<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Inbound and outbound traffic at the same interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130142#M893134</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT-EXEMPT&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;  match ip inside 10.0.0.0 255.255.255.0 inside 62.97.89.192 255.255.255.192&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 57, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in  id=0xd56ac6c8, priority=6, domain=nat-exempt, deny=false&lt;/P&gt;&lt;P&gt;        hits=56, user_data=0xd5a93390, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;        src ip=10.0.0.0, mask=255.255.255.0, port=0&lt;/P&gt;&lt;P&gt;        dst ip=62.97.89.192, mask=255.255.255.192, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;  match ip inside any inside any&lt;/P&gt;&lt;P&gt;    dynamic translation to pool 101 (No matching global)&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in  id=0xd45d1b80, priority=1, domain=nat, deny=false&lt;/P&gt;&lt;P&gt;        hits=257, user_data=0xd45d1ae0, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;        src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;        dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;  match ip inside any outside any&lt;/P&gt;&lt;P&gt;    dynamic translation to pool 101 (62.97.74.50 [Interface PAT])&lt;/P&gt;&lt;P&gt;    translate_hits = 853, untranslate_hits = 38&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in  id=0xd45d17c8, priority=1, domain=host, deny=false&lt;/P&gt;&lt;P&gt;        hits=16941, user_data=0xd55170d0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;        src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;        dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;  match ip inside any inside any&lt;/P&gt;&lt;P&gt;    dynamic translation to pool 101 (No matching global)&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; out id=0xd56ab510, priority=1, domain=nat-reverse, deny=false&lt;/P&gt;&lt;P&gt;        hits=117, user_data=0xd45d1ae0, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;        src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;        dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 25 Nov 2008 12:24:29 GMT</pubDate>
    <dc:creator>elecorbalan</dc:creator>
    <dc:date>2008-11-25T12:24:29Z</dc:date>
    <item>
      <title>Inbound and outbound traffic at the same interface</title>
      <link>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130130#M893112</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I pass default traffic from inside to outside interface. Also I have to pass inside traffic back to inside interface to get some servers. I have configured default route to outside and a route to this servers subnet to inside. &lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 --.74.49 1&lt;/P&gt;&lt;P&gt;route inside --.89.192 255.255.255.192 10.0.0.1 1&lt;/P&gt;&lt;P&gt;I have also configured &lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;clear xlate&lt;/P&gt;&lt;P&gt;But traffic icmp does not pass through and I can ping the server from the firewall.&lt;/P&gt;&lt;P&gt;Do I forget any command?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:17:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130130#M893112</guid>
      <dc:creator>elecorbalan</dc:creator>
      <dc:date>2019-03-11T14:17:22Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound and outbound traffic at the same interface</title>
      <link>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130131#M893114</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you give more details about the problem/topology...your question is not clear (atleast to me).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Nov 2008 13:45:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130131#M893114</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-11-24T13:45:32Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound and outbound traffic at the same interface</title>
      <link>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130132#M893116</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, of course.&lt;/P&gt;&lt;P&gt;I have as default gateway for LAN PCs the inside ASA interface 10.0.0.22&lt;/P&gt;&lt;P&gt;But this PCs need access to server on a DMZ not configured in the ASA. The address to this DMZ is --.89.192 255.255.255.192&lt;/P&gt;&lt;P&gt;This DMZ is reached through the ASA inside interface.&lt;/P&gt;&lt;P&gt;To ping an DMZ server from a PC 10.0.0.114, the packet must arrive to ASA inside interface check a static route, and then get out from the same inside interface.&lt;/P&gt;&lt;P&gt;I can ping from ASA to a DMZ server, but I cannot ping from a PC to a server.&lt;/P&gt;&lt;P&gt;The config I have is:&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address --.74.50 255.255.255.252 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.0.0.22 255.255.255.0 &lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any --.74.48 255.255.255.252 echo-reply &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit udp object-group DM_INLINE_NETWORK_1 any eq domain &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp 10.0.0.0 255.255.255.0 any object-group DM_INLINE_TCP_1 &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit icmp any any echo &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended deny ip any any &lt;/P&gt;&lt;P&gt;icmp permit any echo outside&lt;/P&gt;&lt;P&gt;icmp permit any echo-reply outside&lt;/P&gt;&lt;P&gt;icmp permit any echo-reply inside&lt;/P&gt;&lt;P&gt;icmp permit any echo inside&lt;/P&gt;&lt;P&gt;global (outside) 101 interface&lt;/P&gt;&lt;P&gt;nat (inside) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 --.74.49 1&lt;/P&gt;&lt;P&gt;route inside --.89.192 255.255.255.192 10.0.0.1 1&lt;/P&gt;&lt;P&gt;priority-queue outside&lt;/P&gt;&lt;P&gt;  tx-ring-limit 256&lt;/P&gt;&lt;P&gt;priority-queue inside&lt;/P&gt;&lt;P&gt;  tx-ring-limit 256&lt;/P&gt;&lt;P&gt;class-map TunelVPNmap&lt;/P&gt;&lt;P&gt; match tunnel-group TunelVPN&lt;/P&gt;&lt;P&gt;policy-map TunelVPNpol&lt;/P&gt;&lt;P&gt; class TunelVPNmap&lt;/P&gt;&lt;P&gt;  priority&lt;/P&gt;&lt;P&gt;service-policy TunelVPNpol interface outside&lt;/P&gt;&lt;P&gt;service-policy TunelVPNpol interface inside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Nov 2008 14:39:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130132#M893116</guid>
