<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Drop-reason: (acl-drop) Flow is denied by configured rule in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/3753610#M8730</link>
    <description>&lt;P&gt;hi mkazam001 i thought the nat problem issue as if you see the nat statement its wrong?&lt;/P&gt;</description>
    <pubDate>Tue, 27 Nov 2018 15:01:20 GMT</pubDate>
    <dc:creator>Sheraz.Salim</dc:creator>
    <dc:date>2018-11-27T15:01:20Z</dc:date>
    <item>
      <title>Drop-reason: (acl-drop) Flow is denied by configured rule</title>
      <link>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/3753382#M8724</link>
      <description>&lt;P&gt;Actually, I want to allow FTP from outside to inside, but the packet tracer display "Drop-reason: (acl-drop) Flow is denied by configured rule".&amp;nbsp;&amp;nbsp;&amp;nbsp;I must be wrong something.&amp;nbsp; I have attached my config.&amp;nbsp; Any assistance would be greatly appreciated.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:30:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/3753382#M8724</guid>
      <dc:creator>CY Ko</dc:creator>
      <dc:date>2020-02-21T16:30:28Z</dc:date>
    </item>
    <item>
      <title>Re: Drop-reason: (acl-drop) Flow is denied by configured rule</title>
      <link>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/3753504#M8725</link>
      <description>&lt;P&gt;try this&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network ANY&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (outside,inside) source dynamic ANY&amp;nbsp;&amp;nbsp; interface destination static FTP_Inside FTP_Inside service FTP FTP&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&amp;nbsp;&amp;nbsp;&amp;nbsp; --------&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;"Where ANY is outside world could be any public ip address and interface mean your ASA outside interface"&lt;/P&gt;
&lt;P&gt;also&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;remove this&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no same-security-traffic permit inter-interface&lt;BR /&gt;no same-security-traffic permit intra-interface&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;make sure you do this in change window.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Nov 2018 12:57:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/3753504#M8725</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2018-11-27T12:57:49Z</dc:date>
    </item>
    <item>
      <title>Re: Drop-reason: (acl-drop) Flow is denied by configured rule</title>
      <link>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/3753527#M8726</link>
      <description>&lt;P&gt;I had a look on your config here are my thoughts&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;ASA Version 9.1(2) &lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address dhcp &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.254 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;//////////////////////NO NEED TO THESE COMMAND////////&lt;BR /&gt;no same-security-traffic permit inter-interface&lt;BR /&gt;no same-security-traffic permit intra-interface&lt;BR /&gt;/////////////////////////////////////////////////////////&lt;BR /&gt;!&lt;BR /&gt;object network INSIDE_SUBNET&lt;BR /&gt;&amp;nbsp;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;nat (inside,outside) source dynamic any interface&lt;BR /&gt;!&lt;BR /&gt;object service FTP&lt;BR /&gt;&amp;nbsp;service tcp destination eq ftp &lt;BR /&gt;!&lt;BR /&gt;object network FTP_Inside (TRY THIS- DO packet tracer input outside tcp 8.8.8.8 12345 192.168.1.24 ftp detail)&lt;BR /&gt;&amp;nbsp;host 192.168.1.24&lt;BR /&gt;&amp;nbsp; nat (inside,outside) static interface service tcp ftp ftp /////THIS RULE WILL CONNTED THE OUTSIDE CLIENT to ASA OUTSIDE INTERFACE IP, THAN ASA WILL MAPPED THE OUTSIDE IP TO FTP_Inside//////&lt;BR /&gt;!&lt;BR /&gt;object network FTP_Outside&lt;BR /&gt;&amp;nbsp;host x.x.x.x&amp;nbsp;&amp;nbsp; (Public IP??)&lt;BR /&gt;!&lt;BR /&gt;object service Passive_FTP&lt;BR /&gt;&amp;nbsp;service tcp destination range 30000 35000&lt;BR /&gt;! &lt;BR /&gt;object service passive_FTP&lt;BR /&gt;&amp;nbsp;service tcp destination range 30000 35000 &lt;BR /&gt;!&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt;&amp;nbsp;protocol-object udp&lt;BR /&gt;&amp;nbsp;protocol-object tcp&lt;BR /&gt;!&lt;BR /&gt;////&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host 192.168.1.24&lt;BR /&gt;////&lt;BR /&gt;no access-list Outside_access_in extended permit tcp object FTP_Outside object FTP_Inside eq ftp &lt;BR /&gt;no access-list Outside_access_in extended permit tcp object FTP_Outside object FTP_Inside eq ftp-data &lt;BR /&gt;no access-list Outside_access_in extended permit tcp any object FTP_Outside eq ftp &lt;BR /&gt;///////////////////////////////////////////////&lt;BR /&gt;&lt;BR /&gt;/////You dont need this as traffic from inside to outside (higher to lower) does not need access-rule////&lt;BR /&gt;no access-list inside_access_in extended permit ip any any &lt;BR /&gt;///////////////////////////////////////////////////////////&lt;BR /&gt;access-list global_access extended permit tcp any any &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;//////////////////////////////////DONT NEED THIS//////////////////////&lt;BR /&gt;nat (outside,outside) source dynamic any interface destination static FTP_Inside FTP_Inside service FTP FTP&lt;BR /&gt;/////////////////////////////////////////////////////////////////////////////////////////////////////////////&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;access-group Outside_access_in in interface outside&lt;BR /&gt;&lt;BR /&gt;/////////////////////////////////NO NEED THIS////////////////////&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;/////////////////////////////////////////////////////////////////////////&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;access-group global_access global&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 x.x.x.x 1&lt;/P&gt;</description>
