cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
408
Views
0
Helpful
1
Replies

acl is blocking symantec update

gilberthowell
Level 1
Level 1

Our pc's are not able to update their Symantec policy and it appears that the acl is blocking their access. 

I created an access-list 150 to distinguish the traffic for the Symantec server, which is x.x.44.16.

Ran a debug ip packet 150 detail.  I'm seeing "IP not enabled discard(20)", but not sure what to add to the access-list to allow the traffic.  If that is what is needed. 

Any help would be greatly appreciated.

Here is the access-list:

10 permit ip any host 10.24.44.16 (1169 matches)
    20 permit ip any host 10.24.44.21
    30 deny udp any any eq domain (2659 matches)
    40 deny udp any any eq bootpc
    50 deny ip any host 10.24.1.223 (26356 matches)
    60 deny ip any host 10.24.1.224
    70 permit tcp any any eq www (13772 matches)
    80 permit tcp any any eq 443 (23869 matches)
    90 deny ip any any (1484 matches)

Here are parts of the debug that seems relative to the traffic being dropped.

2456709: Jun 15 12:19:28.819 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456710: Jun 15 12:19:28.819 UTC:     TCP src=60186, dst=8014, seq=4238176307, ack=0, win=8192 SYN, EPM HTTP Redirect(38), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456711: Jun 15 12:19:28.819 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456712: Jun 15 12:19:28.819 UTC:     TCP src=60186, dst=8014, seq=4238176307, ack=0, win=8192 SYN, Access List(39), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456713: Jun 15 12:19:28.819 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456714: Jun 15 12:19:28.819 UTC:     TCP src=60186, dst=8014, seq=4238176307, ack=0, win=8192 SYN, MCI Check(90), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456715: Jun 15 12:19:31.847 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456716: Jun 15 12:19:31.847 UTC:     TCP src=60186, dst=8014, seq=4238176307, ack=0, win=8192 SYN, IP not enabled discard(20), rtype 0, forus FALSE,

Below is the entire debug that was captured.

=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2016.06.15 08:19:52 =~=~=~=~=~=~=~=~=~=~=~=