      <dc:creator>elecorbalan</dc:creator>
      <dc:date>2008-11-24T14:39:35Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound and outbound traffic at the same interface</title>
      <link>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130133#M893118</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;how is there a dmz reachable on the inside interface of your ASA?&lt;/P&gt;&lt;P&gt;is there an internal router/L3 switch on your LAN?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Nov 2008 20:38:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130133#M893118</guid>
      <dc:creator>srue</dc:creator>
      <dc:date>2008-11-24T20:38:20Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound and outbound traffic at the same interface</title>
      <link>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130134#M893120</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Exclude this inside &amp;gt;&amp;gt; dmz traffic from NAT using nat exemption or add the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (inside) 101 interface &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT exemption:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list NONAT&lt;/P&gt;&lt;P&gt;access-list NONAT permit ip &lt;LAN&gt; &lt;DMZ&gt;&lt;/DMZ&gt;&lt;/LAN&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Nov 2008 08:27:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130134#M893120</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-11-25T08:27:31Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound and outbound traffic at the same interface</title>
      <link>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130135#M893123</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I still have the problem after doing clear xlate for modifying NAT.&lt;/P&gt;&lt;P&gt;Y have oppened nonat for:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound_2 extended permit ip 10.0.0.0 255.255.255.0 --.89.192 255.255.255.192 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound_4 extended permit ip 10.0.0.0 255.255.255.0 --.89.192 255.255.255.192&lt;/P&gt;&lt;P&gt;global (outside) 101 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound_2&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound_4 outside&lt;/P&gt;&lt;P&gt;nat (inside) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But when I send a telnet to a server --89.203&lt;/P&gt;&lt;P&gt;In ASDM logs I see the message:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;%ASA-3-305005: No translation group found for protocol src interface_name:10.0.0.114/1710 dst interface_name: --.89.203/23&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Nov 2008 10:28:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130135#M893123</guid>
      <dc:creator>elecorbalan</dc:creator>
      <dc:date>2008-11-25T10:28:48Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound and outbound traffic at the same interface</title>
      <link>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130136#M893124</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Remove this line and it should be OK&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound_4 outside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it does not work...post the logs...and please don't change the 'interface_name' in the log. post the correct one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Nov 2008 10:57:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130136#M893124</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-11-25T10:57:34Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound and outbound traffic at the same interface</title>
      <link>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130137#M893128</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It doesn't work. And I have passed the command &lt;/P&gt;&lt;P&gt;The logs are&lt;/P&gt;&lt;P&gt;3|Nov 25 2008|12:12:08|305005|62.97.89.203|23|||No translation group found for tcp src inside:10.0.0.114/1876 dst inside:62.97.89.203/23&lt;/P&gt;&lt;P&gt;3|Nov 25 2008|12:12:02|305005|62.97.89.203|23|||No translation group found for tcp src inside:10.0.0.114/1876 dst inside:62.97.89.203/23&lt;/P&gt;&lt;P&gt;3|Nov 25 2008|12:11:59|305005|62.97.89.203|23|||No translation group found for tcp src inside:10.0.0.114/1876 dst inside:62.97.89.203/23&lt;/P&gt;&lt;P&gt;4|Nov 25 2008|12:11:59|106100|10.0.0.114|1876|62.97.89.203|23|access-list inside_access_in permitted tcp inside/10.0.0.114(1876) -&amp;gt; inside/--.89.203(23) hit-cnt 1 first hit [0xd26734b7, 0x0]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Nov 2008 11:16:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130137#M893128</guid>
      <dc:creator>elecorbalan</dc:creator>
      <dc:date>2008-11-25T11:16:01Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound and outbound traffic at the same interface</title>
      <link>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130138#M893130</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Make sure the source/destination IPs in your NONAT acl are correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Secondly please clear connections and xlates on the firewall:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clear local-host&lt;/P&gt;&lt;P&gt;clear xlate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Nov 2008 11:37:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130138#M893130</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-11-25T11:37:04Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound and outbound traffic at the same interface</title>
