<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA Packet inspection function in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-packet-inspection-function/m-p/3353871#M978393</link>
    <description>right, done and problem solved. With the packet-trace i verified that nothing was blocking the communication from both side. I than moved my investigation to the next-router and i discovered an ACL in inbound to the default-gateway of the server which was blocking the ack.&lt;BR /&gt;Even if I performed all these check before reading your answer, i will mark in any it as correct. Thanks.</description>
    <pubDate>Fri, 23 Mar 2018 11:11:22 GMT</pubDate>
    <dc:creator>Bova_1980</dc:creator>
    <dc:date>2018-03-23T11:11:22Z</dc:date>
    <item>
      <title>ASA Packet inspection function</title>
      <link>https://community.cisco.com/t5/network-security/asa-packet-inspection-function/m-p/3353023#M978391</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a kind of basic question.&lt;/P&gt;
&lt;P&gt;1)Firewall model -&amp;gt; Cisco Adaptive Security Appliance Software Version 8.2(5)&lt;/P&gt;
&lt;P&gt;2)nat-control enabled&lt;/P&gt;
&lt;P&gt;3)Inbound connection (initiated from the outside direct to inside)&lt;/P&gt;
&lt;P&gt;3)regular static NAT configured&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;static (inside,outside) x.x.x.x 172.17.32.50 netmask 255.255.255.255&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;ASA-5540# show xlate detail | include 172.17.32.50&lt;/EM&gt;&lt;BR /&gt;NAT from inside:172.17.32.50 to outside:x.x.x.x flags s&lt;/P&gt;
&lt;P&gt;4)inside interface sec-level -&amp;gt; 100&lt;/P&gt;
&lt;P&gt;5)outside interface sec-level -&amp;gt; 0&lt;/P&gt;
&lt;P&gt;6)ACL applied to outside interface&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;access-group outside-in in interface outside&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;6)pubblic IP which start the connection is: y.y.y.y&lt;/P&gt;
&lt;P&gt;7)show conn is&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;TCP outside:y.y.y.y/55400 (y.y.y.y/55400) inside:172.17.32.50/443 (x.x.x.x/443), flags SaAB, idle 3s, uptime 6s, timeout 30s, bytes 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;TCP outside:y.y.y.y/55375 (y.y.y.y/55375) inside:172.17.32.50/443 (x.x.x.x/443), flags SaAB, idle 13s, uptime 16s, timeout 30s, bytes 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;TCP outside:y.y.y.y/55376 (y.y.y.y/55376) inside:172.17.32.50/443 (x.x.x.x/443), flags SaAB, idle 13s, uptime 16s, timeout 30s, bytes 0&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Problem:&lt;/P&gt;
&lt;P&gt;1)As you can see from the flag, the firewall is&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;A&lt;/STRONG&gt; -&amp;gt; awaiting inside ACK to SYN&lt;/P&gt;
&lt;P&gt;Investigation done:&lt;/P&gt;
&lt;P&gt;1)Routing between the firewall and the server is in place&lt;/P&gt;
&lt;P&gt;2)the xlate is ok, and checking the "Cisco Firewall´s seequence of Packet Inspection Functions",&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="asa.png" style="width: 756px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/9258iAF907E03CCC0ABCE/image-size/large?v=v2&amp;amp;px=999" role="button" title="asa.png" alt="asa.png" /&gt;&lt;/span&gt;it seems to me that after the xlate lookup there is nothing else preventig this request to hit the server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Am I wrong or should I further check something else on the firewall that might block the connection (ACL )?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:32:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-packet-inspection-function/m-p/3353023#M978391</guid>
      <dc:creator>Bova_1980</dc:creator>
      <dc:date>2020-02-21T15:32:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Packet inspection function</title>
      <link>https://community.cisco.com/t5/network-security/asa-packet-inspection-function/m-p/3353829#M978392</link>
      <description>Why don't you use packet-trace command on ASA to see what is happening. You&lt;BR /&gt;need to simulate the return ACK from inside. If its allowed, use packet&lt;BR /&gt;capture on ASA inside interface to see if return packet is coming&lt;BR /&gt;</description>
      <pubDate>Fri, 23 Mar 2018 09:41:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-packet-inspection-function/m-p/3353829#M978392</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2018-03-23T09:41:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Packet inspection function</title>
      <link>https://community.cisco.com/t5/network-security/asa-packet-inspection-function/m-p/3353871#M978393</link>
      <description>right, done and problem solved. With the packet-trace i verified that nothing was blocking the communication from both side. I than moved my investigation to the next-router and i discovered an ACL in inbound to the default-gateway of the server which was blocking the ack.&lt;BR /&gt;Even if I performed all these check before reading your answer, i will mark in any it as correct. Thanks.</description>
      <pubDate>Fri, 23 Mar 2018 11:11:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-packet-inspection-function/m-p/3353871#M978393</guid>
      <dc:creator>Bova_1980</dc:creator>
      <dc:date>2018-03-23T11:11:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Packet inspection function</title>
      <link>https://community.cisco.com/t5/network-security/asa-packet-inspection-function/m-p/3353877#M978394</link>
      <description>Good news&lt;BR /&gt;</description>
      <pubDate>Fri, 23 Mar 2018 11:19:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-packet-inspection-function/m-p/3353877#M978394</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2018-03-23T11:19:19Z</dc:date>
    </item>
  </channel>
</rss>

