<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Odd traffic through ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/odd-traffic-through-asa/m-p/3372548#M961216</link>
    <description>&lt;P&gt;They look to me as dns and snmp server responses.&lt;/P&gt;
&lt;P&gt;I believe you would need those rules if you do not have the inspection for dns and snmp enabled.&lt;/P&gt;
&lt;P&gt;You could also do a capture of the packets to get more details.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Bogdan&lt;/P&gt;</description>
    <pubDate>Wed, 25 Apr 2018 08:15:30 GMT</pubDate>
    <dc:creator>Bogdan Nita</dc:creator>
    <dc:date>2018-04-25T08:15:30Z</dc:date>
    <item>
      <title>Odd traffic through ASA</title>
      <link>https://community.cisco.com/t5/network-security/odd-traffic-through-asa/m-p/3372034#M961215</link>
      <description>&lt;P&gt;We're in the process of restricting the lines in one of our access lists, and I've run across some interesting hits that seem strange. The UDP timeout is set for 2 minutes, but we&amp;nbsp; have some traffic I wasn't expecting - it seems to me as if the UDP timer times out, because what's being matched on appears to me to be return traffic. We have more entries similar to the following with the destination port gt 50000, and I also have a "permit udp any any" after these entries. If I take out these entries with the source ports lt 1024 and the destination ports gt 50000, the "permit udp any any" will start incrementing again.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;MYACL&amp;nbsp;&lt;/SPAN&gt;line 13 extended permit udp&amp;nbsp;&lt;SPAN style="font-size: 13.3333px;"&gt;172.20.0.0 255.255.248.0&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;eq domain 172.16.16.0 255.255.248.0 gt 50000 (hitcnt=109) 0x934d4385&lt;/P&gt;
&lt;P&gt;access-list MYACL line 19 extended permit udp&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;172.20.0.0&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;255.255.248.0&amp;nbsp;&lt;/SPAN&gt;eq snmp 172.16.16.0 255.255.248.0 gt 50000 (hitcnt=409) 0x5e40e624&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I remember crafting packets in the 80's with source port of 53 to get around the stateless ACLs on routers for UDP traffic, so I'm a little paranoid about permitting traffic that could potentially be a problem. I'd appreciate any thoughts here.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:40:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/odd-traffic-through-asa/m-p/3372034#M961215</guid>
      <dc:creator>baskervi</dc:creator>
      <dc:date>2020-02-21T15:40:01Z</dc:date>
    </item>
    <item>
      <title>Re: Odd traffic through ASA</title>
      <link>https://community.cisco.com/t5/network-security/odd-traffic-through-asa/m-p/3372548#M961216</link>
      <description>&lt;P&gt;They look to me as dns and snmp server responses.&lt;/P&gt;
&lt;P&gt;I believe you would need those rules if you do not have the inspection for dns and snmp enabled.&lt;/P&gt;
&lt;P&gt;You could also do a capture of the packets to get more details.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Bogdan&lt;/P&gt;</description>
      <pubDate>Wed, 25 Apr 2018 08:15:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/odd-traffic-through-asa/m-p/3372548#M961216</guid>
      <dc:creator>Bogdan Nita</dc:creator>
      <dc:date>2018-04-25T08:15:30Z</dc:date>
    </item>
    <item>
      <title>Re: Odd traffic through ASA</title>
      <link>https://community.cisco.com/t5/network-security/odd-traffic-through-asa/m-p/3373837#M961302</link>
      <description>&lt;P&gt;I agree that these are responses for dns and snmp, and inspection is enabled for both of these. That was my concern - during the inspection process, ASA properly&amp;nbsp;detects most responses but not all. I'm concerned that something may be going on that I need to investigate further, but I'm not able to find anything strange going on between or within the systems.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Apr 2018 14:51:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/odd-traffic-through-asa/m-p/3373837#M961302</guid>
      <dc:creator>baskervi</dc:creator>
      <dc:date>2018-04-26T14:51:53Z</dc:date>
    </item>
  </channel>
</rss>