      <pubDate>Tue, 27 Nov 2018 13:34:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/3753527#M8726</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2018-11-27T13:34:34Z</dc:date>
    </item>
    <item>
      <title>Re: Drop-reason: (acl-drop) Flow is denied by configured rule</title>
      <link>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/3753597#M8728</link>
      <description>&lt;P&gt;you need these cmds to allow the asa to keep the connections in the state table:&lt;/P&gt;
&lt;P&gt;policy-map global_policy&lt;/P&gt;
&lt;P&gt;class inspection_default&lt;/P&gt;
&lt;P&gt;inspect ftp&lt;/P&gt;
&lt;P&gt;ensure you have both of these in the object group:&lt;/P&gt;
&lt;P&gt;object-group service obj-ftp tcp&lt;/P&gt;
&lt;P&gt;port-object eq ftp&lt;/P&gt;
&lt;P&gt;port-object eq ftp-data&lt;/P&gt;
&lt;P&gt;access-list outside-in extended permit tcp any host ftp-svr-ip object-group obj-ftp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - enter actual svr ip &lt;/P&gt;
&lt;P&gt;try packet-tracer input outside tcp source-ip 12345 ftp-svr-ip 21 det - to get info on where the problem may lie&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - enter actual ftp server ip&lt;/P&gt;
&lt;P&gt;regards, mk&lt;/P&gt;
&lt;P&gt;please rate if helpful or solved &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Nov 2018 14:51:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/3753597#M8728</guid>
      <dc:creator>mkazam001</dc:creator>
      <dc:date>2018-11-27T14:51:40Z</dc:date>
    </item>
    <item>
      <title>Re: Drop-reason: (acl-drop) Flow is denied by configured rule</title>
      <link>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/3753610#M8730</link>
      <description>&lt;P&gt;hi mkazam001 i thought the nat problem issue as if you see the nat statement its wrong?&lt;/P&gt;</description>
      <pubDate>Tue, 27 Nov 2018 15:01:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/3753610#M8730</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2018-11-27T15:01:20Z</dc:date>
    </item>
    <item>
      <title>Re: Drop-reason: (acl-drop) Flow is denied by configured rule</title>
      <link>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/3753624#M8732</link>
      <description>&lt;P&gt;i didn't mention that as you already had - nat (outside,outside) is incorrect&lt;/P&gt;
&lt;P&gt;regards, mk&lt;/P&gt;</description>
      <pubDate>Tue, 27 Nov 2018 15:09:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/3753624#M8732</guid>
      <dc:creator>mkazam001</dc:creator>
      <dc:date>2018-11-27T15:09:11Z</dc:date>
    </item>
    <item>
      <title>Re: Drop-reason: (acl-drop) Flow is denied by configured rule</title>
      <link>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/3754017#M8734</link>
      <description>Dear sherazrose,&lt;BR /&gt;&lt;BR /&gt;1. object network FTP_Inside (TRY THIS- DO packet tracer input outside tcp 8.8.8.8 12345 192.168.1.24 ftp detail)&lt;BR /&gt; host 192.168.1.24&lt;BR /&gt;Ans: It still the same problem.&lt;BR /&gt;&lt;BR /&gt;2. host x.x.x.x   (Public IP??)&lt;BR /&gt;Ans:Yes&lt;BR /&gt;&lt;BR /&gt;What should I next step? Thanks.</description>
      <pubDate>Wed, 28 Nov 2018 02:08:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/3754017#M8734</guid>
      <dc:creator>CY Ko</dc:creator>
      <dc:date>2018-11-28T02:08:30Z</dc:date>
    </item>
    <item>
      <title>Re: Drop-reason: (acl-drop) Flow is denied by configured rule</title>
      <link>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/3754056#M8736</link>
      <description>&lt;P&gt;looks like, it should be nat issue. and also use "object-group's" instead of "object network's" to be more clear with config.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;creat an object grroup for ftp ports and add them in it and then use in acl to allow.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Nov 2018 04:13:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/3754056#M8736</guid>
      <dc:creator>venkat_n7</dc:creator>
      <dc:date>2018-11-28T04:13:05Z</dc:date>
    </item>
    <item>
      <title>Re: Drop-reason: (acl-drop) Flow is denied by configured rule</title>
      <link>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/3754086#M8802</link>
      <description>Dear mkazam001,&lt;BR /&gt;&lt;BR /&gt;After that, it still the same problem. Do you have any idea what's problem is it?</description>
      <pubDate>Wed, 28 Nov 2018 06:08:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/3754086#M8802</guid>
      <dc:creator>CY Ko</dc:creator>
      <dc:date>2018-11-28T06:08:32Z</dc:date>
    </item>
    <item>
      <title>Re: Drop-reason: (acl-drop) Flow is denied by configured rule</title>
      <link>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/3754436#M8804</link>
      <description>&lt;P&gt;yes fix you nat statement.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Nov 2018 15:31:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/3754436#M8804</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2018-11-28T15:31:04Z</dc:date>
    </item>
    <item>
      <title>Re: Drop-reason: (acl-drop) Flow is denied by configured rule</title>
      <link>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/5258609#M1119430</link>
      <description>&lt;P&gt;access-list acl-outside extended permit tcp 103.214.158.32 255.255.255.252 host 10.156.2.142 eq https&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;object network NAT-10.156.2.142_138.107.12.93&lt;BR /&gt;nat (DMZ-1,OUTSIDE) static 138.107.12.93&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: OUTSIDE&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: DMZ-1&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2025 08:38:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/drop-reason-acl-drop-flow-is-denied-by-configured-rule/m-p/5258609#M1119430</guid>
      <dc:creator>hanumat-lodha</dc:creator>
      <dc:date>2025-02-10T08:38:01Z</dc:date>
    </item>
  </channel>
</rss>

