<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5510 Not Receiving Internally Inbound in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-not-receiving-internally-inbound/m-p/1365909#M829932</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1) Is there any hitcount on your outside ACL for the traffic that you test? "show access-list outside_access_in"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Please turn on logging, and see if you have any error logs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) I would also try "clear xlate" just in case you have other type of xlate in the xlate table prior to the new configuration.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 22 Mar 2010 04:32:06 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2010-03-22T04:32:06Z</dc:date>
    <item>
      <title>ASA 5510 Not Receiving Internally Inbound</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-not-receiving-internally-inbound/m-p/1365908#M829910</link>
      <description>&lt;P&gt;ASA 5510 7.21 -- it's driving me crazy!&amp;nbsp; &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The device itself can ping and be pinged, so internet connectivity is good.&amp;nbsp; The packet trace function says the inbound traffic *should* be permitted "RESULT - The packet is allowed." for any number of protocols I test, and the same with outbound traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, nothing gets through.&amp;nbsp; Logging shows outbound connections get SYN timeouts, and inbound connections never reach the firewall itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It *seems* as if the firewall is not recognizing inbound requests for IP addresses it has NAT rules for.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are multiple firewalls on the same internet routed segment, but the other firewalls all accept their inbound requests for the IPs that reside in their NAT lists without any problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have enabled Proxy ARP on the external interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What am I missing?&amp;nbsp; Thanks in advance!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;names&lt;BR /&gt;name 64.15.112.86 VL description VLremote&lt;BR /&gt;name 69.220.176.251 comgmt description Monitoring Server&lt;BR /&gt;dns-guard&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 69.220.176.235 255.255.255.192&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.1.1.35 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0&lt;BR /&gt; management-only&lt;BR /&gt;!&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; name-server 10.1.1.41&lt;BR /&gt; name-server 10.1.1.42&lt;BR /&gt; domain-name ilsasp.com&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group network CitrixServers&lt;BR /&gt; description Citrix Xen App Servers&lt;BR /&gt; network-object host 69.220.176.244&lt;BR /&gt; network-object host 69.220.176.245&lt;BR /&gt; network-object host 69.220.176.246&lt;BR /&gt;object-group network DBservers&lt;BR /&gt; description database servers&lt;BR /&gt; network-object host 10.1.1.43&lt;BR /&gt; network-object host 10.1.1.48&lt;BR /&gt;object-group network HostingLocs&lt;BR /&gt; description Locations involved in monitoring&lt;BR /&gt; network-object 66.77.28.128 255.255.255.224&lt;BR /&gt; network-object 69.220.176.192 255.255.255.192&lt;BR /&gt; network-object host 66.9.111.7&lt;BR /&gt; network-object host 66.9.111.8&lt;BR /&gt;object-group network ILSrhowell&lt;BR /&gt; description ILS db admin access&lt;BR /&gt; network-object host 206.27.25.14&lt;BR /&gt; network-object 210.157.151.0 255.255.255.0&lt;BR /&gt; network-object host 212.11.55.124&lt;BR /&gt;object-group network colocs&lt;BR /&gt; description co secure remote locations&lt;BR /&gt; network-object host 209.46.39.207&lt;BR /&gt; network-object host 209.46.39.208&lt;BR /&gt;object-group network WebServers&lt;BR /&gt; description Servers hosting web applications&lt;BR /&gt; network-object host 69.220.176.233&lt;BR /&gt; network-object host 69.220.176.243&lt;BR /&gt; network-object host comgmt&lt;BR /&gt;object-group service citrix-sr tcp&lt;BR /&gt; description SessionReliability&lt;BR /&gt; port-object range 2598 2598&lt;BR /&gt;object-group service citrix-xml tcp&lt;BR /&gt; description XML&lt;BR /&gt; port-object range 5321 5321&lt;BR /&gt;object-group service CitrixXenApp tcp&lt;BR /&gt; description All XenApp Services&lt;BR /&gt; port-object eq citrix-ica&lt;BR /&gt; group-object citrix-sr&lt;BR /&gt; group-object citrix-xml&lt;BR /&gt;object-group service DBmgmt tcp&lt;BR /&gt; description ftp and rdp for ils db server management&lt;BR /&gt; port-object eq ftp-data&lt;BR /&gt; port-object eq ftp&lt;BR /&gt; port-object range 3389 3389&lt;BR /&gt;object-group service cimweb tcp&lt;BR /&gt; description Insight Manager Web Access&lt;BR /&gt; port-object range 2301 2301&lt;BR /&gt;object-group service cim tcp&lt;BR /&gt; description Insight Manager&lt;BR /&gt; port-object range 280 280&lt;BR /&gt; group-object cimweb&lt;BR /&gt;object-group service coservices tcp&lt;BR /&gt; description Services allowed to secure co locations&lt;BR /&gt; group-object CitrixXenApp&lt;BR /&gt; port-object eq ftp-data&lt;BR /&gt; port-object eq ftp&lt;BR /&gt; port-object eq telnet&lt;BR /&gt; port-object range 3389 3389&lt;BR /&gt; port-object eq https&lt;BR /&gt; port-object eq echo&lt;BR /&gt; port-object eq www&lt;BR /&gt; group-object cim&lt;BR /&gt;object-group service coservicesudp udp&lt;BR /&gt; description UPD services permitted to secure co locations&lt;BR /&gt; port-object eq time&lt;BR /&gt; port-object eq echo&lt;BR /&gt;object-group service MonitoringTCP tcp&lt;BR /&gt; description TCP based monitoring services&lt;BR /&gt; port-object eq echo&lt;BR /&gt; group-object cim&lt;BR /&gt;object-group service MonitoringUDP udp&lt;BR /&gt; description Monitoring services via UDP&lt;BR /&gt; port-object eq snmp&lt;BR /&gt; port-object eq snmptrap&lt;BR /&gt; port-object eq echo&lt;BR /&gt;object-group service WebPorts tcp&lt;BR /&gt; description http and https&lt;BR /&gt; port-object eq https&lt;BR /&gt; port-object eq www&lt;BR /&gt;object-group network AllInternal&lt;BR /&gt; description All internal IPs permitted