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 - *ALL* Outside Traffic In</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628310#M594124</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yup, that NAT exemption statement should do:&lt;/P&gt;&lt;P&gt;access-list nonat permit ip any any&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And to initiate traffic from low security level (outside), ie: HQ, towards high security level (inside), branch LAN, you would need to configure ACL to permit the traffic, and apply that on the outside interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Jan 2011 05:07:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628310#M594124</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-15T05:07:42Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 - *ALL* Outside Traffic In</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628311#M594125</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the replies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Forget about the Internet.&amp;nbsp; Simply put.&amp;nbsp; All systems in HQ needing to communicate with Branch systems behind the 5505 should not be filtered by the 5505.&amp;nbsp; As it is right now, I would have to set up statics and an ACL for the outside interface on the 5505 which is no good.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, in my original post I indicated having removed the nat and global statements, set security-level on vlan2 (5505's outside) to 100 (same as 5505's vlan1 - insdie), and enabled same-security-traffic permit inter-interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Jan 2011 05:14:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628311#M594125</guid>
      <dc:creator>jdlampard</dc:creator>
      <dc:date>2011-01-15T05:14:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 - *ALL* Outside Traffic In</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628312#M594126</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, if you don't want to configure any NAT statement nor ACL, then you would need to configure the following on the ASA:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Security level needs to be the same on both vlan 1 and vlan 2.&lt;/P&gt;&lt;P&gt;2) Configure: same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;3) Remove all the NAT and global statement as well as the static statements.&lt;/P&gt;&lt;P&gt;4) Configure: no nat-control&lt;/P&gt;&lt;P&gt;5) Remove access-list applied to any of the interfaces (especially the outside interface).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic will then flow freely in both direction with no translation as well no requirement to configure any access-list.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Jan 2011 05:18:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628312#M594126</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-15T05:18:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 - *ALL* Outside Traffic In</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628313#M594127</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Traffic from Branch to HQ is not the problem - I have NAT under control.&amp;nbsp; How can I "disable" "filtering" of traffic coming from HQ to Branch?&amp;nbsp; It all needs to pass untouched and without having to configure statics and inbound ACL (although I already have one which didn't help).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nameif inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; security-level 100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; ip address 10.30.20.2 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nameif outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; security-level 100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; ip address 10.30.8.2 255.255.255.0&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;same-security-traffic permit inter-interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;access-list &lt;STRONG&gt;outin &lt;/STRONG&gt;extended permit &lt;STRONG&gt;ip any any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;access-group &lt;STRONG&gt;outin &lt;/STRONG&gt;in interface outside&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic coming from HQ to Branch is still filtered.&amp;nbsp; &lt;STRONG&gt;Short of setting up a site-to-site VPN or using 'firewall transparent' what can be done to allow HQ-to-Branch traffic to pass the 5505 untouched?&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Jan 2011 05:32:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628313#M594127</guid>
      <dc:creator>jdlampard</dc:creator>
