<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Disable &amp;quot;Stateful Packet Inspection&amp;quot; on ASA 5510 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/disable-quot-stateful-packet-inspection-quot-on-asa-5510/m-p/1579393#M803977</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For clarification, here is a capture of the access rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/5/2/4/7425-AccessRule.JPG" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 21 Sep 2010 17:42:02 GMT</pubDate>
    <dc:creator>nwhitesel</dc:creator>
    <dc:date>2010-09-21T17:42:02Z</dc:date>
    <item>
      <title>Disable "Stateful Packet Inspection" on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/disable-quot-stateful-packet-inspection-quot-on-asa-5510/m-p/1579389#M803969</link>
      <description>&lt;P&gt;We have a new ASA 5510 appliance that we are using in a fairly simple environment.&amp;nbsp; We have an internal server that is hosting a variety of interface applications that work with our resort's lodging software.&amp;nbsp; There are several interfaces that are operating correctly and connecting to external (Internet) services such as Expedia.&amp;nbsp; Our credit card processor interface, however, is having problems.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The vendor originally told us that all we need to do is create an access rule that opens up port 443 for incoming traffic from their web server: XXX.XXX.190.218.&amp;nbsp; We did this, yet their test application keeps failing.&amp;nbsp; For the sake of argument, they had me temporarily bypass the firewall and the service worked.&amp;nbsp; The issue was elevated to their senior engineer, and he said that the culprit is most likely SPI (Stateful Packet Inspection), which their service is incompatible with.&amp;nbsp; He instructed me to disable it for that access rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see that there is some level of packet inspection under the Service Policy Rules screen, but it appears that port 443 is not being inspected by default, and frankly, I don't even think it is possible to inspect port https.&amp;nbsp; Can anyone tell me how I can make sure that SPI si turned off for that application?&amp;nbsp; Is SPI the culprit, or are there some troubleshooting steps I can take to identify the root cause?&amp;nbsp; I'd be happy to answer any clarification questions that you may have.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for any replies!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:43:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-quot-stateful-packet-inspection-quot-on-asa-5510/m-p/1579389#M803969</guid>
      <dc:creator>nwhitesel</dc:creator>
      <dc:date>2019-03-11T18:43:11Z</dc:date>
    </item>
    <item>
      <title>Re: Disable "Stateful Packet Inspection" on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/disable-quot-stateful-packet-inspection-quot-on-asa-5510/m-p/1579390#M803970</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i am not too sure how the stateful behaviour has got somehting to do with this, if you want to bypass staeful check to this you can try this out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080b2d922.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080b2d922.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/conns_tcpstatebypass.pdf"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/conns_tcpstatebypass.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but i am not too sure how this would help as i do not ho wthis server bahaves, could you please apply captures and elabaorate more about the services and if it opens any dynamic ports&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Sep 2010 16:31:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-quot-stateful-packet-inspection-quot-on-asa-5510/m-p/1579390#M803970</guid>
      <dc:creator>Jitendriya Athavale</dc:creator>
      <dc:date>2010-09-21T16:31:35Z</dc:date>
    </item>
    <item>
      <title>Re: Disable "Stateful Packet Inspection" on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/disable-quot-stateful-packet-inspection-quot-on-asa-5510/m-p/1579391#M803973</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The ASA is a stateful firewall and does support Deep Packet Inspection.&amp;nbsp; However, as you stated, HTTPS is not a protocol that can be inspected and modified - at least not by the ASA.&amp;nbsp; The devices that do impact HTTPS are playing "Man in the Middle" - unencrypting and re-encrypting the HTTPS data.&amp;nbsp; Again, the ASA is NOT capable of doing this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The issue that you are seeing can be any number of things.&amp;nbsp; The two key troubleshooting steps that we have are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.) Packet captures.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Capture the data between the two hosts, following the link below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2.) Syslogs (preferably at the 'debugging' level).