<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX blocking unspecified traffic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095590#M896366</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am stuck at this point as I don't know why the PIX dops this traffic. If anyone can advise, I'd be very grateful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 16 Sep 2008 15:08:11 GMT</pubDate>
    <dc:creator>chrisgray1</dc:creator>
    <dc:date>2008-09-16T15:08:11Z</dc:date>
    <item>
      <title>PIX blocking unspecified traffic</title>
      <link>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095582#M896339</link>
      <description>&lt;P&gt;I am no security expert but it appears that our pix firewall is blocking traffic from a higher security level interface to the outside interface when there are no access-lists specifically blocking this traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;a ping from 217.nn.n.164 to a host on remote subnet 10.0.32.1 accross an IPSEC VPN tunnel which does not terminate on this firewall is unsuccessful. I have determined that the traffic is entering our inside interface and is not reaching the outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list sniffer line 1 extended permit ip host 217.nn.n.164 host 10.0.32.1 log informational interval 300 (hitcnt=123) 0x70a2c4d4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture sniffercap2 access-list sniffer interface outside&lt;/P&gt;&lt;P&gt;capture sniffercap access-list sniffer interface vlan309-e3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LIV-SVR-01(config)# sh capture sniffercap&lt;/P&gt;&lt;P&gt;10 packets captured&lt;/P&gt;&lt;P&gt;   1: 14:25:26.759665 217.nn.n.164 &amp;gt; 10.0.32.1: icmp: echo request&lt;/P&gt;&lt;P&gt;   2: 14:25:28.259660 217.nn.n.164 &amp;gt; 10.0.32.1: icmp: echo request&lt;/P&gt;&lt;P&gt;   3: 14:25:29.759650 217.nn.n.164 &amp;gt; 10.0.32.1: icmp: echo request&lt;/P&gt;&lt;P&gt;   4: 14:25:31.259691 217.nn.n.164 &amp;gt; 10.0.32.1: icmp: echo request&lt;/P&gt;&lt;P&gt;   5: 14:25:32.759619 217.nn.n.164 &amp;gt; 10.0.32.1: icmp: echo request&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LIV-SVR-01(config)# sh capture sniffercap2&lt;/P&gt;&lt;P&gt;0 packet captured&lt;/P&gt;&lt;P&gt;0 packet shown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have been looking into this all yesterday and am at a loss as to why this is happening.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The route to the 10.0.32.0 network is in place also and I know it is valid because other routes such as to 10.184.0.0, another customer subnet are routed fine out this interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;S    10.0.32.0 255.255.255.0 [1/0] via 217.77.0.73, outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If anyone can help me out on this issue I would be grateful.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:44:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095582#M896339</guid>
      <dc:creator>chrisgray1</dc:creator>
      <dc:date>2019-03-11T13:44:49Z</dc:date>
    </item>
    <item>
      <title>Re: PIX blocking unspecified traffic</title>
      <link>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095583#M896343</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Chris,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It actually looks like from a lower interface to a higher, not the other way around....I assume the 10.x is on the inside and the 217.x is on the outside?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is an implicit permit all from a higher to lower interface and implicit deny from a lower to a higher interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Sep 2008 12:51:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095583#M896343</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-09-16T12:51:39Z</dc:date>
    </item>
    <item>
      <title>Re: PIX blocking unspecified traffic</title>
      <link>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095584#M896345</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, Andrew thanks for the response. Actually we have a block of 15 class C public IP networks for public addressing within our datacentre. The 10.0.32.0 network is a subnet within the customers private network and I have setup a new VPN tunnel from there site to a 26k router which established at phase 2 but they couldn't reach their server within the DC from this subnet even though I am 100% sure the VPN is allowing return traffic from the 217.nn.n.128/26 to 10.0.32.0/24.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The routing is fine between the 26k and this server subnet. With our main shared services firewall in between who's vlan309-e3 interface is the default gateway address for this internal subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Sep 2008 13:14:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095584#M896345</guid>
      <dc:creator>chrisgray1</dc:creator>
      <dc:date>2008-09-16T13:14:21Z</dc:date>
    </item>
    <item>
      <title>Re: PIX blocking unspecified traffic</title>
      <link>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095585#M896350</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Chris,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OK that makes sense and is a lot clearer - can you provide the config for the VPN, also the output of the below:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show crypto isakmp sa&lt;/P&gt;&lt;P&gt;show crypto ipsec sa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Sep 2008 13:17:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095585#M896350</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-09-16T13:17:06Z</dc:date>
    </item>
    <item>
      <title>Re: PIX blocking unspecified traffic</title>
      <link>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095586#M896355</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To answer your question the higher security interface is the 217.nn.n..128/26 interface vlan309-e3 and route to the 10.0.32.0 network is via the outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Chris &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Sep 2008 13:19:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095586#M896355</guid>