      <dc:date>2011-01-15T05:32:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 - *ALL* Outside Traffic In</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628314#M594128</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Remove "access-group &lt;STRONG&gt;outin &lt;/STRONG&gt;in interface outside".&lt;/P&gt;&lt;P&gt;If you have same security level on both inside and outside, you don't need to apply any access-list.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Jan 2011 05:34:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628314#M594128</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-15T05:34:10Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 - *ALL* Outside Traffic In</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628315#M594129</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I only added the access-group when same-security-traffic permit inter-interface didn't work.&amp;nbsp; At your suggestion though I have&lt;/P&gt;&lt;P&gt;removed the access-group... still no love.&amp;nbsp; Verified security-levels are both 100 and that same-security-traffic is&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;inter&lt;/STRONG&gt; and not &lt;STRONG&gt;intra&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*scratching head*&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Jan 2011 05:45:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628315#M594129</guid>
      <dc:creator>jdlampard</dc:creator>
      <dc:date>2011-01-15T05:45:41Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 - *ALL* Outside Traffic In</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628316#M594130</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, when you say it didn't work, what do you mean? Where exactly is it failing? If you run packet capture on both outside and inside interface of the ASA, do you actually see the traffic from HQ towards branch?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Jan 2011 05:48:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628316#M594130</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-15T05:48:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 - *ALL* Outside Traffic In</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628317#M594131</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It didn't work = traffic originating from HQ destined to Brach systems (for example, web interface on a printer, RDP to a Windows box, ping to whatever) stops at the 5505.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the 5505...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet input outside tcp some_hq_ip some_port some_branch_ip some_other_port detailed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;...result is allowed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Jan 2011 05:56:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628317#M594131</guid>
      <dc:creator>jdlampard</dc:creator>
      <dc:date>2011-01-15T05:56:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 - *ALL* Outside Traffic In</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628318#M594132</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If packet tracer allows, it doesn't seem to be issue with the ASA configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share some logs that says it stops at the ASA? and also run packet capture on both outside and inside interface of the ASA. Need to confirm where exactly it's failing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assume that you are trying to access hosts in 10.30.20.0/24 subnet, and those hosts have default gateway configured to be 10.30.20.2?&lt;/P&gt;&lt;P&gt;Also, if there is any personal firewall, etc on the hosts, please disable it as it normally does not allow inbound connection from different subnets.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Jan 2011 06:03:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628318#M594132</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-15T06:03:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 - *ALL* Outside Traffic In</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628319#M594133</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, trying to communicate with 10.30.20.x hosts and their gateway is 10.30.20.2.&amp;nbsp; I can't easily sniff on either side of the 5505 (remote and no technical people at the site) but I can demonstrate clearly that this is a firewall issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Prior to the firewall being put in-line there was an unmanaged switch (failing which is one of two reasons the firewall was put in - the other being MPLS is going to be replaced at the remote site with broadband).&amp;nbsp; With the switch in place I could access anything I wanted from HQ to Remote... access web interface on print server (no personal firewall to interfere), RDP to all Windows machines (yes, firewall is enalbed but RDP and ICMP are allowed), I could ping anything, and 4-digit dialing on phone calls from HQ to Branch... take the failing switch out - put the firewall in - now no connectivity from HQ to Branch.&amp;nbsp; Again, statics and an ACL isn't acceptable.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I can't get this work then my only options are site-to-site VPN or 'firewall transparent' which I think presents other configuration challenges for me with it being remote.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A quick look in the 5505's log shows...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;%ASA-2-106001: Inbound TCP connection denied from 10.99.21.21/10001 to 10.30.20.20/80 flags SYN on interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.30.20.20 is the print server.&amp;nbsp; I don't know when the log entry appeared relative to the many changes I have made (other than the entry immediately above it shows me chaning outside's security-level to 100.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Jan 2011 06:22:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628319#M594133</guid>