      <link>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130139#M893131</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is correct and I have don clear xlate and clear local-host ans no nat-control&lt;/P&gt;&lt;P&gt;But sill doesn't works&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Nov 2008 11:58:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130139#M893131</guid>
      <dc:creator>elecorbalan</dc:creator>
      <dc:date>2008-11-25T11:58:04Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound and outbound traffic at the same interface</title>
      <link>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130140#M893132</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok then paste the output of the following command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input inside tcp 10.0.0.114 1876 62.97.89.203 23 detailed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Nov 2008 12:20:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130140#M893132</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-11-25T12:20:01Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound and outbound traffic at the same interface</title>
      <link>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130141#M893133</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: CAPTURE&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in  id=0xd5a654e0, priority=12, domain=capture, deny=false&lt;/P&gt;&lt;P&gt;        hits=1080441, user_data=0xd4516260, cs_id=0x0, l3_type=0x0&lt;/P&gt;&lt;P&gt;        src mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;        dst mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in  id=0xd566de58, priority=1, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;        hits=522895, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;/P&gt;&lt;P&gt;        src mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;        dst mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;              &lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in   62.97.89.192    255.255.255.192 inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip 10.0.0.0 255.255.255.0 62.97.89.192 255.255.255.192 log warnings &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in  id=0xd58b39d0, priority=12, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;        hits=45, user_data=0xd5c89428, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;        src ip=10.0.0.0, mask=255.255.255.0, port=0&lt;/P&gt;&lt;P&gt;        dst ip=62.97.89.192, mask=255.255.255.192, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in  id=0xd5670928, priority=0, domain=permit-ip-option, deny=true&lt;/P&gt;&lt;P&gt;        hits=10549, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;        src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;        dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Nov 2008 12:24:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130141#M893133</guid>
      <dc:creator>elecorbalan</dc:creator>
      <dc:date>2008-11-25T12:24:14Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound and outbound traffic at the same interface</title>
      <link>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130142#M893134</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT-EXEMPT&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;  match ip inside 10.0.0.0 255.255.255.0 inside 62.97.89.192 255.255.255.192&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 57, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in  id=0xd56ac6c8, priority=6, domain=nat-exempt, deny=false&lt;/P&gt;&lt;P&gt;        hits=56, user_data=0xd5a93390, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;        src ip=10.0.0.0, mask=255.255.255.0, port=0&lt;/P&gt;&lt;P&gt;        dst ip=62.97.89.192, mask=255.255.255.192, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;  match ip inside any inside any&lt;/P&gt;&lt;P&gt;    dynamic translation to pool 101 (No matching global)&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in  id=0xd45d1b80, priority=1, domain=nat, deny=false&lt;/P&gt;&lt;P&gt;        hits=257, user_data=0xd45d1ae0, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;        src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;        dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;  match ip inside any outside any&lt;/P&gt;&lt;P&gt;    dynamic translation to pool 101 (62.97.74.50 [Interface PAT])&lt;/P&gt;&lt;P&gt;    translate_hits = 853, untranslate_hits = 38&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in  id=0xd45d17c8, priority=1, domain=host, deny=false&lt;/P&gt;&lt;P&gt;        hits=16941, user_data=0xd55170d0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;        src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;        dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;  match ip inside any inside any&lt;/P&gt;&lt;P&gt;    dynamic translation to pool 101 (No matching global)&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; out id=0xd56ab510, priority=1, domain=nat-reverse, deny=false&lt;/P&gt;&lt;P&gt;        hits=117, user_data=0xd45d1ae0, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;        src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;        dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Nov 2008 12:24:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130142#M893134</guid>
      <dc:creator>elecorbalan</dc:creator>
      <dc:date>2008-11-25T12:24:29Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound and outbound traffic at the same interface</title>