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At the time of the issue, gather all 'debugging' level logs that you can for the relevant flow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3.) Packet-tracer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it is a "simple" flow (ie non-VPN, dropping on the first packet, etc.), packet-tracer is a great tool.&amp;nbsp; For this flow, the packet-tracer command would likely look like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input &lt;INCOMING_IFC&gt; tcp &lt;SOURCE_IP&gt; 5555 &lt;DEST_IP&gt; 443 detailed&lt;/DEST_IP&gt;&lt;/SOURCE_IP&gt;&lt;/INCOMING_IFC&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will give us a play-by-play and tell us each step of the ASA Finite State Machine that the flow goes through.&amp;nbsp; The key takeaway here is the "result" of each step - if it says "Drop", this is likely our guilty party.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4.) ASP Drops:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Monitoring the output of 'show asp drop' at the time of the issue may give you some insight as to why the ASA may be dropping the flow - or at least narrow it down to a few options.&amp;nbsp; Just prior to running the test connection, you may want to do a 'clear asp drop', run the test, and then immediately look at the 'show asp drop' output.&amp;nbsp; This can also be supplemented with 'capture capasp type asp-drop &lt;FILTER&gt;' to assist with narrowing it down.&lt;/FILTER&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you can provide us the output from these steps, that will hopefully give us some added insight as to what the problem may be.&amp;nbsp; If you are able to isolate the issue with these troubleshooting steps, please be sure to mark this thread as answered.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Kevin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Sep 2010 16:41:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-quot-stateful-packet-inspection-quot-on-asa-5510/m-p/1579391#M803973</guid>
      <dc:creator>Kevin Redmon</dc:creator>
      <dc:date>2010-09-21T16:41:22Z</dc:date>
    </item>
    <item>
      <title>Re: Disable "Stateful Packet Inspection" on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/disable-quot-stateful-packet-inspection-quot-on-asa-5510/m-p/1579392#M803975</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kevin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the prompt reply!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are the results of some of the tests you wanted me to run:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Packet Captures&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I couldn't see the link you referenced, but I ran the Packet Capture Wizard through the ASDM on the ASA 5510.&amp;nbsp; Here are the results after running the test twice:&lt;/P&gt;&lt;P&gt;&lt;TABLE border="0" cellpadding="0" cellspacing="0" style="width: 770pt; border-collapse: collapse;" width="1028"&gt;&lt;COLGROUP span="1"&gt;&lt;COL span="1" style="width: 611pt; mso-width-source: userset; mso-width-alt: 29805;" width="815" /&gt;&lt;COL span="1" style="width: 23pt; mso-width-source: userset; mso-width-alt: 1133;" width="31" /&gt;&lt;COL span="1" style="width: 44pt; mso-width-source: userset; mso-width-alt: 2157;" width="59" /&gt;&lt;COL span="2" style="width: 23pt; mso-width-source: userset; mso-width-alt: 1133;" width="31" /&gt;&lt;COL span="1" style="width: 46pt; mso-width-source: userset; mso-width-alt: 2230;" width="61" /&gt;&lt;/COLGROUP&gt;&lt;TBODY&gt;&lt;TR style="height: 15pt;"&gt;&lt;TD height="20" style="background-color: transparent; width: 611pt; height: 15pt; border: black;" width="815"&gt;14 packets captured&lt;/TD&gt;&lt;TD style="background-color: transparent; width: 23pt; border: black;" width="31"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; width: 44pt; border: black;" width="59"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; width: 23pt; border: black;" width="31"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; width: 23pt; border: black;" width="31"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; width: 46pt; border: black;" width="61"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 15pt;"&gt;&lt;TD height="20" style="background-color: transparent; height: 15pt; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 15pt;"&gt;&lt;TD height="20" style="background-color: transparent; height: 15pt; border: black;"&gt;&lt;SPAN style="mso-spacerun: yes;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;1: 10:18:51.391627 12.180.11.111.64431 &amp;gt; 216.235.190.218.443: S 1322654048:1322654048(0) win 8192 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;nop&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;wscale 8&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;nop&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;nop&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;sackOK&amp;gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 15pt;"&gt;&lt;TD height="20" style="background-color: transparent; height: 15pt; border: black;"&gt;&lt;SPAN style="mso-spacerun: yes;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;2: 10:18:51.460150 216.235.190.218.443 &amp;gt; 12.180.11.111.64431: S 3428970047:3428970047(0) ack 1322654049 win 5840 