      <dc:creator>jdlampard</dc:creator>
      <dc:date>2011-01-15T06:22:26Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 - *ALL* Outside Traffic In</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628320#M594134</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Error Message Decoder (support tool on site) didn't help with 106001 - I understand the problem but don't know how to fix it.&amp;nbsp; The tool suggested nothing needs to be done which is obviously wrong.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Jan 2011 06:26:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628320#M594134</guid>
      <dc:creator>jdlampard</dc:creator>
      <dc:date>2011-01-15T06:26:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 - *ALL* Outside Traffic In</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628321#M594135</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Depending on when the log error is, it is seeing traffic from the HQ (assuming 10.99.21.21 is your HQ host) towards your print server (10.30.20.20) on the inside interface, which is wrong. If traffic is coming from HQ, it should be seen on the outside interface.&lt;/P&gt;&lt;P&gt;So, yes, definitely a routing issue. How does traffic coming from outside appears on the inside interface? Traffic from the HQ should appear on the outside interface of the ASA, right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Defintely not configuration issue on the ASA. You would need to check hop by hop and make sure that the ASA has been correctly connected, ie: correct VLAN on the switch, etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can run packet capture on the ASA itself, and that can be performed remotely.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the ASA, assuming that traffic is coming from 10.99.21.0/24 subnet towards 10.30.20.0/24 subnet:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list cap permit ip 10.99.21.0 255.255.255.0 10.30.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list cap permit ip 10.30.20.0 255.255.255.0 10.99.21.0 255.255.255.0&lt;/P&gt;&lt;P&gt;cap cap-out access-list cap interface outside&lt;/P&gt;&lt;P&gt;cap cap-in access-list cap interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then send the traffic across, then share the output of the packet capture:&lt;/P&gt;&lt;P&gt;show cap cap-out&lt;/P&gt;&lt;P&gt;show cap cap-in&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Jan 2011 06:39:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628321#M594135</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-15T06:39:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 - *ALL* Outside Traffic In</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628322#M594136</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Set up capture...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list cap line 1 extended permit ip 10.30.20.0 255.255.255.0 10.17.21.0 255.255.255.0 (hitcnt=0) 0xf179b88e&lt;BR /&gt;access-list cap line 2 extended permit ip 10.17.21.0 255.255.255.0 10.30.20.0 255.255.255.0 (hitcnt=0) 0x088dd972&lt;BR /&gt;access-list cap line 3 extended permit icmp any any (hitcnt=8) 0xc6bea65a&lt;/P&gt;&lt;P&gt;Note line 3 has hits and they will be shown later.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture cap-out type raw-data access-list cap interface outside [Capturing - 920 bytes]&lt;BR /&gt;capture cap-in type raw-data access-list cap interface inside [Capturing - 0 bytes]&lt;/P&gt;&lt;P&gt;cap-out...&lt;/P&gt;&lt;P&gt;8 packets captured&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 06:54:49.803821 802.1Q vlan#2 P0 10.99.14.2 &amp;gt; 10.30.8.2: icmp: echo request&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 06:54:49.804401 802.1Q vlan#2 P0 10.30.8.2 &amp;gt; 10.99.14.2: icmp: echo reply&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 07:07:19.468985 802.1Q vlan#2 P0 10.99.21.11 &amp;gt; 10.30.8.2: icmp: echo request&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 4: 07:07:19.469427 802.1Q vlan#2 P0 10.30.8.2 &amp;gt; 10.99.21.11: icmp: echo reply&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 5: 07:07:19.496266 802.1Q vlan#2 P0 10.99.21.11 &amp;gt; 10.30.8.2: icmp: echo request&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 6: 07:07:19.496556 802.1Q vlan#2 P0 10.30.8.2 &amp;gt; 10.99.21.11: icmp: echo reply&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 7: 07:07:19.523257 802.1Q vlan#2 P0 10.99.21.11 &amp;gt; 10.30.8.2: icmp: echo request&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 8: 07:07:19.523547 802.1Q vlan#2 P0 10.30.8.2 &amp;gt; 10.99.21.11: icmp: echo reply&lt;BR /&gt;8 packets shown&lt;/P&gt;&lt;P&gt;cap-in...&lt;/P&gt;&lt;P&gt;0 packet captured&lt;/P&gt;&lt;P&gt;0 packet shown&lt;/P&gt;&lt;P&gt;Some running-config...&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.30.20.