      <dc:creator>chrisgray1</dc:creator>
      <dc:date>2008-09-16T13:19:33Z</dc:date>
    </item>
    <item>
      <title>Re: PIX blocking unspecified traffic</title>
      <link>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095587#M896358</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Actually, we've had to bring it down again because the customer is for some reason migrating from one VPN to another. When we brought up the new VPN which is not conflicting because their source address is doing PAT from the address 192.168.253.1 we found that they could not reach this server subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They have had to manually alter the routing to force it out of the old VPN again which is now back up and passing traffic but obviously because they are using PAT the traffic is not routed back to the 10.0.32.0 from our perspective.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To me the issue appears to me to be with the firewall because if I do the same sniffer trace to another of their subnets 10.183.0.0 and do a ping from the server to 10.183.0.1 I see that the traffic is captured on both interfaces of the PIX.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Sep 2008 13:25:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095587#M896358</guid>
      <dc:creator>chrisgray1</dc:creator>
      <dc:date>2008-09-16T13:25:33Z</dc:date>
    </item>
    <item>
      <title>Re: PIX blocking unspecified traffic</title>
      <link>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095588#M896359</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Based on another post I've found out about the packet-traceer command and have run it on the PIX that I am think is causing this issue. Here is the output which appears to DROP the packets due to (no-adjacency) No valid adjacency, can anyone advise on this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LIV-SVR-01# packet-tracer input vlan309-e3 tcp 217.nn.n.164 citrix-ica 10.0.32.1 1024&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: UN-NAT&lt;/P&gt;&lt;P&gt;Subtype: static&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,vlan309-e3) 10.0.0.0 10.0.0.0 netmask 255.255.0.0&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;  match ip inside 10.0.0.0 255.255.0.0 vlan309-e3 any&lt;/P&gt;&lt;P&gt;    static translation to 10.0.0.0&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 196185&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;NAT divert to egress interface inside&lt;/P&gt;&lt;P&gt;Untranslate 10.0.0.0/0 to 10.0.0.0/0 using netmask 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group acl_vlan309 in interface vlan309-e3&lt;/P&gt;&lt;P&gt;access-list acl_vlan309 extended permit ip 217.nn.n.128 255.255.255.192 any&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: FOVER&lt;/P&gt;&lt;P&gt;Subtype: standby-update&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT-EXEMPT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (vlan309-e3,outside) 217.nn.n.128 217.nn.n.128 netmask 255.255.255.192&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;  match ip vlan309-e3 217.nn.n.128 255.255.255.192 outside any&lt;/P&gt;&lt;P&gt;    static translation to 217.n.n.128&lt;/P&gt;&lt;P&gt;    translate_hits = 54334, untranslate_hits = 664114&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,vlan309-e3) 10.0.0.0 10.0.0.0 netmask 255.255.0.0&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;  match ip inside 10.0.0.0 255.255.0.0 vlan309-e3 any&lt;/P&gt;&lt;P&gt;    static translation to 10.0.0.0&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 196187&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.0.0.0 10.0.0.0 netmask 255.255.0.0&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;  match ip inside 10.0.0.0 255.255.0.0 outside any&lt;/P&gt;&lt;P&gt;    static translation to 10.0.0.0&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 84726&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 11&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 12&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 309238390, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: vlan309-e3&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (no-adjacency) No valid adjacency&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Sep 2008 14:13:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095588#M896359</guid>
      <dc:creator>chrisgray1</dc:creator>
      <dc:date>2008-09-16T14:13:44Z</dc:date>
    </item>
    <item>
      <title>Re: PIX blocking unspecified traffic</title>
      <link>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095589#M896363</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hopefully I'm onto something here. The packet-tracer command output is below showing packets from the same address towards the other customer subnet 10.183.0.0 that gets through ok, it says this is allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LIV-SVR-01# packet-tracer input vlan309-e3 tcp 217.nn.n.164 citrix-ica 10.183.0.1 1024&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in   10.183.0.0      255.255.0.0     outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group acl_vlan309 in interface vlan309-e3&lt;/P&gt;&lt;P&gt;access-list acl_vlan309 extended permit ip 217.nn.n.128 255.255.255.192 any&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: FOVER&lt;/P&gt;&lt;P&gt;Subtype: standby-update&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (vlan309-e3,outside) 217.nn.n.128 217.nn.n.128 netmask 255.255.255.192&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;  match ip vlan309-e3 217.nn.n.128 255.255.255.192 outside any&lt;/P&gt;&lt;P&gt;    static translation to 217.nn.n.128&lt;/P&gt;&lt;P&gt;    translate_hits = 54361, untranslate_hits = 664335&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Static