<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Inbound traffice problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/inbound-traffice-problem/m-p/1205914#M877039</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Could you please rewrite your outside_access_in  in the following way.&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host &lt;OUTSIDE_IPADRESS&gt; eq imap4 &lt;/OUTSIDE_IPADRESS&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host &lt;OUTSIDE_IPADRESS&gt;  eq smtp &lt;/OUTSIDE_IPADRESS&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host &lt;OUTSIDE_IPADRESS&gt; eq www&lt;/OUTSIDE_IPADRESS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please replace  &lt;OUTSIDE_IPADRESS&gt; with your outside IP address&lt;/OUTSIDE_IPADRESS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this will solve the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Jithesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 30 Jan 2009 10:32:22 GMT</pubDate>
    <dc:creator>Jithesh K Joy</dc:creator>
    <dc:date>2009-01-30T10:32:22Z</dc:date>
    <item>
      <title>Inbound traffice problem</title>
      <link>https://community.cisco.com/t5/network-security/inbound-traffice-problem/m-p/1205913#M877038</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a problem with inbound traffic. I have setup my firewall to allow traffic on http, imap4 and smtp ports. But I can't get through. Am I missing anything? Or did I do something wrong? My SSL VPN works no problem. Any help will be appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a part of config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;name 192.168.2.101 Server&lt;/P&gt;&lt;P&gt;name 192.168.2.103 Mail&lt;/P&gt;&lt;P&gt;name 192.168.2.102 Spam&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; description Internet&lt;/P&gt;&lt;P&gt; nameif Outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address *.*.*.* 255.255.255.248 &lt;/P&gt;&lt;P&gt; ospf cost 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; description Intranet&lt;/P&gt;&lt;P&gt; nameif Inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.2.104 255.255.255.0 &lt;/P&gt;&lt;P&gt; ospf cost 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; ospf cost 10&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa804-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name *****************&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip 192.168.2.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface Outside eq imap4 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface Outside eq smtp &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface Outside eq www &lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl extended permit ip 192.168.2.0 255.255.255.0 192.168.15.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list VPN-Split-Tunnel standard permit 192.168.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu Outside 1500&lt;/P&gt;&lt;P&gt;mtu Inside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;ip local pool AnyConnect 192.168.15.100-192.168.15.150 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-615.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (Outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (Inside) 0 access-list inside_outbound_nat0_acl&lt;/P&gt;&lt;P&gt;nat (Inside) 1 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Inside,Outside) tcp interface smtp Spam smtp netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Inside,Outside) tcp interface imap4 Mail imap4 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Inside,Outside) tcp interface www Server www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface Outside&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface Inside&lt;/P&gt;&lt;P&gt;route Outside 0.0.0.0 0.0.0.0 *.*.*.* 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa-server AnyConnect protocol radius&lt;/P&gt;&lt;P&gt;aaa-server AnyConnect (Inside) host Server&lt;/P&gt;&lt;P&gt; key ************************&lt;/P&gt;&lt;P&gt; radius-common-pw **********************&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.2.0 255.255.255.0 Inside&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;no crypto isakmp nat-traversal&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:44:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-traffice-problem/m-p/1205913#M877038</guid>
      <dc:creator>energyservices</dc:creator>
      <dc:date>2019-03-11T14:44:08Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound traffice problem</title>
      <link>https://community.cisco.com/t5/network-security/inbound-traffice-problem/m-p/1205914#M877039</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Could you please rewrite your outside_access_in  in the following way.&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host &lt;OUTSIDE_IPADRESS&gt; eq imap4 &lt;/OUTSIDE_IPADRESS&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host &lt;OUTSIDE_IPADRESS&gt;  eq smtp &lt;/OUTSIDE_IPADRESS&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host &lt;OUTSIDE_IPADRESS&gt; eq www&lt;/OUTSIDE_IPADRESS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please replace  &lt;OUTSIDE_IPADRESS&gt; with your outside IP address&lt;/OUTSIDE_IPADRESS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this will solve the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Jithesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Jan 2009 10:32:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-traffice-problem/m-p/1205914#M877039</guid>
      <dc:creator>Jithesh K Joy</dc:creator>
      <dc:date>2009-01-30T10:32:22Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound traffice problem</title>
      <link>https://community.cisco.com/t5/network-security/inbound-traffice-problem/m-p/1205915#M877040</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface Outside eq imap4 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface Outside eq smtp &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface Outside eq www &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These access rules are allowing imap4, SMTP and HTTP access to the outside interface of the firewall. Why do you want to do this? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"interface Outside" needs to be replaced with the public IP addresses of the corresponding servers. For example, for assuming your webserver has 1.1.1.1 as its public IP, repalce "interface Outside" with "host 1.1.1.1"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And please do not forget to do the same for the other servers as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Muath&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Jan 2009 11:47:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-traffice-problem/m-p/1205915#M877040</guid>
      <dc:creator>Mo'ath Al Rawashdeh</dc:creator>
      <dc:date>2009-01-30T11:47:01Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound traffice problem</title>
      <link>https://community.cisco.com/t5/network-security/inbound-traffice-problem/m-p/1205916#M877041</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for help guys. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My web server doesn't have a public IP. I'm using NAT. This is the reason I'm using interface Outside as it is a public IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think what I'm missing is the statement when it says all http traffic should go to web server. Is that right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Jan 2009 17:03:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-traffice-problem/m-p/1205916#M877041</guid>
      <dc:creator>energyservices</dc:creator>
      <dc:date>2009-01-30T17:03:09Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound traffice problem</title>
      <link>https://community.cisco.com/t5/network-security/inbound-traffice-problem/m-p/1205917#M877042</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your posted configuration looks correct to me.  Are you sure that 192.168.2.101 is the correct IP for your web server and it is listening on port 80?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would try enabling the logging buffer and see if there are any messages being generated during inbound connection attempts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Jan 2009 19:05:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-traffice-problem/m-p/1205917#M877042</guid>
      <dc:creator>eddie.mitchell</dc:creator>
      <dc:date>2009-01-30T19:05:13Z</dc:date>
    </item>
  </channel>
</rss>