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.30.8.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt; shutdown&lt;BR /&gt;...&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;access-group nonat in interface inside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 10.30.8.1 1&lt;/P&gt;&lt;P&gt;..&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is only one physical and logical path in/out of Remote and that &lt;STRONG&gt;is&lt;/STRONG&gt; through ethernet0/0 (outside, vlan2).&amp;nbsp; I am obviously SSHed to this interface to manage the device and can ping the firewall from various MPLS sites (10.99.0.0 is HQ - 14.2 is a firewall and 21.11 is a server) which appears in the capture.&amp;nbsp; What doesn't sppear in the capture is that I can't ping anything behind the 5505 at Remote.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The default route on 5505 is 10.30.8.1 - the provider-managed MPLS router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This isn't a routing issue - &lt;STRONG&gt;I can get to the firewall and *everything* worked with an unmanaged switch before replacing it with the firewall.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now for some more supporting info, this is from the 5505 to the printer server...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ping 10.30.20.20&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 10.30.20.20, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/10 ms&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh route&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;Gateway of last resort is 10.30.8.1 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.30.20.0 255.255.255.0 is directly connected, inside&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.30.8.0 255.255.255.0 is directly connected, outside&lt;BR /&gt;S*&amp;nbsp;&amp;nbsp; 0.0.0.0 0.0.0.0 [1/0] via 10.30.8.1, outside&lt;/P&gt;&lt;P&gt;Definately something with the firewall.&amp;nbsp; Again, if I need to do site-to-site VPN or firewall transparent that so be it, although the VPN seems like a heavy-handed band-aid and firewall transparent will be a huge nuisance.&amp;nbsp; Certainly there is a non-VPN, routed-mode solution.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One last look in the log praying for something of value and the best I could come up with is...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jan 15 2011 07:42:39: %ASA-6-302016: Teardown UDP connection 2917 for outside:139.78.133.139/123 to identity:10.30.8.2/65535 duration 0:02:01 bytes 48&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The firewall has NTP configured sourced from the Internet and it too works (although this is outbound which is not my problem but it highlights that from the firewall across MPLS and then to the Internet from 10.99 HQ site works).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have my log set as follows...&lt;/P&gt;&lt;P&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging buffered informational&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I appreciate you working with me on this!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Jan 2011 07:57:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628322#M594136</guid>
      <dc:creator>jdlampard</dc:creator>
      <dc:date>2011-01-15T07:57:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 - *ALL* Outside Traffic In</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628323#M594137</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your capture result is showing that you are actually pinging the ASA outside interface (10.30.8.2), so that would not help us in identifying the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pls kindly test the following:&lt;/P&gt;&lt;P&gt;1) Clear the capture - clear cap cap-out &amp;amp;&amp;amp; clear cap cap-in&lt;/P&gt;&lt;P&gt;2) Ping from HQ towards hosts in 10.30.20.0/24 network, eg: try to ping the print server and your XP machine&lt;/P&gt;&lt;P&gt;3) Browse to your print server on port 80 as tested earlier.&lt;/P&gt;&lt;P&gt;4) Then grab the output of "show cap cap-out" and "show cap cap-in"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I fail to understand how VPN will change anything base on the description provided so far.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Jan 2011 08:16:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628323#M594137</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-15T08:16:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 - *ALL* Outside Traffic In</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628324#M594138</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Cleared the captures and did the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Ping 5505 (10.30.8.2 - outside interface) from HQ host 10.99.21.11 - replies&lt;/P&gt;&lt;P&gt;2) Ping print server at Branch (10.30.20.20) from HQ host 10.99.21.11 - times out&lt;/P&gt;&lt;P&gt;3) Traceroute to 5505 (10.30.8.2 - outside interface) from HQ host 10.99.21.11 - completes&lt;/P&gt;&lt;P&gt;4) Traceroute to print server at Branch (10.30.20.20) from HQ host 10.99.21.11 - times out beginning at 5505&lt;/P&gt;&lt;P&gt;5) Telnet to print server port 9100 at Branch (10.30.20.20) from HQ host 10.99.21.11 - can't open connection&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;C:\Documents and Settings\jlampard&amp;gt;&lt;STRONG&gt;ping 10.30.8.