2456703: Jun 15 12:19:16.765 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 48, input feature
2456704: Jun 15 12:19:16.765 UTC:     TCP src=60183, dst=8014, seq=1018617370, ack=0, win=8192 SYN, Access List(39), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456705: Jun 15 12:19:16.765 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 48, input feature
2456706: Jun 15 12:19:16.765 UTC:     TCP src=60183, dst=8014, seq=1018617370, ack=0, win=8192 SYN, MCI Check(90), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456707: Jun 15 12:19:28.819 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456708: Jun 15 12:19:28.819 UTC:     TCP src=60186, dst=8014, seq=4238176307, ack=0, win=8192 SYN, IP not enabled discard(20), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456709: Jun 15 12:19:28.819 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456710: Jun 15 12:19:28.819 UTC:     TCP src=60186, dst=8014, seq=4238176307, ack=0, win=8192 SYN, EPM HTTP Redirect(38), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456711: Jun 15 12:19:28.819 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456712: Jun 15 12:19:28.819 UTC:     TCP src=60186, dst=8014, seq=4238176307, ack=0, win=8192 SYN, Access List(39), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456713: Jun 15 12:19:28.819 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456714: Jun 15 12:19:28.819 UTC:     TCP src=60186, dst=8014, seq=4238176307, ack=0, win=8192 SYN, MCI Check(90), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456715: Jun 15 12:19:31.847 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456716: Jun 15 12:19:31.847 UTC:     TCP src=60186, dst=8014, seq=4238176307, ack=0, win=8192 SYN, IP not enabled discard(20), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456717: Jun 15 12:19:31.847 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456718: Jun 15 12:19:31.847 UTC:     TCP src=60186, dst=8014, seq=4238176307, ack=0, win=8192 SYN, EPM HTTP Redirect(38), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456719: Jun 15 12:19:31.847 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456720: Jun 15 12:19:31.847 UTC:     TCP src=60186, dst=8014, seq=4238176307, ack=0, win=8192 SYN, Access List(39), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456721: Jun 15 12:19:31.847 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456722: Jun 15 12:19:31.847 UTC:     TCP src=60186, dst=8014, seq=4238176307, ack=0, win=8192 SYN, MCI Check(90), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456723: Jun 15 12:19:37.853 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 48, input feature
2456724: Jun 15 12:19:37.853 UTC:     TCP src=60186, dst=8014, seq=4238176307, ack=0, win=8192 SYN, IP not enabled discard(20), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456725: Jun 15 12:19:37.853 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 48, input feature
2456726: Jun 15 12:19:37.853 UTC:     TCP src=60186, dst=8014, seq=4238176307, ack=0, win=8192 SYN, EPM HTTP Redirect(38), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456727: Jun 15 12:19:37.853 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 48, input feature
2456728: Jun 15 12:19:37.853 UTC:     TCP src=60186, dst=8014, seq=4238176307, ack=0, win=8192 SYN, Access List(39), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456729: Jun 15 12:19:37.853 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 48, input feature
2456730: Jun 15 12:19:37.853 UTC:     TCP src=60186, dst=8014, seq=4238176307, ack=0, win=8192 SYN, MCI Check(90), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456731: Jun 15 12:19:49.849 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456732: Jun 15 12:19:49.849 UTC:     TCP src=60187, dst=8014, seq=781807904, ack=0, win=8192 SYN, IP not enabled discard(20), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456733: Jun 15 12:19:49.849 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456734: Jun 15 12:19:49.849 UTC:     TCP src=60187, dst=8014, seq=781807904, ack=0, win=8192 SYN, EPM HTTP Redirect(38), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456735: Jun 15 12:19:49.849 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456736: Jun 15 12:19:49.849 UTC:     TCP src=60187, dst=8014, seq=781807904, ack=0, win=8192 SYN, Access List(39), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456737: Jun 15 12:19:49.849 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456738: Jun 15 12:19:49.849 UTC:     TCP src=60187, dst=8014, seq=781807904, ack=0, win=8192 SYN, MCI Check(90), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456739: Jun 15 12:19:52.852 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456740: Jun 15 12:19:52.852 UTC:     TCP src=60187, dst=8014, seq=781807904, ack=0, win=8192 SYN, IP not enabled discard(20), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456741: Jun 15 12:19:52.852 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456742: Jun 15 12:19:52.852 UTC:     TCP src=60187, dst=8014, seq=781807904, ack=0, win=8192 SYN, EPM HTTP Redirect(38), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456743: Jun 15 12:19:52.852 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456744: Jun 15 12:19:52.852 UTC:     TCP src=60187, dst=8014, seq=781807904, ack=0, win=8192 SYN, Access List(39), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456745: Jun 15 12:19:52.852 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456746: Jun 15 12:19:52.852 UTC:     TCP src=60187, dst=8014, seq=781807904, ack=0, win=8192 SYN, MCI Check(90), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456747: Jun 15 08:19:54: %EPM-6-POLICY_APP_SUCCESS: Policy Application succeded for Client [X.X.50.84] MAC [78e3.b5bf.6bc7] AuditSession ID [0A1801150000BCB35470DEB9] for POLICY_TYPE [URL Redirect] POLICY_NAME [https://cp5dmherhsc03p.Berryhospital.org:8443/portal/gateway?sessionId=0A1801150000BCB35470DEB9&portal=05477650-5650-11e5-8f5f-005056ba6f0e&action=cpp&token=82bbd7d4584b2d959b32e0cf2f73d363]
2456748: Jun 15 08:19:54: %EPM-6-POLICY_APP_SUCCESS: Policy Application succeded for Client [X.X.50.84] MAC [78e3.b5bf.6bc7] AuditSession ID [0A1801150000BCB35470DEB9] for POLICY_TYPE [Named Acl] POLICY_NAME [xACSACLx-IP-POSTURE_PROVISIONING-56ba5b7b]
2456749: Jun 15 12:19:58.858 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 48, input feature
2456750: Jun 15 12:19:58.858 UTC:     TCP src=60187, dst=8014, seq=781807904, ack=0, win=8192 SYN, IP not enabled discard(20), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456751: Jun 15 12:19:58.858 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 48, input feature
2456752: Jun 15 12:19:58.866 UTC:     TCP src=60187, dst=8014, seq=781807904, ack=0, win=8192 SYN, EPM HTTP Redirect(38), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456753: Jun 15 12:19:58.866 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 48, input feature
2456754: Jun 15 12:19:58.866 UTC:     TCP src=60187, dst=8014, seq=781807904, ack=0, win=8192 SYN, Access List(39), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456755: Jun 15 12:19:58.866 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 48, input feature
2456756: Jun 15 12:19:58.866 UTC:     TCP src=60187, dst=8014, seq=781807904, ack=0, win=8192 SYN, MCI Check(90), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456757: Jun 15 12:20:10.912 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456758: Jun 15 12:20:10.912 UTC:     TCP src=60220, dst=8014, seq=3256263000, ack=0, win=8192 SYN, IP not enabled discard(20), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456759: Jun 15 12:20:10.912 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456760: Jun 15 12:20:10.912 UTC:     TCP src=60220, dst=8014, seq=3256263000, ack=0, win=8192 SYN, EPM HTTP Redirect(38), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456761: Jun 15 12:20:10.912 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456762: Jun 15 12:20:10.912 UTC:     TCP src=60220, dst=8014, seq=3256263000, ack=0, win=8192 SYN, Access List(39), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456763: Jun 15 12:20:10.912 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456764: Jun 15 12:20:10.912 UTC:     TCP src=60220, dst=8014, seq=3256263000, ack=0, win=8192 SYN, MCI Check(90), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456765: Jun 15 12:20:13.931 