<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA traffic issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-traffic-issue/m-p/1574274#M656582</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jose,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; One of the tests you mention is pinging ASA interfaces that are not facing you... For example, from a Server on the DMZ, the *only* interface IP of the ASA you can ping is the DMZ interface, this is by design. From hosts off the inside interface (the router or the PC's), the *only* interface IP of the ASA they can ping on the ASA is the inside interface. Traffic passing through the box is another story....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest checking the routing table on the router. Make sure it points to the ASA (172.17.21.250) as its default gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Magnus&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 12 Nov 2010 03:16:59 GMT</pubDate>
    <dc:creator>Magnus Mortensen</dc:creator>
    <dc:date>2010-11-12T03:16:59Z</dc:date>
    <item>
      <title>ASA traffic issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-traffic-issue/m-p/1574273#M656522</link>
      <description>&lt;P&gt;Hi, I'm working right now on a project implementing an ASA this way:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. One interface of the ASA (Eth0/0) is connected to a Server (PHD Server) and the IPs are: 192.168.4.1/24 for the ASA-if Eth0/0 and 192.168.4.2/24 for the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Another interface of the ASA (Eth0/1) is connected to a Layer-2 Switch (VLAN 1) the switch can´t be manageable. The switch, at the other hand, connects with a Router interface (Gi0/0). The IP addresses are 172.17.21.250/24 for the ASA-if Eth0/1 and 172.17.21.1/24 for the Router-if Gi0/0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. Finally, the router connects to the last network through the Gi0/1 interface to a Switch (or for lab purposes to a Single PC). The IP addresses are: 172.17.20.50/24 for the Router-if Gi0/1 and 172.17.20.33 or .18&amp;nbsp; or 112 to the PC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The PCs at the network 172.17.20.0/24 should have bidirectional communication with the Server at the network 192.168.4.0/24.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I configure all the interfaces at the ASA and at the Router and Switch.&lt;/P&gt;&lt;P&gt;The two ASA interfaces has the same security level (100) and the traffic between same security level interfaces is allowed.&lt;/P&gt;&lt;P&gt;All kind of traffic between the interfaces is permitted.&lt;/P&gt;&lt;P&gt;I created Static Routes at the ASA and at the Router to the remote networks knows each other.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can ping the ASA (192.168.4.1) from the Server (192.168.4.2) and&amp;nbsp; vice versa&lt;/P&gt;&lt;P&gt;I can ping the Router (172.17.21.1) from the ASA (172.17.21.250) and vice versa&lt;/P&gt;&lt;P&gt;I can ping the Router (172.17.20.50) from the PC (172.17.20.33;18 or 112) and vice versa&lt;/P&gt;&lt;P&gt;I can ping the ASA (172.17.21.250) from the PC (172.17.20.33;18 or 112) and vice versa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but when I try&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ping ASA (172.17.21.250) from server (192.168.4.2) it fails&lt;/P&gt;&lt;P&gt;ping Router (172.17.21.1) fromo server (192.168.4.2) it fails&lt;/P&gt;&lt;P&gt;ping ASA (192.168.4.1) from PC (172.17.20.33;18 or 112) it fails&lt;/P&gt;&lt;P&gt;ping server (192.168.4.2) form PC (172.17.20.33;18 or 112) it fails.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I connect a PC with the IP: 172.17.21.1/24 at the ASA interface Eth0/1 (instead of the switch or router) all the pings pass from the Server to the PC and from the PC to the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I try also with tftp protocol, but the same happens.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm attanching the ASA configuration in case someone could see anything I cannot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:08:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-traffic-issue/m-p/1574273#M656522</guid>
      <dc:creator>jose cortes</dc:creator>
      <dc:date>2019-03-11T19:08:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA traffic issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-traffic-issue/m-p/1574274#M656582</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jose,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; One of the tests you mention is pinging ASA interfaces that are not facing you... For example, from a Server on the DMZ, the *only* interface IP of the ASA you can ping is the DMZ interface, this is by design. From hosts off the inside interface (the router or the PC's), the *only* interface IP of the ASA they can ping on the ASA is the inside interface. Traffic passing through the box is another story....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest checking the routing table on the router. Make sure it points to the ASA (172.17.21.250) as its default gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Magnus&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Nov 2010 03:16:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-traffic-issue/m-p/1574274#M656582</guid>
      <dc:creator>Magnus Mortensen</dc:creator>
      <dc:date>2010-11-12T03:16:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASA traffic issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-traffic-issue/m-p/1574275#M656639</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inside .112 80------20.50Router 21.1-----.250 ASA 4.1----4.2Server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Saludos Jose !!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take a look at the information that I wrote.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ping ASA (172.17.21.250) from server (192.168.4.2) it fails&lt;BR /&gt;Default behavior&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ping Router (172.17.21.1) fromo server (192.168.4.2) it fails&lt;BR /&gt;Make sure default gateway is the ASA and that the router has the default gateway to the ASA or at &lt;BR /&gt;least a route telling him where 192.168.4.2 is&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ping ASA (192.168.4.1) from PC (172.17.20.33;18 or 112) it fails&lt;BR /&gt;Default Behavior&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ping server (192.168.4.2) form PC (172.17.20.33;18 or 112) it fails.&lt;BR /&gt;Route on the Router to tell him where 4.2 is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the default behavior ones, the explanation is on the link below, you cannot ping an interface of the firewall&lt;BR /&gt;besides the one that you are facing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"For security purposes the security appliance does not support far-end interface ping, that is pinging the IP address of the outside interface from the inside network"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Link&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa70/configuration/guide/trouble.html#wp1059645"&gt;http://www.cisco.com/en/US/docs/security/asa/asa70/configuration/guide/trouble.html#wp1059645&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Magnus!!! We are waiting for the New Podcast !!!!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Nov 2010 03:34:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-traffic-issue/m-p/1574275#M656639</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-11-12T03:34:11Z</dc:date>
