<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 55210 return traffic is not recieved on inside interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-55210-return-traffic-is-not-recieved-on-inside-interface/m-p/1391199#M750941</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please point out what kind of application on the OUTSIDE SERVER are you trying to access from users behind ASA ? What ports does it use ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Because lets say if the application running on the outside server needs to open secondary channels to work properly, then we may need to turn ON inspects for the inbound comnnection to be allowed. For example, lets say outside box is an FTP server and a client on your internal LAN wants to upload a file. After initial control channel communication estabishment ,FTP server will open a data channel on port 20 (active FTP) and to make the ASA remember that the connection TO THE server was initiated from an inside HOST, we will need INSPECT FTP turned "ON" on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also,&amp;nbsp; could you please attach the binary captures for analysis. ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vijaya&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 19 Jan 2010 05:25:09 GMT</pubDate>
    <dc:creator>vilaxmi</dc:creator>
    <dc:date>2010-01-19T05:25:09Z</dc:date>
    <item>
      <title>ASA 55210 return traffic is not recieved on inside interface</title>
      <link>https://community.cisco.com/t5/network-security/asa-55210-return-traffic-is-not-recieved-on-inside-interface/m-p/1391196#M750884</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I have two ASA 55210 were one ASA is working fine , while second ASA has similar configuration of ASA 1 but we have problem in reverse traffic ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; My TCP connection is established from inside interface to outside interface , while the traffic goes out of outside interface and reaches the destination severs and application services&amp;nbsp; , the return traffic is coming back to ASA firewall on outside interface and get excuted in IOS&amp;nbsp; but its not completing with full TCP connection .My inside interface is not getting any reverse traffic to source IP which has initated the session . So no application is working from this Firewall .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; For eg : AT&amp;amp;T MTS application which initates traffic from inside interface reaches the destination server and corresponding application services , while return traffic come back to my firewall outside interface and its allowed inside IOS , but we cant see any TCP get session completed from source which has initated the traffic .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Trouble shooting Done :1)&amp;nbsp; Permitted IP ANY ANY on both Inside and outside interface , But same response ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2) IOS which is running in ASA 1 and ASA 2 is same IOS , IOS also copied from ASA 1 to ASA 2 but no change.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Help me on this&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; MY inside INTERFACE of my firewall is not receiving any return traffic whichever the session initated from same interface&amp;nbsp; .&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:58:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-55210-return-traffic-is-not-recieved-on-inside-interface/m-p/1391196#M750884</guid>
      <dc:creator>SANTHOSHKUMAR SARAVANAN</dc:creator>
      <dc:date>2019-03-11T16:58:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 55210 return traffic is not recieved on inside interface</title>
      <link>https://community.cisco.com/t5/network-security/asa-55210-return-traffic-is-not-recieved-on-inside-interface/m-p/1391197#M750905</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By default traffic from higher security-level interface is allowed to go to lower security-level interface, and taking into account of the firewall's stateful nature, the ASA remembers the connection (initiated from a higher security-level interface) and allows return traffic automatically. So, if in your case, it is not happening then we may need to look at config and logs occuring at the time of issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;EM&gt;I have two ASA 55210 were one ASA is working fine , while second ASA has similar configuration of ASA 1 but we have problem in reverse traffic ,&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding: 0px; min-height: 8pt; height: 8pt;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding: 0px; min-height: 8pt; height: 8pt;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;As per your setup is conecrned, it seems like you have two firewalls setup in HA pair. Can you please let us know if the firewall is in active/active or active/standby mode ? If the ASAs are in A/S mode then ONLY one ASA is active at a time and return traffic will be allowed only via the active ASA unit.&lt;/P&gt;&lt;P&gt;So, you will not be able to see the return traffic on standby ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, if your TWO ASAs in question are just configured alike and not in HA pair, then, please paste the running-config (mark the ifc where traffic generates) and show version of each box along iwth logs from the problem ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, is the topology behind each box the same as well ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vijaya&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jan 2010 04:11:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-55210-return-traffic-is-not-recieved-on-inside-interface/m-p/1391197#M750905</guid>