outbound&lt;BR /&gt; network-object 10.1.1.0 255.255.255.0&lt;BR /&gt; network-object 69.220.176.192 255.255.255.192&lt;BR /&gt;access-list outside_access_in remark Citrix PS aka XenApp&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group CitrixServers&lt;BR /&gt; object-group CitrixXenApp&lt;BR /&gt;access-list outside_access_in extended permit tcp object-group ILSrhowell object&lt;BR /&gt;-group DBservers object-group DBmgmt&lt;BR /&gt;access-list outside_access_in remark Permitted access from co secure locs via T&lt;BR /&gt;CP&lt;BR /&gt;access-list outside_access_in extended permit tcp object-group colocs any objec&lt;BR /&gt;t-group coservices&lt;BR /&gt;access-list outside_access_in remark Permitted access from co secure locs via U&lt;BR /&gt;DP&lt;BR /&gt;access-list outside_access_in extended permit udp object-group colocs any objec&lt;BR /&gt;t-group coservicesudp&lt;BR /&gt;access-list outside_access_in extended permit ip host VL any&lt;BR /&gt;access-list outside_access_in remark General web server access&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group WebServers ob&lt;BR /&gt;ject-group WebPorts&lt;BR /&gt;access-list outside_access_in remark Mail alerts from Brewer&lt;BR /&gt;access-list outside_access_in extended permit tcp host 69.220.176.225 host comgmt&lt;BR /&gt; eq smtp&lt;BR /&gt;access-list outside_access_in remark TCP monitoring&lt;BR /&gt;access-list outside_access_in extended permit tcp object-group HostingLocs host&lt;BR /&gt;comgmt object-group MonitoringTCP&lt;BR /&gt;access-list outside_access_in remark UDP monitoring&lt;BR /&gt;access-list outside_access_in extended permit udp object-group HostingLocs host&lt;BR /&gt;comgmt object-group MonitoringUDP&lt;BR /&gt;access-list outside_access_out extended permit ip object-group AllInternal any&lt;BR /&gt;access-list inside_access_in remark Permit all outbound.&lt;BR /&gt;access-list inside_access_in extended permit ip object-group AllInternal any&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat-control&lt;BR /&gt;global (outside) 101 interface&lt;BR /&gt;nat (inside) 101 10.1.1.128 255.255.255.128&lt;BR /&gt;static (inside,outside) comgmt 10.1.1.51 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) 69.220.176.252 10.1.1.52 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) 69.220.176.233 10.1.1.33 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) 69.220.176.232 10.1.1.32 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) 69.220.176.234 10.1.1.34 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) 69.220.176.241 10.1.1.41 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) 69.220.176.242 10.1.1.42 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) 69.220.176.243 10.1.1.43 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) 69.220.176.244 10.1.1.44 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) 69.220.176.245 10.1.1.45 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) 69.220.176.246 10.1.1.46 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) 69.220.176.248 10.1.1.48 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) 69.220.176.236 10.1.1.36 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) 69.220.176.237 10.1.1.37 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) 69.220.176.238 10.1.1.38 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) 69.220.176.250 10.1.1.50 netmask 255.255.255.255&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group outside_access_out out interface outside&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 69.220.176.193 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns migrated_dns_map_1&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:24:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-not-receiving-internally-inbound/m-p/1365908#M829910</guid>
      <dc:creator>vemlyon</dc:creator>
      <dc:date>2019-03-11T17:24:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Not Receiving Internally Inbound</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-not-receiving-internally-inbound/m-p/1365909#M829932</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1) Is there any hitcount on your outside ACL for the traffic that you test? "show access-list outside_access_in"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Please turn on logging, and see if you have any error logs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) I would also try "clear xlate" just in case you have other type of xlate in the xlate table prior to the new configuration.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Mar 2010 04:32:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-not-receiving-internally-inbound/m-p/1365909#M829932</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-03-22T04:32:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Not Receiving Internally Inbound</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-not-receiving-internally-inbound/m-p/1365910#M829961</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmm...&amp;nbsp; I suspect you came close with the xlate -- after trying to figure this out all afternoon, I left it alone to do some other work while I waited to see if anybody would answer here, and when I went to look at the log...&amp;nbsp; it was working!&amp;nbsp; Something was cached somewhere that was causing problems.&amp;nbsp; Not sure exactly what, as this is a new box (just configured today), possibly something in an ISP router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Mar 2010 04:49:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-not-receiving-internally-inbound/m-p/1365910#M829961</guid>
      <dc:creator>vemlyon</dc:creator>
      <dc:date>2010-03-22T04:49:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Not Receiving Internally Inbound</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-not-receiving-internally-inbound/m-p/1365911#M829995</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great to hear, thanks for your update.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Mar 2010 04:53:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-not-receiving-internally-inbound/m-p/1365911#M829995</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-03-22T04:53:40Z</dc:date>
    </item>
  </channel>
</rss>

