<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Problem with ACL in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/problem-with-acl-edited-with-solution/m-p/3397802#M954923</link>
    <description>&lt;P&gt;you re using object NAT, which is fine, but it has a lower priority, so some other NAT rule might be blocking it. do a packet trace&lt;/P&gt;</description>
    <pubDate>Tue, 12 Jun 2018 05:23:38 GMT</pubDate>
    <dc:creator>Dennis Mink</dc:creator>
    <dc:date>2018-06-12T05:23:38Z</dc:date>
    <item>
      <title>Problem with ACL Edited with solution</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-acl-edited-with-solution/m-p/3397757#M954921</link>
      <description>&lt;P&gt;The issue was that I didn't realize that I accidentally created the service with a source and destination port. The source port is randomly generated along a range of ports so, by designating a source port, I accidentally caused the access rule not to match the actual traffic that was hitting the firewall. Removing the source port fixed the issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Apologies if this isn't the most elegant post but I'm pretty tired of staring at this problem.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I created a custom service object for port 3001. I also created an Access Rule in the ACL for the WAN port where this traffic enters the ASA to allow this object through the firewall to an internal IP address.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My ASA 5008 is denying service to the ip/port, and the reason given is the ACL in which the&amp;nbsp;permit rule exists.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;4&lt;/TD&gt;
&lt;TD&gt;Jun 11 2018&lt;/TD&gt;
&lt;TD&gt;21:47:17&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;SourceIP&lt;/TD&gt;
&lt;TD&gt;Source Port:&amp;nbsp;[many]&lt;/TD&gt;
&lt;TD&gt;DestinationIP&lt;/TD&gt;
&lt;TD&gt;3001&lt;/TD&gt;
&lt;TD&gt;Deny tcp src Outside:External IP/External Port dst Outside:External IP/3001 by access-group "WAN1Port_Outside_access_in" [0x0, 0x0]&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here's the relevant part of the access-list&amp;nbsp;from show run&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;PRE&gt;access-list WAN1Port_Outside_access_in extended permit object obj-tcp-eq-3001 any object obj-192.168.1.200&amp;nbsp;&lt;/PRE&gt;
&lt;P&gt;I've setup NAT to map an external IP to the internal IP above (192.168.1.200). This isn't the real IP, I've changed some numbers for obfuscation purposes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;object network obj-ExternalIP
 nat (Outside,inside) static obj-192.168.1.200 service tcp 3001 3001 &lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here's a line from the same ACL for a service/server that works, just for reference:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;access-list WAN1Port_Outside_access_in extended permit object-group DM_INLINE_SERVICE_11 any object obj-192.168.1.114 &lt;/PRE&gt;
&lt;P&gt;DM_INLINE_SERVICE_11 is there as it gets created when you create a group of services associated with the same object. Basically, this IP has multiple services allowed to get to it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The only Deny line in the ACL is for RDP and disabling that line does not help.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;I have other external IPs NAT'd to internal IPs in a similar manner. I host servers that need HTTP, HTTPS, ssh, and etc traffic to get to them and all the other things work just fine. I could really use some help on this and I don't have the patience to deal with TAC right now.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does anything stand out to anyone that I should check? Why isn't the ASA matching my rule and allowing traffic?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just to clarify, the ACL from above is the same ACL that contains the access rules for all the other servers. Those are just some examples.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:52:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-acl-edited-with-solution/m-p/3397757#M954921</guid>
      <dc:creator>ACStech</dc:creator>
      <dc:date>2020-02-21T15:52:02Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with ACL</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-acl-edited-with-solution/m-p/3397785#M954922</link>
      <description>Hi &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;Can you post the results of packet-tracer?&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://supportforums.cisco.com/t5/security-documents/troubleshooting-access-problems-using-packet-tracer/ta-p/3114976" target="_blank"&gt;https://supportforums.cisco.com/t5/security-documents/troubleshooting-access-problems-using-packet-tracer/ta-p/3114976&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;# packet-tracer input outside tcp [src_addr] [dst_addr] 3001</description>
      <pubDate>Tue, 12 Jun 2018 04:20:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-acl-edited-with-solution/m-p/3397785#M954922</guid>
      <dc:creator>shimenoy</dc:creator>
      <dc:date>2018-06-12T04:20:52Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with ACL</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-acl-edited-with-solution/m-p/3397802#M954923</link>
      <description>&lt;P&gt;you re using object NAT, which is fine, but it has a lower priority, so some other NAT rule might be blocking it. do a packet trace&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jun 2018 05:23:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-acl-edited-with-solution/m-p/3397802#M954923</guid>
      <dc:creator>Dennis Mink</dc:creator>
      <dc:date>2018-06-12T05:23:38Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with ACL</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-acl-edited-with-solution/m-p/3397963#M954924</link>
      <description>If I correctly remember here for dst_addr use the public IP used for NAT OBJECT. &lt;BR /&gt;Make sure the NAT rule shown in the output is the one you created.&lt;BR /&gt;&lt;BR /&gt;Last but not least how's the routing for the public IP you're using for NAT? Post some relevant config.</description>
      <pubDate>Tue, 12 Jun 2018 10:43:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-acl-edited-with-solution/m-p/3397963#M954924</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2018-06-12T10:43:57Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with ACL</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-acl-edited-with-solution/m-p/3398008#M954925</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/466966"&gt;@shimenoy&lt;/a&gt;&amp;nbsp;Thanks for the suggestion.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;ASA# packet-tracer input outside tcp [src] 58286 [dest] 3001