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 15pt;"&gt;&lt;TD height="20" style="background-color: transparent; height: 15pt; border: black;"&gt;&lt;SPAN style="mso-spacerun: yes;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;3: 10:18:51.461203 12.180.11.111.64431 &amp;gt; 216.235.190.218.443: . ack 3428970048 win 64860&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 15pt;"&gt;&lt;TD height="20" style="background-color: transparent; height: 15pt; border: black;"&gt;&lt;SPAN style="mso-spacerun: yes;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;4: 10:18:51.462286 12.180.11.111.64431 &amp;gt; 216.235.190.218.443: P 1322654049:1322654123(74) ack 3428970048 win 64860&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 15pt;"&gt;&lt;TD height="20" style="background-color: transparent; height: 15pt; border: black;"&gt;&lt;SPAN style="mso-spacerun: yes;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;5: 10:18:51.530413 216.235.190.218.443 &amp;gt; 12.180.11.111.64431: . ack 1322654123 win 5840&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 15pt;"&gt;&lt;TD height="20" style="background-color: transparent; height: 15pt; border: black;"&gt;&lt;SPAN style="mso-spacerun: yes;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;6: 10:18:51.530734 12.180.11.111.64431 &amp;gt; 216.235.190.218.443: R 1322654123:1322654123(0) win 0&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 15pt;"&gt;&lt;TD height="20" style="background-color: transparent; height: 15pt; border: black;"&gt;&lt;SPAN style="mso-spacerun: yes;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;7: 10:18:51.531390 216.235.190.218.443 &amp;gt; 12.180.11.111.64431: P 3428970048:3428970122(74) ack 1322654123 win 5840&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 15pt;"&gt;&lt;TD height="20" style="background-color: transparent; height: 15pt; border: black;"&gt;&lt;SPAN style="mso-spacerun: yes;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;8: 10:21:47.531970 12.180.11.111.64446 &amp;gt; 216.235.190.218.443: S 527919168:527919168(0) win 8192 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;nop&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;wscale 8&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;nop&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;nop&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;sackOK&amp;gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 15pt;"&gt;&lt;TD height="20" style="background-color: transparent; height: 15pt; border: black;"&gt;&lt;SPAN style="mso-spacerun: yes;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;9: 10:21:47.630063 216.235.190.218.443 &amp;gt; 12.180.11.111.64446: S 3712120816:3712120816(0) ack 527919169 win 5840 &lt;MSS 1380=""&gt;&lt;/MSS&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 15pt;"&gt;&lt;TD height="20" style="background-color: transparent; height: 15pt; border: black;"&gt;&lt;SPAN style="mso-spacerun: yes;"&gt;&amp;nbsp; &lt;/SPAN&gt;10: 10:21:47.630933 12.180.11.111.64446 &amp;gt; 216.235.190.218.443: . ack 3712120817 win 64860&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 15pt;"&gt;&lt;TD height="20" style="background-color: transparent; height: 15pt; border: black;"&gt;&lt;SPAN style="mso-spacerun: yes;"&gt;&amp;nbsp; &lt;/SPAN&gt;11: 10:21:47.632383 12.180.11.111.64446 &amp;gt; 216.235.190.218.443: P 527919169:527919243(74) ack 3712120817 win 64860&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 15pt;"&gt;&lt;TD height="20" style="background-color: transparent; height: 15pt; border: black;"&gt;&lt;SPAN style="mso-spacerun: yes;"&gt;&amp;nbsp; &lt;/SPAN&gt;12: 10:21:47.729576 216.235.190.218.443 &amp;gt; 12.180.11.111.64446: . ack 527919243 win 5840&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 15pt;"&gt;&lt;TD height="20" style="background-color: transparent; height: 15pt; border: black;"&gt;&lt;SPAN style="mso-spacerun: yes;"&gt;&amp;nbsp; &lt;/SPAN&gt;13: 10:21:47.729835 12.180.11.111.64446 &amp;gt; 216.235.190.218.443: R 527919243:527919243(0) win 0&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 15pt;"&gt;&lt;TD height="20" style="background-color: transparent; height: 15pt; border: black;"&gt;&lt;SPAN style="mso-spacerun: yes;"&gt;&amp;nbsp; &lt;/SPAN&gt;14: 10:21:47.729942 216.235.190.218.443 &amp;gt; 12.180.11.111.64446: P 3712120817:3712120891(74) ack 527919243 win 5840&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 15pt;"&gt;&lt;TD height="20" style="background-color: transparent; height: 15pt; border: black;"&gt;14 packets shown&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;TD style="background-color: transparent; border: black;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Syslogs&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; We could not get the syslogs to show any activity from the given source and destination.&amp;nbsp; Not sure if we were filtering it correctly, or if there were truly no entries.