<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Problem on acl filter trafic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/problem-on-acl-filter-trafic/m-p/1450008#M614919</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Didier,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It appears that some existing NAT configuration is preventing the xlate from being created (likely by a NAT reverse path check). You should go through the NAT configuration ('show run nat', 'show run global', and 'show run static') between the interfaces in question to make sure bi-directional connectivity is allowed. I would also suggest checking the relative security levels with 'show nameif' command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Andrew&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 12 Aug 2010 16:28:53 GMT</pubDate>
    <dc:creator>Andrew Ossipov</dc:creator>
    <dc:date>2010-08-12T16:28:53Z</dc:date>
    <item>
      <title>Problem on acl filter trafic</title>
      <link>https://community.cisco.com/t5/network-security/problem-on-acl-filter-trafic/m-p/1450003#M614914</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a problem with rule of FWSM.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message log :&lt;/P&gt;&lt;P class="MsoPlainText" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-family: Consolas;"&gt;Aug&lt;SPAN style="mso-spacerun: yes;"&gt;&amp;nbsp; &lt;/SPAN&gt;3 16:38:57 PIX-Part Aug 03 2010 16:38:57: %FWSM-3-106010: Deny &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoPlainText" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-family: Consolas;"&gt;&amp;gt; inbound tcp src filiales:10.113.248.17/4144 dst&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoPlainText" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-family: Consolas;"&gt;&amp;gt; dmzpub-part:146.249.250.133/21&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoPlainText" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-family: Consolas;"&gt;&amp;gt; Aug&lt;SPAN style="mso-spacerun: yes;"&gt;&amp;nbsp; &lt;/SPAN&gt;3 16:39:00 PIX-Part Aug 03 2010 16:39:00: %FWSM-3-106010: Deny &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoPlainText" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-family: Consolas;"&gt;&amp;gt; inbound tcp src filiales:10.113.248.17/4144 dst&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoPlainText" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-family: Consolas;"&gt;&amp;gt; dmzpub-part:146.249.250.133/21&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoPlainText" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-family: Consolas;"&gt;&amp;gt; Aug&lt;SPAN style="mso-spacerun: yes;"&gt;&amp;nbsp; &lt;/SPAN&gt;3 16:39:06 PIX-Part Aug 03 2010 16:39:06: %FWSM-3-106010: Deny &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoPlainText" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-family: Consolas;"&gt;&amp;gt; inbound tcp src filiales:10.113.248.17/4144 dst&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoPlainText" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-family: Consolas;"&gt;&amp;gt; dmzpub-part:146.249.250.133/21&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The rule is :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoPlainText" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-family: Consolas;"&gt;access-list filiales_access_in extended permit tcp 10.113.248.16 &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoPlainText" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-family: Consolas;"&gt;&amp;gt; 255.255.255.240 host 146.249.250.133 object-group S_FTP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yet the access-list capture match well the traffic:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoPlainText" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-family: Consolas;"&gt;fw-tiers# sh access-list cap_MDA&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoPlainText" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-family: Consolas;"&gt;&amp;gt; access-list cap_MDA; 2 elements&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoPlainText" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-family: Consolas;"&gt;&amp;gt; access-list cap_MDA line 1 extended permit ip 10.113.248.16 &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoPlainText" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-family: Consolas;"&gt;&amp;gt; 255.255.255.240 host 146.249.250.133 (hitcnt=12) 0x2fe4c3b1 &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoPlainText" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-family: Consolas;"&gt;&amp;gt; access-list cap_MDA line 2 extended permit ip host 146.249.250.133&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoPlainText" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-family: Consolas;"&gt;&amp;gt; 10.113.248.16 255.255.255.240 (hitcnt=0) 0x67ee5327&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But not those that used to filter the traffic :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoPlainText" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-family: Consolas;"&gt;sh access-list filiales_access_in | inc 10.113.248.16 access-list &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoPlainText" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-family: Consolas;"&gt;&amp;gt; filiales_access_in line 2 extended permit tcp&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoPlainText" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-family: Consolas;"&gt;&amp;gt; 10.113.248.16 255.255.255.240 host 146.249.250.133 object-group S_FTP &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoPlainText" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-family: Consolas;"&gt;&amp;gt; 0x7188a1ec access-list filiales_access_in line 2 extended permit tcp&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoPlainText" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-family: Consolas;"&gt;&amp;gt; 10.113.248.16 255.255.255.240 host 146.249.250.133 eq ftp (hitcnt=0)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoPlainText" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-family: Consolas;"&gt;&amp;gt; 0xdc2693b4&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoPlainText" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-family: Consolas;"&gt;&amp;gt; access-list filiales_access_in line 2 extended permit tcp&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoPlainText" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-family: Consolas;"&gt;&amp;gt; 10.113.248.16 255.255.255.240 host 146.249.250.133 eq ftp-data&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoPlainText" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="color: #000000; font-family: Consolas;"&gt;&amp;gt; (hitcnt=0) 0x33118715&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have tried to disable FTP inspection without succès.