translate 217.nn.n.128/0 to 217.nn.n.128/0 using netmask 255.255.255.192&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (vlan309-e3,outside) 217.nn.n.128 217.nn.n.128 netmask 255.255.255.192&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;  match ip vlan309-e3 217.nn.n.128 255.255.255.192 outside any&lt;/P&gt;&lt;P&gt;    static translation to 217.nn.n.128&lt;/P&gt;&lt;P&gt;    translate_hits = 54361, untranslate_hits = 664335&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 309255990, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: output and adjacency&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;found next-hop 217.nn.0.73 using egress ifc outside&lt;/P&gt;&lt;P&gt;adjacency Active&lt;/P&gt;&lt;P&gt;next-hop mac address 0013.7fc3.f680 hits 163414&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: vlan309-e3&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Sep 2008 14:25:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095589#M896363</guid>
      <dc:creator>chrisgray1</dc:creator>
      <dc:date>2008-09-16T14:25:27Z</dc:date>
    </item>
    <item>
      <title>Re: PIX blocking unspecified traffic</title>
      <link>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095590#M896366</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am stuck at this point as I don't know why the PIX dops this traffic. If anyone can advise, I'd be very grateful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Sep 2008 15:08:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095590#M896366</guid>
      <dc:creator>chrisgray1</dc:creator>
      <dc:date>2008-09-16T15:08:11Z</dc:date>
    </item>
    <item>
      <title>Re: PIX blocking unspecified traffic</title>
      <link>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095591#M896369</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Chris,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry - was dealing with a work issue.  OK - read your previous posts, any chance you can post a sanitised config relating to this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Sep 2008 15:10:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095591#M896369</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-09-16T15:10:51Z</dc:date>
    </item>
    <item>
      <title>Re: PIX blocking unspecified traffic</title>
      <link>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095592#M896371</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Andrew,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The PIX config is really quite large, do you mean the full pix config? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BTW the n actually corresponds to the same single digit everywhere.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Sep 2008 15:19:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095592#M896371</guid>
      <dc:creator>chrisgray1</dc:creator>
      <dc:date>2008-09-16T15:19:06Z</dc:date>
    </item>
    <item>
      <title>Re: PIX blocking unspecified traffic</title>
      <link>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095593#M896372</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Chris,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just post the:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Interesting traffic acl&lt;/P&gt;&lt;P&gt;2) no-nat ACL&lt;/P&gt;&lt;P&gt;3) Crypto entry&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Sep 2008 15:21:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095593#M896372</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-09-16T15:21:25Z</dc:date>
    </item>
    <item>
      <title>Re: PIX blocking unspecified traffic</title>
      <link>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095594#M896373</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Andrew.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) The VPN is not setup on this PIX the PIX is mean't to be forwarding traffic to 10.0.32.0 over to the 26k router which is also here onsite. The VPN is setup on the 26k router and I can confirm that on the 26k router when I debug IP packet with an ACL to capture traffic from the server 217.nn.n.164 to 10.0.32.0 nothing comes through from the PIX. Whereas when I debug IP packet from this server to 10.183.0.1, I see this traffic come through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Here is the no-nat ACL on the PIX&lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 217.77.0.0 255.255.240.0 any&lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 10.0.0.0 255.0.0.0 any&lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 172.16.0.0 255.240.0.0 any&lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 192.168.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) There is no crypto entry on the PIX for this VPN. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So from my perspective I'm looking for a reason why the traffic is not forwarded by the PIX to the 26k - the VPN router and is instead dropped by the PIX. Would you agree that this is the issue or do you need to see the 26k VPN setup? as I don't believe this is the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Sep 2008 15:34:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095594#M896373</guid>
      <dc:creator>chrisgray1</dc:creator>
      <dc:date>2008-09-16T15:34:04Z</dc:date>
    </item>
    <item>
      <title>Re: PIX blocking unspecified traffic</title>
      <link>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095595#M896375</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Chris,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you allowing the correct protocols and tcp/udp ports thru the PIX to be able to terminate the VPN on the 26xx.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From your description - VPN traffic should be passin THRU the pix to terminate on the 26xx, is this correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check your NAT statements - alsi check that the remote end device is/or not using NAT-T, as the ASA does understand VPN pass-thru?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Sep 2008 17:18:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095595#M896375</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-09-16T17:18:04Z</dc:date>