Phase: 1
Type: ROUTE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
found next-hop [External IP] using egress ifc Outside

Phase: 2
Type: ACCESS-LIST
Subtype:
Result: DROP
Config:
&lt;STRONG&gt;Implicit Rule&lt;/STRONG&gt;
Additional Information:

Result:
input-interface: Outside
input-status: up
input-line-status: up
output-interface: Outside
output-status: up
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/PRE&gt;
&lt;P&gt;Since it is being dropped by the implicit rule (if all other rules don't match, drop packet) it looks like the firewall is not matching traffic to that access rule? Does it have anything to do with the source port being different from the destination port (the source port for this service is chosen at random from a range of ports).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I noticed a difference on our old firewall was this line which is not in the new firewall:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;nat (inside,outside) source static obj-[inside IP] obj-[inside IP] destination static obj-[External IP] obj-[external IP] service obj-tcp-eq-3001 obj-tcp-eq-3001&lt;/PRE&gt;
&lt;P&gt;Unfortuntately, when I try to issue that command in the new firewall, it&amp;nbsp;puts a break in between "desti" and "nation" and then tells me that the invalid input is detected at that point.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jun 2018 12:19:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-acl-edited-with-solution/m-p/3398008#M954925</guid>
      <dc:creator>ACStech</dc:creator>
      <dc:date>2018-06-12T12:19:25Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with ACL</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-acl-edited-with-solution/m-p/3398014#M954926</link>
      <description>&lt;P&gt;I replied to this but it was marked as spam. I guess I will have to open a TAC troubleshooting ticket. Thanks for trying but no points on any of these replies.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jun 2018 12:36:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-acl-edited-with-solution/m-p/3398014#M954926</guid>
      <dc:creator>ACStech</dc:creator>
      <dc:date>2018-06-12T12:36:03Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with ACL</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-acl-edited-with-solution/m-p/3398077#M954927</link>
      <description>&lt;P&gt;This helped me get closer to the final solution. See the original post for edited solution.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jun 2018 14:00:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-acl-edited-with-solution/m-p/3398077#M954927</guid>
      <dc:creator>ACStech</dc:creator>
      <dc:date>2018-06-12T14:00:38Z</dc:date>
    </item>
  </channel>
</rss>