      <link>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130143#M893135</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please add the global command I mentioned above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (inside) 101 interface&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Nov 2008 12:29:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130143#M893135</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-11-25T12:29:25Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound and outbound traffic at the same interface</title>
      <link>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130144#M893136</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you worked out solution, I am working on similar scenario, my inbound traffic is on same interface but the subnets are not off the firewall they are routed through firewall so the gateway is same for both subnets.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Dec 2008 21:09:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130144#M893136</guid>
      <dc:creator>ajanowska1</dc:creator>
      <dc:date>2008-12-10T21:09:21Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound and outbound traffic at the same interface</title>
      <link>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130145#M893137</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Elena,&lt;/P&gt;&lt;P&gt;   Please read my answer and description about your issue in following link.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://forums.cisco.com/eforum/servlet/NetProf?page=netprof&amp;amp;forum=Security&amp;amp;topic=Firewalling&amp;amp;topicID=.ee6e1fa&amp;amp;fromOutline=&amp;amp;CommCmd=MB%3Fcmd%3Ddisplay_location%26location%3D.2cc28b9a" target="_blank"&gt;http://forums.cisco.com/eforum/servlet/NetProf?page=netprof&amp;amp;forum=Security&amp;amp;topic=Firewalling&amp;amp;topicID=.ee6e1fa&amp;amp;fromOutline=&amp;amp;CommCmd=MB%3Fcmd%3Ddisplay_location%26location%3D.2cc28b9a&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Dec 2008 22:06:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130145#M893137</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-12-10T22:06:28Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound and outbound traffic at the same interface</title>
      <link>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130146#M893139</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;RPF check drops because you have the following line&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;Since you mention ANY!, the return traffic gets involved in nat statement. Change it as&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no nat (inside) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (inside) 101 10.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Dec 2008 22:10:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130146#M893139</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-12-10T22:10:16Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound and outbound traffic at the same interface</title>
      <link>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130147#M893142</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We actually don't use nat and have no nat controll so I think I found solution by "same-security traffic permit"  command and reviewing the access list for that interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anna&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Dec 2008 22:11:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130147#M893142</guid>
      <dc:creator>ajanowska1</dc:creator>
      <dc:date>2008-12-10T22:11:08Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound and outbound traffic at the same interface</title>
      <link>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130148#M893144</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi hussycisco&lt;/P&gt;&lt;P&gt;im having a similar issue where i get the error "Flow is a loopback" although i have applied same-security-traffic permit intra-interface command. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here are the no nat statements:&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list no-nat&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;access-list no-nat line 11 extended permit ip 172.16.1.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list no-nat line 12 extended permit ip 192.168.1.0 255.255.255.0 172.16.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;here is the static route: &lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;S    192.168.1.0 255.255.255.0 [1/0] via 172.16.1.1, inside    (172.16.1.1 is ip of the ISA servers outside interface) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please find attached the network diagram.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Dec 2008 12:20:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130148#M893144</guid>
      <dc:creator>SOL10</dc:creator>
      <dc:date>2008-12-12T12:20:22Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound and outbound traffic at the same interface</title>
      <link>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130149#M893145</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Suleiman,&lt;/P&gt;&lt;P&gt;  I am assuming you get this "flow is a loopback" error when you try to reach webserver from 192.168.1.97 or vice versa. This issue is the same with the one I described in above link. Thats why you shouldnt use exempt nat, assuming that your webserver's gateway is ASA. Please post your entire NAT and global statemens in firewall then let me advise accordingly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  But for security best practises, I highly recommend you to move webserver to another interface of ASA like DMZ, if you dont have a physical interface for achieving this, create a virtual sub-interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Dec 2008 12:38:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inbound-and-outbound-traffic-at-the-same-interface/m-p/1130149#M893145</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-12-12T12:38:02Z</dc:date>
    </item>
  </channel>
</rss>