    </item>
    <item>
      <title>Re: PIX blocking unspecified traffic</title>
      <link>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095596#M896376</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Late to this, and confused, but trying to help anyways...  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was thinking:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;host (217.x.x.164) -&amp;gt; (217.x.x.x) ASA (217.77.0.?) -&amp;gt; (217.77.0.73) 26XX router -&amp;gt; VPN tunnel -&amp;gt; (10.0.32.1) endpoint&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where packet only gets as far as:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;host -&amp;gt; ASA -&amp;gt; (dropped)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this not correct? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok, if that is correct, what is the IP network between the 26XX router and the ASA?  Probably doesn't matter, but something weird is going on here...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyways, you said that your routing on the ASA is correct:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;S 10.0.32.0 255.255.255.0 [1/0] via 217.77.0.73, outside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This means that 217.77.0.73 is your 26XX router, I would assume.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Of course, an ASA will not forward a packet to an interface on the same interface it received the packet on.  So hopefully, 217.x.x.163 is not the same subnet as 217.77.0.x ... or it will not forward the packet, because the source and destination are the same interface.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No adjaceny does seem to suggest that the ASA doesn't know where to send the packet, from an IP Route perspective.  Are you sure your subnets are correct everywhere?  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am assuming that you can successfully ping 217.77.0.73 from the outside interface of the ASA, and that when you do a "show arp" you see the correct mac address for it?  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Addionally, in phase 2, in your success, it immediately finds a route in 10.183.0.0 255.255.0.0 outside... but in your failure, it doesn't find a route.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, notice that in the success, in phase 10, it has found a next-hop 217.nn.0.73 (is that actually 217.77.0.73, or a different 2nd octet?), along with a mac address, but in your failure, it doesn't find an adjacency (i.e. no interface with a broadcast domain able to ARP a next hop that leads to the destination network) ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run | i route&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;maybe also look at&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show route&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show ip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and see if you've typo'd an octet or a mask somewhere?  Or if you're experiencing some problem with subnetting gone awry.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I find when my eyes are blurry from working on something for too long, it helps to cut and paste the whole config, and then cut/paste the lines into side-by-side text editor windows so I can compare line by line, and then I'll use tabs/white space to make the IPs and masks directly ontop of each other so I can easily see typos.  Anything to increase the contrast, so to speak.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyways, if I completely misunderstood the network layout, my apologies &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Sep 2008 00:07:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095596#M896376</guid>
      <dc:creator>maltuna</dc:creator>
      <dc:date>2008-09-17T00:07:03Z</dc:date>
    </item>
    <item>
      <title>Re: PIX blocking unspecified traffic</title>
      <link>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095597#M896379</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firstly, thanks both, for the help so far.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are the answers to the questions you have asked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From your description - VPN traffic should be passin THRU the pix to terminate on the 26xx, is this correct? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The traffic TO BE VPN'd is sent through the PIX to the 2600 which is the router that this customers VPN is configured on. Then on the return path ie. from the customers LAN to us the VPN traffic is decrypted at the 2600 and then forwarded to the PIX. The PIX has the server subnet 217.nn.n.128/26 directly connected on its vlan309-e3 interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maltuna, you are more or less correct, the packet is routed as follows. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;host (217.x.x.164) -&amp;gt; in to PIX vlan309-e3 interface (217.x.x.128) -&amp;gt; out of PIX outside interface (217.77.0.?) -&amp;gt; 2600 router(217.77.0.73)  -&amp;gt; VPN tunnel -&amp;gt; (10.0.32.1) endpoint &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where packet only gets as far as: &lt;/P&gt;&lt;P&gt;host -&amp;gt; ASA -&amp;gt; (dropped), except its a PIX 525 not ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The IP network between the 2600 router and the PIX is a single CAT6k switch. I feel that the routing is fine between the PIX and 26k because a traceroute to it from the PIX goes straight to the 2600 before being dropped, because as mentioned before the tunnel is currently down.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LIV-SVR-01# trace 10.0.32.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Tracing the route to 10.0.32.