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456766: Jun 15 12:20:13.931 UTC:     TCP src=60220, dst=8014, seq=3256263000, ack=0, win=8192 SYN, IP not enabled discard(20), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456767: Jun 15 12:20:13.931 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456768: Jun 15 12:20:13.931 UTC:     TCP src=60220, dst=8014, seq=3256263000, ack=0, win=8192 SYN, EPM HTTP Redirect(38), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456769: Jun 15 12:20:13.931 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456770: Jun 15 12:20:13.931 UTC:     TCP src=60220, dst=8014, seq=3256263000, ack=0, win=8192 SYN, Access List(39), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456771: Jun 15 12:20:13.931 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456772: Jun 15 12:20:13.931 UTC:     TCP src=60220, dst=8014, seq=3256263000, ack=0, win=8192 SYN, MCI Check(90), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456773: Jun 15 12:20:19.937 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 48, input feature
2456774: Jun 15 12:20:19.937 UTC:     TCP src=60220, dst=8014, seq=3256263000, ack=0, win=8192 SYN, IP not enabled discard(20), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456775: Jun 15 12:20:19.937 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 48, input feature
2456776: Jun 15 12:20:19.937 UTC:     TCP src=60220, dst=8014, seq=3256263000, ack=0, win=8192 SYN, EPM HTTP Redirect(38), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456777: Jun 15 12:20:19.937 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 48, input feature
2456778: Jun 15 12:20:19.937 UTC:     TCP src=60220, dst=8014, seq=3256263000, ack=0, win=8192 SYN, Access List(39), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456779: Jun 15 12:20:19.937 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 48, input feature
2456780: Jun 15 12:20:19.937 UTC:     TCP src=60220, dst=8014, seq=3256263000, ack=0, win=8192 SYN, MCI Check(90), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456781: Jun 15 08:20:24: %DOT1X-5-FAIL: Authentication failed for client (74a0.2fc0.c661) on Interface Gi1/0/14 AuditSessionID 0A1801150000B27A1BA1CD46
2456782: Jun 15 08:20:24: %DOT1X-5-FAIL: Authentication failed for client (74a0.2fc0.bca5) on Interface Gi7/0/32 AuditSessionID 0A1801150000B028EC66E864
2456783: Jun 15 08:20:24: %DOT1X-5-FAIL: Authentication failed for client (ac7e.8ab6.1605) on Interface Gi1/0/26 AuditSessionID 0A1801150000AFD4EC550DF9
2456784: Jun 15 08:20:24: %DOT1X-5-FAIL: Authentication failed for client (74a0.2fc0.c2a1) on Interface Gi7/0/33 AuditSessionID 0A1801150000B029EC66FF5C
2456785: Jun 15 08:20:24: %EPM-6-POLICY_APP_SUCCESS: Policy Application succeded for Client [X.X.72.55] MAC [74a0.2fc0.c661] AuditSession ID [0A1801150000B27A1BA1CD46] for POLICY_TYPE [Named Acl] POLICY_NAME [xACSACLx-IP-PERMIT_ALL_TRAFFIC-4fe7f797]
2456786: Jun 15 08:20:24: %EPM-6-POLICY_APP_SUCCESS: Policy Application succeded for Client [X.X.72.45] MAC [74a0.2fc0.bca5] AuditSession ID [0A1801150000B028EC66E864] for POLICY_TYPE [Named Acl] POLICY_NAME [xACSACLx-IP-PERMIT_ALL_TRAFFIC-4fe7f797]
2456787: Jun 15 08:20:24: %EPM-6-POLICY_APP_SUCCESS: Policy Application succeded for Client [X.X.72.22] MAC [74a0.2fc0.c2a1] AuditSession ID [0A1801150000B029EC66FF5C] for POLICY_TYPE [Named Acl] POLICY_NAME [xACSACLx-IP-PERMIT_ALL_TRAFFIC-4fe7f797]
2456788: Jun 15 08:20:25: %EPM-6-POLICY_APP_SUCCESS: Policy Application succeded for Client [X.X.72.39] MAC [ac7e.8ab6.1605] AuditSession ID [0A1801150000AFD4EC550DF9] for POLICY_TYPE [Named Acl] POLICY_NAME [xACSACLx-IP-PERMIT_ALL_TRAFFIC-4fe7f797]
2456789: Jun 15 08:20:25: %DOT1X-5-FAIL: Authentication failed for client (b4e9.b000.6b19) on Interface Gi1/0/31 AuditSessionID 0A1801150000AFD9EC555632
2456790: Jun 15 08:20:25: %DOT1X-5-FAIL: Authentication failed for client (74a0.2fc0.c2d3) on Interface Gi1/0/32 AuditSessionID 0A1801150000AE5D5C60AA8E
2456791: Jun 15 08:20:25: %DOT1X-5-FAIL: Authentication failed for client (b4e9.b000.6b18) on Interface Gi5/0/31 AuditSessionID 0A1801150000AE9D8B8E4EAD
2456792: Jun 15 08:20:25: %EPM-6-AUTH_ACL: POLICY Auth-Default-ACL-OPEN| EVENT DETACH-SUCCESS