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. Packet Tracer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Result of the command: "packet-tracer input outside tcp 216.235.190.218 5555 12.180.11.111 443 detailed"&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Phase: 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Type: FLOW-LOOKUP&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Subtype: &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Found no matching flow, creating a new flow&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Phase: 2&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Type: UN-NAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Subtype: static&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;static (Inside,Outside) 12.180.11.111 10.1.5.115 netmask 255.255.255.255 dns &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;&amp;nbsp; match ip Inside host 10.1.5.115 Outside any&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 12.180.11.111&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 10155, untranslate_hits = 2247&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;NAT divert to egress interface Inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Untranslate 12.180.11.111/0 to 10.1.5.115/0 using netmask 255.255.255.255&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Phase: 3&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Type: ACCESS-LIST&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Subtype: log&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;access-group Outside_access_in in interface Outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;access-list Outside_access_in extended permit tcp host 216.235.190.218 host 12.180.11.111 eq https log &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt; Forward Flow based lookup yields rule:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt; in&amp;nbsp; id=0xac1f4498, priority=12, domain=permit, deny=false&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1, user_data=0xa8a92cc0, cs_id=0x0, flags=0x0, protocol=6&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=216.235.190.218, mask=255.255.255.255, port=0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=12.180.11.111, mask=255.255.255.255, port=443, dscp=0x0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Phase: 4&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Type: IP-OPTIONS&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Subtype: &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt; Forward Flow based lookup yields rule:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt; in&amp;nbsp; id=0xab8b2260, priority=0, domain=permit-ip-option, deny=true&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=822577, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Phase: 5&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Type: ACCESS-LIST&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Subtype: log&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;access-group Inside_access_out out interface Inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;access-list Inside_access_out extended permit ip any any log &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt; Forward Flow based lookup yields rule:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt; out id=0xab973c78, priority=12, domain=permit, deny=false&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=83127, user_data=0xa8a92d40, cs_id=0x0, flags=0x0, protocol=0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Phase: 6&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Type: NAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Subtype: rpf-check&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;static (Inside,Outside) 12.180.11.111 10.1.5.115 netmask 255.255.255.255 dns &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;&amp;nbsp; match ip Inside host 10.1.5.115 Outside any&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 12.180.11.111&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 10155, untranslate_hits = 2247&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt; Forward Flow based lookup yields rule:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt; out id=0xab9719a0, priority=5, domain=nat-reverse, deny=false&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=892, user_data=0xab970f48, cs_id=0x0, flags=0x0, protocol=0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=10.1.5.115, mask=255.255.255.255, port=0, dscp=0x0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Phase: 7&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Type: NAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Subtype: host-limits&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;static (Inside,Outside) 12.180.11.111 10.1.5.115 netmask 255.255.255.255 dns &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;&amp;nbsp; match ip Inside host 10.1.5.115 Outside any&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 12.180.11.111&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 10155, untranslate_hits = 2247&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt; Reverse Flow based lookup yields rule:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt; in&amp;nbsp; id=0xab971b48, priority=5, domain=host, deny=false&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=11046, user_data=0xab970f48, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=10.1.5.115, mask=255.255.255.255, port=0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Phase: 