<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASDM Syslog messages in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asdm-syslog-messages/m-p/1171570#M874683</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;B&gt;Is that why the portmap translation has failed?&lt;/B&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This means there is no translation defined in the asa for this traffic between the two hosts going through  asa INSIDE interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if you are terminating an Ipsec tunnel somewhere in your inside interface by another device as you indicated and want the far end of the tunnel talk to hosts on your ASA inside 31.0 traversing INSIDE interface sort of like a U-turn for the traffic you would need to allow that traffic in asa through nonat exempt rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this would be an example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat_traffic  extended permit ip X.X.0.0 &lt;MASK&gt;  X.X.31.0 &lt;MASK&gt;&lt;/MASK&gt;&lt;/MASK&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (INSIDE) 0 access-list nonat_traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 24 Mar 2009 19:29:33 GMT</pubDate>
    <dc:creator>JORGE RODRIGUEZ</dc:creator>
    <dc:date>2009-03-24T19:29:33Z</dc:date>
    <item>
      <title>ASDM Syslog messages</title>
      <link>https://community.cisco.com/t5/network-security/asdm-syslog-messages/m-p/1171567#M874680</link>
      <description>&lt;P&gt;I am looking for information on what is the significance of type and code on syslog messages.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3	Mar 23 2009	22:42:36	305006	192.168.0.2		 portmap translation creation failed for icmp src INSIDE:X.X.31.10 dst INSIDE:X.X.0.2 (type 8, code 0)&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 15:09:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-syslog-messages/m-p/1171567#M874680</guid>
      <dc:creator>wesleyfry</dc:creator>
      <dc:date>2019-03-11T15:09:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASDM Syslog messages</title>
      <link>https://community.cisco.com/t5/network-security/asdm-syslog-messages/m-p/1171568#M874681</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;B&gt;portmap translation creation failed for icmp src INSIDE:X.X.31.10 dst INSIDE:X.X.0.2 &lt;/B&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is some info for that 305006 message&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa80/system/message/logmsgs.html#wp4770951" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/system/message/logmsgs.html#wp4770951&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ICMP message 0  is Echo Reply message and 8 is Echo message:&lt;/P&gt;&lt;P&gt;Have a look at icmp Types codes RFC-792&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.faqs.org/rfcs/rfc792.html" target="_blank"&gt;http://www.faqs.org/rfcs/rfc792.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My interpretation for your syslog message seeing the source X.X.31.10 and destination it seems as icmp is comming perhaps from another router from the INSIDE of the ASA? can you provide info on your topology with regards to these two networks to help you better if there is a problem with communication between these two nets, but seems that source x.x.31.10 is from different source/network behind asa traversing the same INSIDE interface not directly connected to INSIDE, by which in this case if ou expect this hosts network x.x.31.0 to communicate with x.x.0.2 hots/network you will need to configure couple of nat exempt rules in addition to same security trafic intra interface command statemens.   &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Mar 2009 04:09:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-syslog-messages/m-p/1171568#M874681</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2009-03-24T04:09:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASDM Syslog messages</title>
      <link>https://community.cisco.com/t5/network-security/asdm-syslog-messages/m-p/1171569#M874682</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply. The 31.0 is an internal network and the 0.2 is and a remote site where the VPN terminates on the inside on a different router.  The ICMP traffic is NMS related, but the  0.2 subnet does not exist.  Is that why the portmap translation has failed?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Mar 2009 17:20:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-syslog-messages/m-p/1171569#M874682</guid>
      <dc:creator>wesleyfry</dc:creator>
      <dc:date>2009-03-24T17:20:08Z</dc:date>
    </item>
    <item>
      <title>Re: ASDM Syslog messages</title>
      <link>https://community.cisco.com/t5/network-security/asdm-syslog-messages/m-p/1171570#M874683</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;B&gt;Is that why the portmap translation has failed?&lt;/B&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This means there is no translation defined in the asa for this traffic between the two hosts going through  asa INSIDE interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if you are terminating an Ipsec tunnel somewhere in your inside interface by another device as you indicated and want the far end of the tunnel talk to hosts on your ASA inside 31.0 traversing INSIDE interface sort of like a U-turn for the traffic you would need to allow that traffic in asa through nonat exempt rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this would be an example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat_traffic  extended permit ip X.X.0.0 &lt;MASK&gt;  X.X.31.0 &lt;MASK&gt;&lt;/MASK&gt;&lt;/MASK&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (INSIDE) 0 access-list nonat_traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Mar 2009 19:29:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-syslog-messages/m-p/1171570#M874683</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2009-03-24T19:29:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASDM Syslog messages</title>
      <link>https://community.cisco.com/t5/network-security/asdm-syslog-messages/m-p/1171571#M874684</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your assitance Jorge!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Mar 2009 22:35:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-syslog-messages/m-p/1171571#M874684</guid>
      <dc:creator>wesleyfry</dc:creator>
      <dc:date>2009-03-25T22:35:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASDM Syslog messages</title>
      <link>https://community.cisco.com/t5/network-security/asdm-syslog-messages/m-p/1171572#M874685</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Wes, you're very welcome.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Mar 2009 01:05:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-syslog-messages/m-p/1171572#M874685</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2009-03-26T01:05:06Z</dc:date>
    </item>
  </channel>
</rss>

