<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Problems with stablished in ASA 5540 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/problems-with-stablished-in-asa-5540/m-p/1079706#M913778</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For TCP/UDP etc you only need to allow it in the  higher security interface (if you have defined a custom ACL on the inside interface). Otherwise by default ALL traffic from higher-sec &amp;gt;&amp;gt; loser-sec will be allowed, this includes all the return traffic. But this is not valid for ICMP. For ICMP you need to allow it on the outside interface or enable 'ICMP Inspection' in the global policy-map (The latter is the preferred option).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you getting any hits on the outside interface ACL for non-icmp traffic (the second line)? You can check this via show access-list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 29 Aug 2008 17:02:37 GMT</pubDate>
    <dc:creator>Farrukh Haroon</dc:creator>
    <dc:date>2008-08-29T17:02:37Z</dc:date>
    <item>
      <title>Problems with stablished in ASA 5540</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-stablished-in-asa-5540/m-p/1079704#M913774</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm having a problem with the established connections through an ASA 5540 firewall.&lt;/P&gt;&lt;P&gt;The scenario contains two interfaces, outside and inside.&lt;/P&gt;&lt;P&gt;I want to allow navigation and ICMP connection from hosts from the inside with a NAT configured public IP on the outside interface, to internet sites.&lt;/P&gt;&lt;P&gt;So, once configured the NAT rule, I configured the security policy to allow ICMP from the outside, and navigation only to the inside hosts I want to allow.&lt;/P&gt;&lt;P&gt;The problem is that I have to create TWO rules instead of one, in order to allow any connections between hosts in the inside and the outside, one from inside host/net to the outside, and the opposite one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is supposed that connectivity from interfaces with higher priority to lower priority is allowed, so it should be only neccesary to configure the rule from the lower to the higher priority interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help will be much appreciated. &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:37:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-stablished-in-asa-5540/m-p/1079704#M913774</guid>
      <dc:creator>acotelcom</dc:creator>
      <dc:date>2019-03-11T13:37:34Z</dc:date>
    </item>
    <item>
      <title>Re: Problems with stablished in ASA 5540</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-stablished-in-asa-5540/m-p/1079705#M913776</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sounds like a NAT issue you have - post your config, removing sensitive info, IP's passwords etc.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Aug 2008 13:40:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-stablished-in-asa-5540/m-p/1079705#M913776</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-08-29T13:40:49Z</dc:date>
    </item>
    <item>
      <title>Re: Problems with stablished in ASA 5540</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-stablished-in-asa-5540/m-p/1079706#M913778</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For TCP/UDP etc you only need to allow it in the  higher security interface (if you have defined a custom ACL on the inside interface). Otherwise by default ALL traffic from higher-sec &amp;gt;&amp;gt; loser-sec will be allowed, this includes all the return traffic. But this is not valid for ICMP. For ICMP you need to allow it on the outside interface or enable 'ICMP Inspection' in the global policy-map (The latter is the preferred option).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you getting any hits on the outside interface ACL for non-icmp traffic (the second line)? You can check this via show access-list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Aug 2008 17:02:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-stablished-in-asa-5540/m-p/1079706#M913778</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-08-29T17:02:37Z</dc:date>
    </item>
    <item>
      <title>Re: Problems with stablished in ASA 5540</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-stablished-in-asa-5540/m-p/1079707#M913780</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The first at all, thanks in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My configuration is like in a PIX, where i need to open with a ACL the traffic from a minor to a higher level, and a NAT rule from the higher to the minor.&lt;/P&gt;&lt;P&gt;With that configuration, where i let all traffic by IP in the outside interface, i have an entry in the syslog:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;%ASA-6-106015: Deny TCP (no connection) from 10.37.179.202/23 to 79.148.101.140/2210 flags SYN ACK  on interface Intranet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is my principal problem. The ASA don't let me pass the traffic in established comunications.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Sep 2008 11:14:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-stablished-in-asa-5540/m-p/1079707#M913780</guid>
      <dc:creator>acotelcom</dc:creator>
      <dc:date>2008-09-01T11:14:53Z</dc:date>
    </item>
    <item>
      <title>Re: Problems with stablished in ASA 5540</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-stablished-in-asa-5540/m-p/1079708#M913781</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think you are looking at the wrong syslog. This message could also come because the connection timed out on the PIX/ASA and the Intranet host keeps sending data for the same session thinking its still valid.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Sep 2008 19:25:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-stablished-in-asa-5540/m-p/1079708#M913781</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-09-03T19:25:08Z</dc:date>
    </item>
  </channel>
</rss>