8&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Type: IP-OPTIONS&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Subtype: &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt; Reverse Flow based lookup yields rule:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt; in&amp;nbsp; id=0xab8f8e18, priority=0, domain=permit-ip-option, deny=true&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=850514, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Phase: 9&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Type: FLOW-CREATION&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Subtype: &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;New flow created with id 872833, packet dispatched to next module&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Module information for forward flow ...&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;snp_fp_tracer_drop&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;snp_fp_inspect_ip_options&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;snp_fp_tcp_normalizer&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;snp_fp_translate&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;snp_fp_adjacency&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;snp_fp_fragment&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;snp_ifc_stat&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Module information for reverse flow ...&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;snp_fp_tracer_drop&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;snp_fp_inspect_ip_options&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;snp_fp_translate&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;snp_fp_tcp_normalizer&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;snp_fp_adjacency&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;snp_fp_fragment&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;snp_ifc_stat&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Result:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;input-interface: Outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;input-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;input-line-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;output-interface: Inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;output-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;output-line-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Action: allow&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4.&amp;nbsp; ASP Drop&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Here are the results of the command you suggested:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Result of the command: "show asp drop"&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;Frame drop:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;&amp;nbsp; Flow is denied by configured rule (acl-drop)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 598&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;&amp;nbsp; First TCP packet not SYN (tcp-not-syn)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 22&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;&amp;nbsp; TCP failed 3 way handshake (tcp-3whs-failed)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;&amp;nbsp; TCP invalid ACK (tcp-invalid-ack)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 31&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; "&gt;&amp;nbsp; FP L2 rule drop (l2_acl)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 12&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;quot;Calibri&amp;quot;, &amp;quot;sans-serif&amp;quot;; color: #1f497d; font-size: 11pt; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;"&gt;&amp;nbsp; Dropped pending packets in a closed socket (np-socket-closed)&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Sep 2010 17:37:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-quot-stateful-packet-inspection-quot-on-asa-5510/m-p/1579392#M803975</guid>
      <dc:creator>nwhitesel</dc:creator>
      <dc:date>2010-09-21T17:37:11Z</dc:date>
    </item>
    <item>
      <title>Re: Disable "Stateful Packet Inspection" on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/disable-quot-stateful-packet-inspection-quot-on-asa-5510/m-p/1579393#M803977</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For clarification, here is a capture of the access rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/5/2/4/7425-AccessRule.JPG" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Sep 2010 17:42:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-quot-stateful-packet-inspection-quot-on-asa-5510/m-p/1579393#M803977</guid>
      <dc:creator>nwhitesel</dc:creator>
      <dc:date>2010-09-21T17:42:02Z</dc:date>
    </item>
    <item>