2456793: Jun 15 08:20:25: %EPM-6-AUTH_ACL: POLICY Auth-Default-ACL-OPEN| EVENT ATTACH-SUCCESS
2456794: Jun 15 08:20:25: %EPM-6-POLICY_APP_SUCCESS: Policy Application succeded for Client [X.X.72.24] MAC [b4e9.b000.6b19] AuditSession ID [0A1801150000AFD9EC555632] for POLICY_TYPE [Named Acl] POLICY_NAME [xACSACLx-IP-PERMIT_ALL_TRAFFIC-4fe7f797]
2456795: Jun 15 08:20:25: %EPM-6-POLICY_APP_SUCCESS: Policy Application succeded for Client [X.X.72.23] MAC [74a0.2fc0.c2d3] AuditSession ID [0A1801150000AE5D5C60AA8E] for POLICY_TYPE [Named Acl] POLICY_NAME [xACSACLx-IP-PERMIT_ALL_TRAFFIC-4fe7f797]
2456796: Jun 15 08:20:26: %EPM-6-AUTH_ACL: POLICY Auth-Default-ACL-OPEN| EVENT DETACH-SUCCESS
2456797: Jun 15 08:20:26: %EPM-6-AUTH_ACL: POLICY Auth-Default-ACL-OPEN| EVENT ATTACH-SUCCESS
2456798: Jun 15 08:20:26: %EPM-6-POLICY_APP_SUCCESS: Policy Application succeded for Client [X.X.72.61] MAC [b4e9.b000.6b18] AuditSession ID [0A1801150000AE9D8B8E4EAD] for POLICY_TYPE [Named Acl] POLICY_NAME [xACSACLx-IP-PERMIT_ALL_TRAFFIC-4fe7f797]
2456799: Jun 15 12:20:31.933 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456800: Jun 15 12:20:31.933 UTC:     TCP src=60234, dst=8014, seq=675559317, ack=0, win=8192 SYN, IP not enabled discard(20), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456801: Jun 15 12:20:31.933 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456802: Jun 15 12:20:31.933 UTC:     TCP src=60234, dst=8014, seq=675559317, ack=0, win=8192 SYN, EPM HTTP Redirect(38), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456803: Jun 15 12:20:31.933 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456804: Jun 15 12:20:31.933 UTC:     TCP src=60234, dst=8014, seq=675559317, ack=0, win=8192 SYN, Access List(39), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456805: Jun 15 12:20:31.933 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456806: Jun 15 12:20:31.933 UTC:     TCP src=60234, dst=8014, seq=675559317, ack=0, win=8192 SYN, MCI Check(90), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456807: Jun 15 12:20:32.897 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456808: Jun 15 12:20:32.897 UTC:     TCP src=60235, dst=8014, seq=2227599485, ack=0, win=8192 SYN, IP not enabled discard(20), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456809: Jun 15 12:20:32.897 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456810: Jun 15 12:20:32.897 UTC:     TCP src=60235, dst=8014, seq=2227599485, ack=0, win=8192 SYN, EPM HTTP Redirect(38), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456811: Jun 15 12:20:32.897 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456812: Jun 15 12:20:32.897 UTC:     TCP src=60235, dst=8014, seq=2227599485, ack=0, win=8192 SYN, Access List(39), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456813: Jun 15 12:20:32.897 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456814: Jun 15 12:20:32.897 UTC:     TCP src=60235, dst=8014, seq=2227599485, ack=0, win=8192 SYN, MCI Check(90), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456815: Jun 15 12:20:34.936 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456816: Jun 15 12:20:34.936 UTC:     TCP src=60234, dst=8014, seq=675559317, ack=0, win=8192 SYN, IP not enabled discard(20), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456817: Jun 15 12:20:34.936 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456818: Jun 15 12:20:34.936 UTC:     TCP src=60234, dst=8014, seq=675559317, ack=0, win=8192 SYN, EPM HTTP Redirect(38), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456819: Jun 15 12:20:34.936 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456820: Jun 15 12:20:34.936 UTC:     TCP src=60234, dst=8014, seq=675559317, ack=0, win=8192 SYN, Access List(39), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456821: Jun 15 12:20:34.936 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456822: Jun 15 12:20:34.936 UTC:     TCP src=60234, dst=8014, seq=675559317, ack=0, win=8192 SYN, MCI Check(90), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456823: Jun 15 12:20:35.900 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456824: Jun 15 12:20:35.900 UTC:     TCP src=60235, dst=8014, seq=2227599485, ack=0, win=8192 