<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IOS Firewall and NAT Issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ios-firewall-and-nat-issue/m-p/802707#M988555</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think you need to add a class to explicitly allow TCP traffic from the trusted IP address and insert this class to be before the class that inspects TCP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 04 Jun 2007 13:24:08 GMT</pubDate>
    <dc:creator>hadbou</dc:creator>
    <dc:date>2007-06-04T13:24:08Z</dc:date>
    <item>
      <title>IOS Firewall and NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/ios-firewall-and-nat-issue/m-p/802706#M988519</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm still working in a valid configuration for a 2811 with IOS Firewall&lt;/P&gt;&lt;P&gt;with two WAN interfaces, one Ethernet and one DSL (with a HWIC-DSL port).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I configured two wan ports with SDM, DSL port as failover to the Ethernet&lt;/P&gt;&lt;P&gt;connection. DSL is working with IP Negotiated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current tests shows the following issue when Ethernet connection is down:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;000057: *May 28 13:52:48.195 PCTime: %FW-6-DROP_TCP_PKT: Dropping tcp pkt 88.17.245.247:1584 =&amp;gt; 213.4.130.210:80 due to  Invalid Ack (or no Ack) -- ip ident 15619 tcpflags 0x5010 seq.no 1024469584 ack 1157493661&lt;/P&gt;&lt;P&gt;000058: *May 28 13:53:20.187 PCTime: %FW-6-DROP_TCP_PKT: Dropping tcp pkt 88.17.245.247:1584 =&amp;gt; 213.4.130.210:80 due to  Invalid Ack (or no Ack) -- ip ident 15956 tcpflags 0x5010 seq.no 1024469584 ack 1157493661&lt;/P&gt;&lt;P&gt;000059: *May 28 13:53:52.179 PCTime: %FW-6-DROP_TCP_PKT: Dropping tcp pkt 88.17.245.247:1584 =&amp;gt; 213.4.130.210:80 due to  Invalid Ack (or no Ack) -- ip ident 16186 tcpflags 0x5010 seq.no 1024469584 ack 1157493661&lt;/P&gt;&lt;P&gt;000060: *May 28 13:54:24.171 PCTime: %FW-6-DROP_TCP_PKT: Dropping tcp pkt 213.4.130.210:80 =&amp;gt; 88.17.245.247:1584 due to  policy match failure -- ip ident 38064 tcpflags 0x5010 seq.no 1157479061 ack 1024469583&lt;/P&gt;&lt;P&gt;000061: *May 28 13:54:56.167 PCTime: %FW-6-DROP_TCP_PKT: Dropping tcp pkt 213.4.130.210:80 =&amp;gt; 88.17.245.247:1584 due to  policy match failure -- ip ident 55729 tcpflags 0x5010 seq.no 1157479061 ack 1024469583&lt;/P&gt;&lt;P&gt;000062: *May 28 13:55:28.155 PCTime: %FW-6-DROP_TCP_PKT: Dropping tcp pkt 213.4.130.210:80 =&amp;gt; 88.17.245.247:1584 due to  policy match failure -- ip ident 56754 tcpflags 0x5014 seq.no 1157493661 ack 1024469583&lt;/P&gt;&lt;P&gt;000063: *May 28 13:56:14.599 PCTime: %FW-6-DROP_TCP_PKT: Dropping tcp pkt 213.4.130.210:80 =&amp;gt; 88.17.245.247:1588 due to  policy match failure -- ip ident 14772 tcpflags 0x5014 seq.no 1165193308 ack 1776675591&lt;/P&gt;&lt;P&gt;000064: *May 28 13:56:46.371 PCTime: %FW-6-DROP_TCP_PKT: Dropping tcp pkt 62.189.244.236:80 =&amp;gt; 88.17.245.247:5410 due to  policy match failure -- ip ident 64702 tcpflags 0x5010 seq.no 1376485898 ack 2263723581&lt;/P&gt;&lt;P&gt;000065: *May 28 13:57:23.015 PCTime: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/3/2, changed state to up&lt;/P&gt;&lt;P&gt;000066: *May 28 13:57:50.375 PCTime: %FW-6-DROP_TCP_PKT: Dropping tcp pkt 62.189.244.236:80 =&amp;gt; 88.17.245.247:5410 due to  policy match failure -- ip ident 35164 tcpflags 0x5010 seq.no 1376485898 ack 2263723581&lt;/P&gt;&lt;P&gt;000067: *May 28 13:58:54.379 PCTime: %FW-6-DROP_TCP_PKT: Dropping tcp pkt 62.189.244.236:80 =&amp;gt; 88.17.245.247:5410 due to  policy match failure -- ip ident 12205 tcpflags 0x5010 seq.no 1376485898 ack 2263723581&lt;/P&gt;&lt;P&gt;000068: *May 28 13:59:58.383 PCTime: %FW-6-DROP_TCP_PKT: Dropping tcp pkt 62.189.244.236:80 =&amp;gt; 88.17.245.247:5410 due to  policy match failure -- ip ident 50077 tcpflags 0x5010 seq.no 1376485898 ack 2263723581&lt;/P&gt;&lt;P&gt;000069: *May 28 14:01:02.387 PCTime: %FW-6-DROP_TCP_PKT: Dropping tcp pkt 62.189.244.236:80 =&amp;gt; 88.17.245.247:5410 due to  policy match failure -- ip ident 19913 tcpflags 0x5010 seq.no 1376485898 ack 2263723581&lt;/P&gt;&lt;P&gt;000070: *May 28 14:02:06.383 PCTime: %FW-6-DROP_TCP_PKT: Dropping tcp pkt 62.189.244.236:80 =&amp;gt; 88.17.245.247:5410 due to  policy match failure -- ip ident 64241 tcpflags 0x5014 seq.no 1376488818 ack 2263723581&lt;/P&gt;&lt;P&gt;000071: *May 28 14:02:41.147 PCTime: %FW-6-DROP_TCP_PKT: Dropping tcp pkt 62.189.244.236:80 =&amp;gt; 88.17.245.247:43248 due to  policy match failure -- ip ident 60688 tcpflags 0x5014 seq.no 1979999494 ack 671214943&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I can see, ACK packets from external webs are dropped by match policy maps&lt;/P&gt;&lt;P&gt;I think the problem is related to some NAT issue, but I'm not sure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ignacio Siles.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:21:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-firewall-and-nat-issue/m-p/802706#M988519</guid>
      <dc:creator>chorl0232</dc:creator>
      <dc:date>2019-03-11T10:21:04Z</dc:date>
    </item>
    <item>
      <title>Re: IOS Firewall and NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/ios-firewall-and-nat-issue/m-p/802707#M988555</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think you need to add a class to explicitly allow TCP traffic from the trusted IP address and insert this class to be before the class that inspects TCP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Jun 2007 13:24:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-firewall-and-nat-issue/m-p/802707#M988555</guid>
      <dc:creator>hadbou</dc:creator>
      <dc:date>2007-06-04T13:24:08Z</dc:date>
    </item>
  </channel>
</rss>