      <dc:creator>vilaxmi</dc:creator>
      <dc:date>2010-01-19T04:11:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 55210 return traffic is not recieved on inside interface</title>
      <link>https://community.cisco.com/t5/network-security/asa-55210-return-traffic-is-not-recieved-on-inside-interface/m-p/1391198#M750928</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Vijaya ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Thanks for your reply , There is no Active and Standby design in my networks , My two firewall r working in active mode alone , &lt;STRONG&gt;I have tested my firewall by connecting&amp;nbsp; a laptop directly to inside interface of ASA , I have tried for exceuting application for eg ( AT&amp;amp;T MTS ) it doesnt works&lt;/STRONG&gt; , I have done capture command also it show clearly traffic on inside interface and return traffic for TCP connection on outside interface .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ping from IOS of firewall to destination server is succesful ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; similalrly outside interface is receiving both inbound and outbound traffic . My inside interface is not recieving any return traffic which initated from inside segment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Kindly looking for your comments .Thank you&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jan 2010 04:35:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-55210-return-traffic-is-not-recieved-on-inside-interface/m-p/1391198#M750928</guid>
      <dc:creator>SANTHOSHKUMAR SARAVANAN</dc:creator>
      <dc:date>2010-01-19T04:35:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 55210 return traffic is not recieved on inside interface</title>
      <link>https://community.cisco.com/t5/network-security/asa-55210-return-traffic-is-not-recieved-on-inside-interface/m-p/1391199#M750941</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please point out what kind of application on the OUTSIDE SERVER are you trying to access from users behind ASA ? What ports does it use ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Because lets say if the application running on the outside server needs to open secondary channels to work properly, then we may need to turn ON inspects for the inbound comnnection to be allowed. For example, lets say outside box is an FTP server and a client on your internal LAN wants to upload a file. After initial control channel communication estabishment ,FTP server will open a data channel on port 20 (active FTP) and to make the ASA remember that the connection TO THE server was initiated from an inside HOST, we will need INSPECT FTP turned "ON" on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also,&amp;nbsp; could you please attach the binary captures for analysis. ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vijaya&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jan 2010 05:25:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-55210-return-traffic-is-not-recieved-on-inside-interface/m-p/1391199#M750941</guid>
      <dc:creator>vilaxmi</dc:creator>
      <dc:date>2010-01-19T05:25:09Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 55210 return traffic is not recieved on inside interface</title>
      <link>https://community.cisco.com/t5/network-security/asa-55210-return-traffic-is-not-recieved-on-inside-interface/m-p/1391200#M750961</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Vijaya,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I am trying to connect to MTS application by connecting Inside interface of firewall directly to laptop , For service port 443 , kindly find the error log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Jan 17 2010 17:30:09: %ASA-4-106023: Deny tcp src inside:10.77.148.66/1142 dst outside:125.18.17.x443 by access-group "outbound" [0x0, 0x0]&lt;/P&gt;&lt;P&gt;Jan 17 2010 17:30:10: %ASA-4-106023: Deny tcp src inside:10.77.148.66/1142 dst outside:125.18.17.x/443 by access-group "outbound" [0x0, 0x0]&lt;/P&gt;&lt;P&gt;Jan 17 2010 17:30:10: %ASA-4-106023: Deny tcp src inside:10.77.148.66/1142 dst outside:125.18.17.x/443 by access-group "outbound" [0x0, 0x0]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Jan 17 2010 17:31:15: %ASA-4-106023: Deny tcp src inside:10.77.148.66/1152 dst outside:122.248.161.x/443 by access-group "outbound" [0x0, 0x0]&lt;/P&gt;&lt;P&gt;Jan 17 2010 17:31:15: %ASA-4-106023: Deny tcp src inside:10.77.148.66/1152 dst outside:122.248.161.x/443 by access-group "outbound" [0x0, 0x0]&lt;/P&gt;&lt;P&gt;Jan 17 2010 17:31:15: %ASA-4-106023: Deny tcp src inside:10.77.148.66/1152 dst outside:122.248.161.x/443 by access-group "outbound" [0x0, 0x0]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; similalry u can also find IP inspect command on my configuration , u also mean IP inspect command to be turned on for all services , which is initated from the firewall . kindly help me on this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jan 2010 14:57:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-55210-return-traffic-is-not-recieved-on-inside-interface/m-p/1391200#M750961</guid>