      <title>Re: Disable "Stateful Packet Inspection" on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/disable-quot-stateful-packet-inspection-quot-on-asa-5510/m-p/1579394#M803979</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry that I forgot to include the link to the packet captures - here it is for future reference:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-1222"&gt;https://supportforums.cisco.com/docs/DOC-1222&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on the packet captures that you had provided, it seems as though the server at 12.180.11.111 is sending a reset.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;6: 10:18:51.530734 12.180.11.111.64431 &amp;gt; 216.235.190.218.443: R 1322654123:1322654123(0) win 0&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Depending on where this packet capture was taken, this Reset could be coming from the server and/or this reset proxied by the ASA for some reason.&amp;nbsp; If this was reset by another device, you will likely see a TCP Reset-I or TCP Reset-O.&amp;nbsp; Do a packet capture on the interface that is closest to the 12.180.11.111 device - see if you see the Reset there as well.&amp;nbsp; If you do, you can determine who sent the Reset by looking at the source MAC address via the command 'show capture &lt;CAPTURE_NAME&gt; detail | inc R'.&amp;nbsp; A 'show arp | inc &lt;MAC_ADDRESS&gt;' will likely point to a culprit.&lt;/MAC_ADDRESS&gt;&lt;/CAPTURE_NAME&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the device that you'll want to focus on next.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Kevin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Sep 2010 18:40:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-quot-stateful-packet-inspection-quot-on-asa-5510/m-p/1579394#M803979</guid>
      <dc:creator>Kevin Redmon</dc:creator>
      <dc:date>2010-09-21T18:40:28Z</dc:date>
    </item>
    <item>
      <title>Re: Disable "Stateful Packet Inspection" on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/disable-quot-stateful-packet-inspection-quot-on-asa-5510/m-p/1579395#M803980</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We ran the command you posted and the reset command is originating from the interface server where we are running the test from.&amp;nbsp; I have also created a screen capture of our packet capture showing both Ingress and Egress (see below).&amp;nbsp; It seems like the final ack is not making it back to the originating server and I'm wondering if that is casuing the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The test we are running from that server is a terminal based java test to sample send a credit card.&amp;nbsp; Here is a brief connection debug log of that test:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NGS XT Client ConnHandler-51:DEBUG:Thread starting.&lt;BR /&gt;NGS XT Client ConnHandler-51:DEBUG:Initializing encryption engines.&lt;BR /&gt;NGS XT Client ConnHandler-51:DEBUG:Connecting to Proxy Server.&lt;BR /&gt;NGS XT Client ConnHandler-51:DEBUG:Connect to server host&lt;BR /&gt;NGS XT Client ConnHandler-51:DEBUG:Gen a client key pair&lt;BR /&gt;NGS XT Client ConnHandler-51:DEBUG:Public key :XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX&lt;/P&gt;&lt;P&gt;XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX&lt;/P&gt;&lt;P&gt;XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX&lt;/P&gt;&lt;P&gt;NGS XT Client ConnHandler-51:DEBUG:Public key sent to server, 72 bytes.&lt;BR /&gt;NGS XT Client ConnHandler-51:DEBUG:Waiting for receipt of server Public key...&lt;BR /&gt;NGS XT Client ConnHandler-51:ERROR: Socket Error during secure connection setup:&lt;BR /&gt; Software caused connection abort: recv failed disconnecting.&lt;BR /&gt;NGS XT Client ConnHandler-51:DEBUG:Host connect failed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, here is the error code that is returned from the console:&lt;/P&gt;&lt;P&gt;RECEIVE TIME OUT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this feels like I am getting too much into the specifics of the application, I apologize.&amp;nbsp; Thanks for all of your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/6/2/4/7426-Capture.JPG" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Sep 2010 20:20:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-quot-stateful-packet-inspection-quot-on-asa-5510/m-p/1579395#M803980</guid>
      <dc:creator>nwhitesel</dc:creator>
      <dc:date>2010-09-21T20:20:45Z</dc:date>
    </item>
    <item>
      <title>Re: Disable "Stateful Packet Inspection" on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/disable-quot-stateful-packet-inspection-quot-on-asa-5510/m-p/1579396#M803983</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We got some debugging logs to work.&amp;nbsp; Here they are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6|Sep 21 2010|14:12:04|106015|216.235.190.218|443|12.180.11.111|65324|Deny TCP (no connection) from 216.235.190.218/443 to 12.180.11.111/65324 flags PSH ACK&amp;nbsp; on interface Outside&lt;BR /&gt;6|Sep 21 2010|14:12:04|302014|216.235.190.218|443|10.1.5.115|65324|Teardown TCP connection 968830 for Outside:216.235.190.218/443 to Inside:10.1.5.115/65324 duration 0:00:00 bytes 74 TCP Reset-I&lt;BR /&gt;6|Sep 21 2010|14:11:16|302014|216.235.190.218|443|10.1.5.115|65320|Teardown TCP connection 968732 for Outside:216.235.190.218/443 to Inside:10.1.5.115/65320 duration 0:00:00 bytes 74 TCP Reset-I&lt;BR /&gt;6|Sep 21 2010|14:11:16|106015|216.235.190.218|443|12.180.11.111|65320|Deny TCP (no connection) from 216.235.190.218/443 to 12.180.11.111/65320 flags PSH ACK&amp;nbsp; on interface Outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Sep 2010 21:18:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-quot-stateful-packet-inspection-quot-on-asa-5510/m-p/1579396#M803983</guid>