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Pinging 10.30.8.2 with 32 bytes of data:&lt;/P&gt;&lt;P&gt;Reply from 10.30.8.2: bytes=32 time=26ms TTL=248&lt;BR /&gt;Reply from 10.30.8.2: bytes=32 time=26ms TTL=248&lt;BR /&gt;Reply from 10.30.8.2: bytes=32 time=26ms TTL=248&lt;BR /&gt;Reply from 10.30.8.2: bytes=32 time=26ms TTL=248&lt;/P&gt;&lt;P&gt;Ping statistics for 10.30.8.2:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),&lt;BR /&gt;Approximate round trip times in milli-seconds:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Minimum = 26ms, Maximum = 26ms, Average = 26ms&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;C:\Documents and Settings\jlampard&amp;gt;&lt;STRONG&gt;ping 10.30.20.20&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Pinging 10.30.20.20 with 32 bytes of data:&lt;/P&gt;&lt;P&gt;Request timed out.&lt;BR /&gt;Request timed out.&lt;BR /&gt;Request timed out.&lt;BR /&gt;Request timed out.&lt;/P&gt;&lt;P&gt;Ping statistics for 10.30.20.20:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packets: Sent = 4, Received = 0, Lost = 4 (100% loss),&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;C:\Documents and Settings\jlampard&amp;gt;&lt;STRONG&gt;tracert -d 10.30.8.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Tracing route to 10.30.8.2 over a maximum of 30 hops&lt;/P&gt;&lt;P&gt;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;1 ms&amp;nbsp; 10.99.14.3&lt;BR /&gt;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2 ms&amp;nbsp; 12.84.226.113&lt;BR /&gt;&amp;nbsp; 3&amp;nbsp;&amp;nbsp;&amp;nbsp; 31 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; 28 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; 28 ms&amp;nbsp; 12.122.100.202&lt;BR /&gt;&amp;nbsp; 4&amp;nbsp;&amp;nbsp;&amp;nbsp; 38 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; 28 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; 28 ms&amp;nbsp; 12.123.18.250&lt;BR /&gt;&amp;nbsp; 5&amp;nbsp;&amp;nbsp;&amp;nbsp; 28 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; 28 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; 28 ms&amp;nbsp; 12.122.31.90&lt;BR /&gt;&amp;nbsp; 6&amp;nbsp;&amp;nbsp;&amp;nbsp; 22 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; 22 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; 22 ms&amp;nbsp; 12.84.171.173&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp; 7&amp;nbsp;&amp;nbsp;&amp;nbsp; 26 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; 26 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; 26 ms&amp;nbsp; 12.84.171.174&lt;BR /&gt;&amp;nbsp; 8&amp;nbsp;&amp;nbsp;&amp;nbsp; 28 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; 27 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; 27 ms&amp;nbsp; 10.30.8.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Trace complete.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;C:\Documents and Settings\jlampard&amp;gt;&lt;STRONG&gt;tracert -d 10.30.20.20&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Tracing route to 10.30.20.20 over a maximum of 30 hops&lt;/P&gt;&lt;P&gt;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;1 ms&amp;nbsp; 10.99.14.3&lt;BR /&gt;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp; 12.84.226.113&lt;BR /&gt;&amp;nbsp; 3&amp;nbsp;&amp;nbsp;&amp;nbsp; 29 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; 28 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; 28 ms&amp;nbsp; 12.122.100.202&lt;BR /&gt;&amp;nbsp; 4&amp;nbsp;&amp;nbsp;&amp;nbsp; 29 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; 28 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; 29 ms&amp;nbsp; 12.123.18.250&lt;BR /&gt;&amp;nbsp; 5&amp;nbsp;&amp;nbsp;&amp;nbsp; 28 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; 28 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; 27 ms&amp;nbsp; 12.122.31.90&lt;BR /&gt;&amp;nbsp; 6&amp;nbsp;&amp;nbsp;&amp;nbsp; 22 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; 22 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; 22 ms&amp;nbsp; 12.84.171.173&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp; 7&amp;nbsp;&amp;nbsp;&amp;nbsp; 26 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; 26 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; 26 ms&amp;nbsp; 12.84.171.174&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp; 8&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Request timed out.&lt;BR /&gt;&amp;nbsp; 9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Request timed out.&lt;BR /&gt; 10&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Request timed out.&lt;BR /&gt; 11&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Request timed out.&lt;BR /&gt; 12&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Request timed out.&lt;BR /&gt; 13&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Request timed out.&lt;BR /&gt; 14&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Request timed out.