    </item>
    <item>
      <title>Re: ASA traffic issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-traffic-issue/m-p/1574276#M656662</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the early answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I create an static route at the router ( ip route 192.168.4.0 255.255.255.0 172.17.21.250). At the other hand, I tried to do a TFTP transfer between the two PCs using TFTP32. And the transfer don´t even start. when I look at the ASDM debugging monitor there was no events related with the transfer, so I don't know if I have to turn some feature on or off.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Nov 2010 03:46:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-traffic-issue/m-p/1574276#M656662</guid>
      <dc:creator>jose cortes</dc:creator>
      <dc:date>2010-11-12T03:46:09Z</dc:date>
    </item>
    <item>
      <title>Re: ASA traffic issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-traffic-issue/m-p/1574277#M656702</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Lets make it the easy way then.. Do the following &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Packet-tracer input inside tcp 192.168.4.2 1025 172.17.20.112 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is going to tell me if the packet is allowed through the firewall coming from an inside host and going to the 192.168.4.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now to the same for the "return traffic"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input outside udp 172.17.20.112 1025 192.168.4.2 69&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will be waiting for the outputs..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Nov 2010 03:53:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-traffic-issue/m-p/1574277#M656702</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-11-12T03:53:01Z</dc:date>
    </item>
    <item>
      <title>Re: ASA traffic issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-traffic-issue/m-p/1574278#M656727</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Maykol,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;these are the prompts of the packet-tracer command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA-LAB# packet-tracer input LOCAL_PHD tcp 192.168.4.2 1025 172.17.20.33 http&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; RED-STMS&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; INTERNAL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group ECI-TO-PETRO in interface LOCAL_PHD&lt;/P&gt;&lt;P&gt;access-list ECI-TO-PETRO extended permit ip any any &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Result: ALLOW &lt;/P&gt;&lt;P&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Result: ALLOW &lt;/P&gt;&lt;P&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Result: ALLOW &lt;/P&gt;&lt;P&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 7, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;input-interface: LOCAL_PHD&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: INTERNAL&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;ASA-LAB# packet-tracer input INTERNAL udp 172.17.20.33 1034 192.168.4.2 tftp&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Phase: 1&lt;/DIV&gt;&lt;DIV&gt;Type: ACCESS-LIST&lt;/DIV&gt;&lt;DIV&gt;Subtype: &lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Implicit Rule&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;MAC Access list&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Phase: 2&lt;/DIV&gt;&lt;DIV&gt;Type: ROUTE-LOOKUP&lt;/DIV&gt;&lt;DIV&gt;Subtype: input&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;in&amp;nbsp;&amp;nbsp; 192.168.4.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; LOCAL_PHD&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Phase: 3&lt;/DIV&gt;&lt;DIV&gt;Type: ACCESS-LIST&lt;/DIV&gt;&lt;DIV&gt;Subtype: log&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;access-group PETRO-TO-ECI in interface INTERNAL&lt;/DIV&gt;&lt;DIV&gt;access-list PETRO-TO-ECI extended permit ip any any &lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Phase: 4&lt;/DIV&gt;&lt;DIV&gt;Type: IP-OPTIONS&lt;/DIV&gt;&lt;DIV&gt;Subtype: &lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Phase: 5&lt;/DIV&gt;&lt;DIV&gt;Type: INSPECT&lt;/DIV&gt;&lt;DIV&gt;Subtype: inspect-tftp&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;class-map inspection_default&lt;/DIV&gt;&lt;DIV&gt; match default-inspection-traffic&lt;/DIV&gt;&lt;DIV&gt;policy-map global_policy&lt;/DIV&gt;&lt;DIV&gt; class inspection_default&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; inspect tftp &lt;/DIV&gt;&lt;DIV&gt;service-policy global_policy global&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Phase: 6&lt;/DIV&gt;&lt;DIV&gt;Type: IP-OPTIONS&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Phase: 7&lt;/DIV&gt;&lt;DIV&gt;Type: FLOW-CREATION&lt;/DIV&gt;&lt;DIV&gt;Subtype: &lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;New flow created with id 8, packet dispatched to next module&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Result:&lt;/DIV&gt;&lt;DIV&gt;input-interface: INTERNAL&lt;/DIV&gt;&lt;DIV&gt;input-status: up&lt;/DIV&gt;&lt;DIV&gt;input-line-status: up&lt;/DIV&gt;&lt;DIV&gt;output-interface: LOCAL_PHD&lt;/DIV&gt;&lt;DIV&gt;output-status: up&lt;/DIV&gt;&lt;DIV&gt;output-line-status: up&lt;/DIV&gt;&lt;DIV&gt;Action: allow&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;thanks for your help.&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Nov 2010 15:25:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-traffic-issue/m-p/1574278#M656727</guid>
      <dc:creator>jose cortes</dc:creator>
      <dc:date>2010-11-12T15:25:15Z</dc:date>
    </item>
  </channel>
</rss>