      <dc:creator>SANTHOSHKUMAR SARAVANAN</dc:creator>
      <dc:date>2010-01-19T14:57:54Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 55210 return traffic is not recieved on inside interface</title>
      <link>https://community.cisco.com/t5/network-security/asa-55210-return-traffic-is-not-recieved-on-inside-interface/m-p/1391201#M750983</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Viji,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I have given &lt;STRONG&gt;same−security−traffic permit intra−interface&lt;/STRONG&gt; were by i have got some good results , Along with this command i have given explict&amp;nbsp; permit ip any any to the interface then only it works .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; If i &lt;STRONG&gt;remove permit ip any any &lt;/STRONG&gt;command allowing only some limited to access to services n i am not getting connected to services . kindly find the Binaries&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input inside rawip 10.77.148.66 80 10.7$&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Phase: 1&lt;/STRONG&gt;&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;BR /&gt;&lt;STRONG&gt;Phase: 2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;BR /&gt;&lt;STRONG&gt;Phase: 3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 10.77.148.64&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.248 inside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&lt;STRONG&gt;Phase: 4&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group outbound in interface inside&lt;/P&gt;&lt;P&gt;access-list outbound extended permit ip any any&lt;/P&gt;&lt;P&gt;Additional Information:&lt;BR /&gt;&lt;STRONG&gt;Phase: 5&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;BR /&gt;&lt;STRONG&gt;Phase: 6&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 247, packet dispatched to next module&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&lt;STRONG&gt;Phase: 7&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: output and adjacency&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;found next-hop 10.77.148.41 using egress ifc outside&lt;/P&gt;&lt;P&gt;adjacency Active&lt;/P&gt;&lt;P&gt;next-hop mac address 0026.ca1b.65c2 hits 25&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Result:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IF i remove permit ip any any i have Access list for limited resource...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input inside rawip 10.77.148.66 80 10.7$&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;BR /&gt;&lt;STRONG&gt;Phase: 3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 10.77.148.64&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.248 inside&lt;BR /&gt;&lt;STRONG&gt;Phase: 4&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: &lt;STRONG&gt;DROP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group outbound in interface inside&lt;/P&gt;&lt;P&gt;access-list outbound extended deny ip any any log&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Result:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;were my ACLis&amp;nbsp; there&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outbound extended permit tcp host 10.77.148.66 host 10.77.148.41 eq &lt;/P&gt;&lt;P&gt;access-list outbound extended permit tcp object-group QUADRA object-group CA_Cert eq 709&lt;/P&gt;&lt;P&gt;access-list outbound extended permit tcp object-group QUADRA object-group Focus eq www&lt;/P&gt;&lt;P&gt;access-list outbound extended permit tcp object-group QUADRA object-group RIG_Boxes eq www&lt;/P&gt;&lt;P&gt;access-list outbound extended permit tcp object-group QUADRA object-group RIG_Boxes eq 5080&lt;/P&gt;&lt;P&gt;access-list outbound extended permit udp object-group QUADRA object-group RIG_Boxes eq 5081 &lt;BR /&gt;access-list outbound extended permit tcp object-group QUADRA object-group SIG_Boxes eq https &lt;BR /&gt;access-list outbound extended permit tcp object-group QUADRA object-group SIG_Boxes eq www &lt;BR /&gt;access-list outbound extended permit udp object-group QUADRA object-group SIG_Boxes eq isakmp &lt;BR /&gt;access-list outbound extended permit udp object-group QUADRA object-group SIG_Boxes eq 50 &lt;BR /&gt;access-list outbound extended permit udp object-group QUADRA object-group SIG_Boxes eq 51 &lt;BR /&gt;access-list outbound extended permit udp object-group QUADRA object-group SIG_Boxes eq 4500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Help on this is highly apprecitated .&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Jan 2010 13:27:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-55210-return-traffic-is-not-recieved-on-inside-interface/m-p/1391201#M750983</guid>
      <dc:creator>SANTHOSHKUMAR SARAVANAN</dc:creator>
      <dc:date>2010-01-20T13:27:03Z</dc:date>
    </item>
  </channel>
</rss>