&lt;BR /&gt; 15&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ^C&lt;/P&gt;&lt;P&gt;Note in the two traceroutes above hops seven are the ISP-managed MPLS router - all traffic is taking the same path to get to this point - these results show the breakdown is at the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;sh cap cap-out&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;14 packets captured&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 16:44:17.665050 802.1Q vlan#2 P0 10.99.21.11 &amp;gt; 10.30.8.2: icmp: echo request&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 16:44:17.665462 802.1Q vlan#2 P0 10.30.8.2 &amp;gt; 10.99.21.11: icmp: echo reply&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 16:44:18.669887 802.1Q vlan#2 P0 10.99.21.11 &amp;gt; 10.30.8.2: icmp: echo request&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 4: 16:44:18.670222 802.1Q vlan#2 P0 10.30.8.2 &amp;gt; 10.99.21.11: icmp: echo reply&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 5: 16:44:19.670070 802.1Q vlan#2 P0 10.99.21.11 &amp;gt; 10.30.8.2: icmp: echo request&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 6: 16:44:19.670451 802.1Q vlan#2 P0 10.30.8.2 &amp;gt; 10.99.21.11: icmp: echo reply&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 7: 16:44:20.669795 802.1Q vlan#2 P0 10.99.21.11 &amp;gt; 10.30.8.2: icmp: echo request&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 8: 16:44:20.670161 802.1Q vlan#2 P0 10.30.8.2 &amp;gt; 10.99.21.11: icmp: echo reply&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 9: 16:45:00.982538 802.1Q vlan#2 P0 10.99.21.11 &amp;gt; 10.30.8.2: icmp: echo request&lt;BR /&gt;&amp;nbsp; 10: 16:45:00.982966 802.1Q vlan#2 P0 10.30.8.2 &amp;gt; 10.99.21.11: icmp: echo reply&lt;BR /&gt;&amp;nbsp; 11: 16:45:01.010207 802.1Q vlan#2 P0 10.99.21.11 &amp;gt; 10.30.8.2: icmp: echo request&lt;BR /&gt;&amp;nbsp; 12: 16:45:01.010512 802.1Q vlan#2 P0 10.30.8.2 &amp;gt; 10.99.21.11: icmp: echo reply&lt;BR /&gt;&amp;nbsp; 13: 16:45:01.037595 802.1Q vlan#2 P0 10.99.21.11 &amp;gt; 10.30.8.2: icmp: echo request&lt;BR /&gt;&amp;nbsp; 14: 16:45:01.037946 802.1Q vlan#2 P0 10.30.8.2 &amp;gt; 10.99.21.11: icmp: echo reply&lt;BR /&gt;14 packets shown&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;sh cap cap-in&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;0 packet captured&lt;/P&gt;&lt;P&gt;0 packet shown&lt;/P&gt;&lt;P&gt;Complete log...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jan 15 2011 16:43:51: %ASA-5-111008: User 'enable_15' executed the 'clear capture cap-out' command.&lt;BR /&gt;Jan 15 2011 16:43:54: %ASA-5-111008: User 'enable_15' executed the 'clear capture cap-in' command.&lt;BR /&gt;Jan 15 2011 16:44:17: %ASA-6-302020: Built inbound ICMP connection for faddr 10.99.21.11/512 gaddr 10.30.8.2/0 laddr 10.30.8.2/0&lt;BR /&gt;Jan 15 2011 16:44:17: %ASA-6-302021: Teardown ICMP connection for faddr 10.99.21.11/512 gaddr 10.30.8.2/0 laddr 10.30.8.2/0&lt;BR /&gt;Jan 15 2011 16:44:18: %ASA-6-302020: Built inbound ICMP connection for faddr 10.99.21.11/512 gaddr 10.30.8.2/0 laddr 10.30.8.2/0&lt;BR /&gt;Jan 15 2011 16:44:18: %ASA-6-302021: Teardown ICMP connection for faddr 10.99.21.11/512 gaddr 10.30.8.2/0 laddr 10.30.8.2/0&lt;BR /&gt;Jan 15 2011 16:44:19: %ASA-6-302020: Built inbound ICMP connection for faddr 10.99.21.11/512 gaddr 10.30.8.2/0 laddr 10.30.8.2/0&lt;BR /&gt;Jan 15 2011 16:44:19: %ASA-6-302021: Teardown ICMP connection for faddr 10.99.21.11/512 gaddr 10.30.8.2/0 laddr 10.30.8.2/0&lt;BR /&gt;Jan 15 2011 16:44:20: %ASA-6-302020: Built inbound ICMP connection for faddr 10.99.21.11/512 gaddr 10.30.8.2/0 laddr 10.30.8.2/0&lt;BR /&gt;Jan 15 2011 16:44:20: %ASA-6-302021: Teardown ICMP connection for faddr 10.99.21.11/512 gaddr 10.30.8.2/0 laddr 10.30.8.2/0&lt;BR /&gt;Jan 15 2011 16:44:24: %ASA-6-302010: 1 in use, 132 most used&lt;BR /&gt;Jan 15 2011 16:45:00: %ASA-6-302020: Built inbound ICMP connection for faddr 10.99.21.11/512 gaddr 10.30.8.2/0 laddr 10.30.8.2/0&lt;BR /&gt;Jan 15 2011 16:45:00: %ASA-6-302021: Teardown ICMP connection for faddr 10.99.21.11/512 gaddr 10.30.8.2/0 laddr 10.30.8.2/0&lt;BR /&gt;Jan 15 2011 16:45:01: %ASA-6-302020: Built inbound ICMP connection for faddr 10.99.21.11/512 gaddr 10.30.8.2/0 laddr 10.30.8.2/0&lt;BR /&gt;Jan 15 2011 16:45:01: %ASA-6-302021: Teardown ICMP connection for faddr 10.99.21.11/512 gaddr 10.30.8.2/0 laddr 10.30.8.2/0&lt;BR /&gt;Jan 15 2011 16:45:01: %ASA-6-302020: Built inbound ICMP connection for faddr 10.99.21.11/512 gaddr 10.30.8.2/0 laddr 10.30.8.2/0&lt;BR /&gt;Jan 15 2011 16:45:01: %ASA-6-302021: Teardown ICMP connection for faddr 10.99.21.11/512 gaddr 10.30.8.2/0 laddr 10.30.8.2/0&lt;BR /&gt;Jan 15 2011 16:46:54: %ASA-6-302015: Built outbound UDP connection 3025 for outside:139.78.133.139/123 (139.78.133.139/123) to identity:10.30.8.2/65535 (10.30.8.2/65535)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How would a VPN help?&amp;nbsp; Well, it would bypass the 5505's outside interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Jan 2011 17:10:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-all-outside-traffic-in/m-p/1628324#M594138</guid>
      <dc:creator>jdlampard</dc:creator>
      <dc:date>2011-01-15T17:10:30Z</dc:date>
    </item>
  </channel>
</rss>