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; 1  217.77.0.73 10 msec 0 msec 0 msec&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So it is JUST packets from the server subnet through the PIX to 10.0.32.0 that are dropped, not all packets from the PIX to 10.0.32.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyways, you said that your routing on the ASA is correct: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;S 10.0.32.0 255.255.255.0 [1/0] via 217.77.0.73, outside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This means that 217.77.0.73 is your 26XX router, I would assume. &lt;/P&gt;&lt;P&gt;That is correct. and the PIX does see the correct mac address in arp cache for 217.77.0.73&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, notice that in the success, in phase 10, it has found a next-hop 217.nn.0.73 (is that actually 217.77.0.73, or a different 2nd octet?), along with a mac address, but in your failure, it doesn't find an adjacency (i.e. no interface with a broadcast domain able to ARP a next hop that leads to the destination network) ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are right 217.nn.0.73 = 217.77.0.73,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from the PIX&lt;/P&gt;&lt;P&gt;PIX-LIV-01# sh route | incl 10.0.32.0&lt;/P&gt;&lt;P&gt;S    10.0.32.0 255.255.255.0 [1/0] via 217.77.0.73, outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only other thing which confuses me, I noticed that nat-control is on so I believe we need a nat statement for each network that the PIX forwads packets between?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I take this to mean I need the following statement for inbound traffic,  which I can see is in the PIX config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (vlan309-e3,outside) 217.nn.n.128 217.nn.n.128 netmask 255.255.255.192 where n is the same in both addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but do I also need? This is not in the config.&lt;/P&gt;&lt;P&gt;static (vlan309-e3,outside) 10.0.32.0 10.0.32.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Sep 2008 08:38:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095597#M896379</guid>
      <dc:creator>chrisgray1</dc:creator>
      <dc:date>2008-09-17T08:38:55Z</dc:date>
    </item>
    <item>
      <title>Re: PIX blocking unspecified traffic</title>
      <link>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095598#M896380</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could it be anything to do with this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have an internal network just for transferring data for server backups which uses the 10.0.0.0 address and the servers have dual NICs one with a 10.0.0.0 address and another with a global IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The PIX routes packets to this network from its inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can see that on the PIX we have the static nat statement as follows, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.0.0.0 10.0.0.0 netmask 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To me this would seem to catch the customers 10.0.32.0 subnet but not their 10.183.x.x or 10.184.x.x subnets and as it is for the inside interface (where our backup network is) not the vlan309-e3 interface (where the customers servers are).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would this cause a conflict for the PIX when looking where to send the packet?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe I'm totally on the wrong track here, but hopefully one of you guys will know &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Sep 2008 08:55:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095598#M896380</guid>
      <dc:creator>chrisgray1</dc:creator>
      <dc:date>2008-09-17T08:55:55Z</dc:date>
    </item>
    <item>
      <title>Re: PIX blocking unspecified traffic</title>
      <link>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095599#M896383</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, I've figured this out now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we had the following static NAT which matched all 10.0.x.x from this interface to the inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,vlan309-e3) 10.0.0.0 10.0.0.0 netmask 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have replaced this with &lt;/P&gt;&lt;P&gt;static (inside,vlan309-e3) 10.0.0.0 10.0.0.0 netmask 255.255.240.0, becuase this easily covers our internal network range&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and added&lt;/P&gt;&lt;P&gt;static (outside,vlan309-e3) 10.0.32.0 10.0.32.0 netmask 255.255.252.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm now seeing the traffic making it through to the VPN router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for the help guys.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Sep 2008 11:26:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095599#M896383</guid>
      <dc:creator>chrisgray1</dc:creator>
      <dc:date>2008-09-17T11:26:36Z</dc:date>
    </item>
    <item>
      <title>Re: PIX blocking unspecified traffic</title>
      <link>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095600#M896385</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Chris,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So my post of "Check your NAT statements " helped then?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Sep 2008 11:38:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095600#M896385</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-09-17T11:38:23Z</dc:date>
    </item>
    <item>
      <title>Re: PIX blocking unspecified traffic</title>
      <link>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095601#M896386</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Sep 2008 12:48:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-blocking-unspecified-traffic/m-p/1095601#M896386</guid>
      <dc:creator>chrisgray1</dc:creator>
      <dc:date>2008-09-17T12:48:19Z</dc:date>
    </item>
  </channel>
</rss>