      <dc:creator>nwhitesel</dc:creator>
      <dc:date>2010-09-21T21:18:58Z</dc:date>
    </item>
    <item>
      <title>Re: Disable "Stateful Packet Inspection" on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/disable-quot-stateful-packet-inspection-quot-on-asa-5510/m-p/1579397#M803986</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;By any chance do you have a websense server or some kind of filter/IDS on the inside? I have seen that kind of traffic pattern when there is a websense server that is monitorring traffic in a promiscuos mode. Those kind of filters will simply spoof a reset if they see https traffic they do not like.&amp;nbsp;&amp;nbsp; - magnus&lt;/P&gt;&lt;P&gt;Posted from my mobile device.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Sep 2010 23:13:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-quot-stateful-packet-inspection-quot-on-asa-5510/m-p/1579397#M803986</guid>
      <dc:creator>Magnus Mortensen</dc:creator>
      <dc:date>2010-09-21T23:13:59Z</dc:date>
    </item>
    <item>
      <title>Re: Disable "Stateful Packet Inspection" on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/disable-quot-stateful-packet-inspection-quot-on-asa-5510/m-p/1579398#M803987</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have a similar appliance from St. Bernard - iPrism.&amp;nbsp; It is set to allow all traffic to our local server, but I can see that it might just be inspecting those packets and sending a weird response.&amp;nbsp; I will take it out of line tomorrow morning to test and will let you know if that was the problem.&amp;nbsp; Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Sep 2010 23:22:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-quot-stateful-packet-inspection-quot-on-asa-5510/m-p/1579398#M803987</guid>
      <dc:creator>nwhitesel</dc:creator>
      <dc:date>2010-09-21T23:22:11Z</dc:date>
    </item>
    <item>
      <title>Re: Disable "Stateful Packet Inspection" on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/disable-quot-stateful-packet-inspection-quot-on-asa-5510/m-p/1579399#M803990</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to the packet-tracer command run earlier "packet-tracer input outside tcp 216.235.190.218 5555 12.180.11.111 443 detailed", it appears that the server 216.235.190.218 is a server on the outside of the ASA and it tries to connect to 12.180.11.111(which is on the internal network of the ASA) over port 443.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But if we look at the captures on the ASA "10:18:51.391627 12.180.11.111.64431 &amp;gt; 216.235.190.218.443: S 1322654048:1322654048(0) win 8192"&lt;/P&gt;&lt;P&gt;, it looks like that the connection is being initiated by 12.180.11.111 to the destination 216.235.190.218 over port 443. The key point I am trying to highlight is that the connection is initiated from teh 12.180.11.111 to 216.235.190.218 to port 443 whereas the packet-tracer was run the other way round with the ports exchanged.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So my understanding of the application is that the system 216.235.190.218 is communicating on port 443 and the 12.180.11.111 is not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please run the packet-tracer as "packet-tracer input inside tcp 10.1.5.115 64431 216.235.190.218 443 detailed" and provide the output.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please change the ACL from "access-list Outside_access_in extended permit tcp host 216.235.190.218 host 12.180.11.111 eq https log" to&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"access-list Outside_access_in extended permit tcp host 216.235.190.218 eq https host 12.180.11.111&amp;nbsp; log" and let us know if it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Namit&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Sep 2010 03:48:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-quot-stateful-packet-inspection-quot-on-asa-5510/m-p/1579399#M803990</guid>
      <dc:creator>Namit Agarwal</dc:creator>
      <dc:date>2010-09-22T03:48:07Z</dc:date>
    </item>
    <item>
      <title>Re: Disable "Stateful Packet Inspection" on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/disable-quot-stateful-packet-inspection-quot-on-asa-5510/m-p/1579400#M803992</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The iPrism ended up being the root cause of the problem.&amp;nbsp; We set a "do not scan" flag on the iPrism for the inside IP of the server and it cleared the errors. Sorry for not mentioning this network appliance in the first place.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks to everyone for the help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Sep 2010 15:10:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-quot-stateful-packet-inspection-quot-on-asa-5510/m-p/1579400#M803992</guid>
      <dc:creator>nwhitesel</dc:creator>
      <dc:date>2010-09-22T15:10:57Z</dc:date>
    </item>
  </channel>
</rss>

