<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: I think ASA is blocking TACACS+ traffic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/i-think-asa-is-blocking-tacacs-traffic/m-p/3389949#M956813</link>
    <description>&lt;P&gt;i manage to got it cover and resolve it&lt;BR /&gt;&lt;BR /&gt;create a rules allowing the tacacs server passing the ASA to the destination router.&lt;BR /&gt;Thanks a lot.&lt;/P&gt;</description>
    <pubDate>Mon, 28 May 2018 06:58:39 GMT</pubDate>
    <dc:creator>Mohd Khairul Nizam</dc:creator>
    <dc:date>2018-05-28T06:58:39Z</dc:date>
    <item>
      <title>I think ASA is blocking TACACS+ traffic</title>
      <link>https://community.cisco.com/t5/network-security/i-think-asa-is-blocking-tacacs-traffic/m-p/3389674#M956753</link>
      <description />
      <pubDate>Mon, 22 Jun 2020 11:42:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-think-asa-is-blocking-tacacs-traffic/m-p/3389674#M956753</guid>
      <dc:creator>Mohd Khairul Nizam</dc:creator>
      <dc:date>2020-06-22T11:42:18Z</dc:date>
    </item>
    <item>
      <title>Re: I think ASA is blocking TACACS+ traffic</title>
      <link>https://community.cisco.com/t5/network-security/i-think-asa-is-blocking-tacacs-traffic/m-p/3389715#M956756</link>
      <description>&lt;P&gt;Is your firewall also doing NAT?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the best check would be to run packet-tracer. tcp packet, source outside interface, your router IP, source port 1025, dest your AAA server, dest port 49.&lt;/P&gt;</description>
      <pubDate>Sun, 27 May 2018 03:51:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-think-asa-is-blocking-tacacs-traffic/m-p/3389715#M956756</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-05-27T03:51:18Z</dc:date>
    </item>
    <item>
      <title>Re: I think ASA is blocking TACACS+ traffic</title>
      <link>https://community.cisco.com/t5/network-security/i-think-asa-is-blocking-tacacs-traffic/m-p/3389760#M956804</link>
      <description>&lt;P&gt;there is no NAT in place in the ASA&amp;nbsp;&lt;/P&gt;&lt;P&gt;for packet tracer , why does source port is 1025 ?&lt;/P&gt;&lt;P&gt;here is the trace&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jun 2020 06:59:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-think-asa-is-blocking-tacacs-traffic/m-p/3389760#M956804</guid>
      <dc:creator>Mohd Khairul Nizam</dc:creator>
      <dc:date>2020-06-23T06:59:57Z</dc:date>
    </item>
    <item>
      <title>Re: I think ASA is blocking TACACS+ traffic</title>
      <link>https://community.cisco.com/t5/network-security/i-think-asa-is-blocking-tacacs-traffic/m-p/3389806#M956805</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/320485"&gt;@Mohd Khairul Nizam&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We use 1025 as the source port because tcp communications by default use some ephemeral port number for source (i.e. &amp;gt;1024 and &amp;lt;64k).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your trace indicates the traffic is coming FROM the .65 host (Voice Group) and TO the .70 host (Voice GW). Are they on the same subnet (the trace indicates they are)? If so, you must permit traffic on same-security level explicitly.&lt;/P&gt;</description>
      <pubDate>Sun, 27 May 2018 15:01:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-think-asa-is-blocking-tacacs-traffic/m-p/3389806#M956805</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-05-27T15:01:37Z</dc:date>
    </item>
    <item>
      <title>Re: I think ASA is blocking TACACS+ traffic</title>
      <link>https://community.cisco.com/t5/network-security/i-think-asa-is-blocking-tacacs-traffic/m-p/3389872#M956806</link>
      <description>&lt;P&gt;Yes, both is in same subnet , /26&lt;/P&gt;
&lt;P&gt;how should i permit it, mean need to add additional ACL ?&lt;/P&gt;</description>
      <pubDate>Sun, 27 May 2018 23:41:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-think-asa-is-blocking-tacacs-traffic/m-p/3389872#M956806</guid>
      <dc:creator>Mohd Khairul Nizam</dc:creator>
      <dc:date>2018-05-27T23:41:25Z</dc:date>
    </item>
    <item>
      <title>Re: I think ASA is blocking TACACS+ traffic</title>
      <link>https://community.cisco.com/t5/network-security/i-think-asa-is-blocking-tacacs-traffic/m-p/3389890#M956807</link>
      <description>&lt;P&gt;Try adding the command:&lt;/P&gt;
&lt;PRE&gt;same-security-traffic permit intra-interface &lt;/PRE&gt;
&lt;P&gt;...and then repeat the packet-tracer test.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/S/cmdref3/s1.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/S/cmdref3/s1.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 May 2018 03:12:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-think-asa-is-blocking-tacacs-traffic/m-p/3389890#M956807</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-05-28T03:12:57Z</dc:date>
    </item>
    <item>
      <title>Re: I think ASA is blocking TACACS+ traffic</title>
      <link>https://community.cisco.com/t5/network-security/i-think-asa-is-blocking-tacacs-traffic/m-p/3389904#M956810</link>
      <description>&lt;P&gt;boot system disk0:/asa832-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone MY 8&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name aia.biz&lt;BR /&gt;same-security-traffic permit intra-interface&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;already key in the command, and then packet-tracer again but still not go through&lt;/P&gt;</description>
      <pubDate>Mon, 28 May 2018 04:10:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-think-asa-is-blocking-tacacs-traffic/m-p/3389904#M956810</guid>
      <dc:creator>Mohd Khairul Nizam</dc:creator>
      <dc:date>2018-05-28T04:10:10Z</dc:date>
    </item>
    <item>
      <title>Re: I think ASA is blocking TACACS+ traffic</title>
      <link>https://community.cisco.com/t5/network-security/i-think-asa-is-blocking-tacacs-traffic/m-p/3389949#M956813</link>
      <description>&lt;P&gt;i manage to got it cover and resolve it&lt;BR /&gt;&lt;BR /&gt;create a rules allowing the tacacs server passing the ASA to the destination router.&lt;BR /&gt;Thanks a lot.&lt;/P&gt;</description>
      <pubDate>Mon, 28 May 2018 06:58:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/i-think-asa-is-blocking-tacacs-traffic/m-p/3389949#M956813</guid>
      <dc:creator>Mohd Khairul Nizam</dc:creator>
      <dc:date>2018-05-28T06:58:39Z</dc:date>
    </item>
  </channel>
</rss>