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The version of FWSM is&lt;/P&gt;&lt;P&gt;FWSM Firewall Version 4.0(5) &lt;BR /&gt;Device Manager Version 6.1(3)F&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:23:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-on-acl-filter-trafic/m-p/1450003#M614914</guid>
      <dc:creator>Didier DRIEUX</dc:creator>
      <dc:date>2019-03-11T18:23:11Z</dc:date>
    </item>
    <item>
      <title>Re: Problem on acl filter trafic</title>
      <link>https://community.cisco.com/t5/network-security/problem-on-acl-filter-trafic/m-p/1450004#M614915</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you check the output of 'show run access-group' to ensure that the ACL is applied to the correct interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Aug 2010 13:15:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-on-acl-filter-trafic/m-p/1450004#M614915</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2010-08-10T13:15:45Z</dc:date>
    </item>
    <item>
      <title>Re: Problem on acl filter trafic</title>
      <link>https://community.cisco.com/t5/network-security/problem-on-acl-filter-trafic/m-p/1450005#M614916</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;Hello Didier,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;This looks like a NAT issue rather than an ACL deny. Please ensure that the NAT configuration is properly mapping &lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;&lt;SPAN style="color: #000000; font-family: Consolas;"&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; "&gt;146.249.250.133 from&lt;/SPAN&gt;'&lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-family: Consolas;"&gt;&lt;SPAN style="font-family: andale mono,times;"&gt;dmzpub-part'&lt;/SPAN&gt; &lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;to &lt;/SPAN&gt;'&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-family: Consolas;"&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;filiales' and/or NAT Control is turned off&lt;/SPAN&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;Andrew&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Aug 2010 18:44:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-on-acl-filter-trafic/m-p/1450005#M614916</guid>
      <dc:creator>Andrew Ossipov</dc:creator>
      <dc:date>2010-08-10T18:44:59Z</dc:date>
    </item>
    <item>
      <title>Re: Problem on acl filter trafic</title>
      <link>https://community.cisco.com/t5/network-security/problem-on-acl-filter-trafic/m-p/1450006#M614917</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See on attachement the result of the command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Aug 2010 10:17:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-on-acl-filter-trafic/m-p/1450006#M614917</guid>
      <dc:creator>Didier DRIEUX</dc:creator>
      <dc:date>2010-08-12T10:17:05Z</dc:date>
    </item>
    <item>
      <title>Re: Problem on acl filter trafic</title>
      <link>https://community.cisco.com/t5/network-security/problem-on-acl-filter-trafic/m-p/1450007#M614918</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Andrew,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "nat-control" command is not present on the configuration. It has been disabled a few weeks ago to allow traffic to pass without NAT.&lt;/P&gt;&lt;P&gt;Is it necessary to recreate a rule of NAT ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Aug 2010 12:39:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-on-acl-filter-trafic/m-p/1450007#M614918</guid>
      <dc:creator>Didier DRIEUX</dc:creator>
      <dc:date>2010-08-12T12:39:52Z</dc:date>
    </item>
    <item>
      <title>Re: Problem on acl filter trafic</title>
      <link>https://community.cisco.com/t5/network-security/problem-on-acl-filter-trafic/m-p/1450008#M614919</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Didier,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It appears that some existing NAT configuration is preventing the xlate from being created (likely by a NAT reverse path check). You should go through the NAT configuration ('show run nat', 'show run global', and 'show run static') between the interfaces in question to make sure bi-directional connectivity is allowed. I would also suggest checking the relative security levels with 'show nameif' command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Andrew&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Aug 2010 16:28:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-on-acl-filter-trafic/m-p/1450008#M614919</guid>
      <dc:creator>Andrew Ossipov</dc:creator>
      <dc:date>2010-08-12T16:28:53Z</dc:date>
    </item>
    <item>
      <title>Re: Problem on acl filter trafic</title>
      <link>https://community.cisco.com/t5/network-security/problem-on-acl-filter-trafic/m-p/1450009#M614920</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem has been resolved. It' was a NAT Configuration problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Didier&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Sep 2010 15:46:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-on-acl-filter-trafic/m-p/1450009#M614920</guid>
      <dc:creator>Didier DRIEUX</dc:creator>
      <dc:date>2010-09-01T15:46:43Z</dc:date>
    </item>
  </channel>
</rss>