SYN, IP not enabled discard(20), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456825: Jun 15 12:20:35.900 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456826: Jun 15 12:20:35.900 UTC:     TCP src=60235, dst=8014, seq=2227599485, ack=0, win=8192 SYN, EPM HTTP Redirect(38), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456827: Jun 15 12:20:35.900 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456828: Jun 15 12:20:35.900 UTC:     TCP src=60235, dst=8014, seq=2227599485, ack=0, win=8192 SYN, Access List(39), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456829: Jun 15 12:20:35.900 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456830: Jun 15 12:20:35.900 UTC:     TCP src=60235, dst=8014, seq=2227599485, ack=0, win=8192 SYN, MCI Check(90), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456831: Jun 15 12:20:40.942 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 48, input feature
2456832: Jun 15 12:20:40.942 UTC:     TCP src=60234, dst=8014, seq=675559317, ack=0, win=8192 SYN, IP not enabled discard(20), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456833: Jun 15 12:20:40.942 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 48, input feature
2456834: Jun 15 12:20:40.942 UTC:     TCP src=60234, dst=8014, seq=675559317, ack=0, win=8192 SYN, EPM HTTP Redirect(38), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456835: Jun 15 12:20:40.942 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 48, input feature
2456836: Jun 15 12:20:40.942 UTC:     TCP src=60234, dst=8014, seq=675559317, ack=0, win=8192 SYN, Access List(39), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456837: Jun 15 12:20:40.942 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 48, input feature
2456838: Jun 15 12:20:40.942 UTC:     TCP src=60234, dst=8014, seq=675559317, ack=0, win=8192 SYN, MCI Check(90), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456839: Jun 15 12:20:41.906 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 48, input feature
2456840: Jun 15 12:20:41.906 UTC:     TCP src=60235, dst=8014, seq=2227599485, ack=0, win=8192 SYN, IP not enabled discard(20), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456841: Jun 15 12:20:41.906 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 48, input feature
2456842: Jun 15 12:20:41.906 UTC:     TCP src=60235, dst=8014, seq=2227599485, ack=0, win=8192 SYN, EPM HTTP Redirect(38), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456843: Jun 15 12:20:41.906 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 48, input feature
2456844: Jun 15 12:20:41.906 UTC:     TCP src=60235, dst=8014, seq=2227599485, ack=0, win=8192 SYN, Access List(39), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456845: Jun 15 12:20:41.906 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 48, input feature
2456846: Jun 15 12:20:41.906 UTC:     TCP src=60235, dst=8014, seq=2227599485, ack=0, win=8192 SYN, MCI Check(90), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456847: Jun 15 12:20:52.970 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456848: Jun 15 12:20:52.970 UTC:     TCP src=60239, dst=8014, seq=701022758, ack=0, win=8192 SYN, IP not enabled discard(20), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456849: Jun 15 12:20:52.970 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456850: Jun 15 12:20:52.970 UTC:     TCP src=60239, dst=8014, seq=701022758, ack=0, win=8192 SYN, EPM HTTP Redirect(38), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456851: Jun 15 12:20:52.970 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456852: Jun 15 12:20:52.970 UTC:     TCP src=60239, dst=8014, seq=701022758, ack=0, win=8192 SYN, Access List(39), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456853: Jun 15 12:20:52.979 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456854: Jun 15 12:20:52.979 UTC:     TCP src=60239, dst=8014, seq=701022758, ack=0, win=8192 SYN, MCI Check(90), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456855: Jun 15 12:20:55.990 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456856: Jun 15 12:20:55.990 UTC:     TCP src=60239, dst=8014, seq=701022758, ack=0, win=8192 SYN, IP not enabled discard(20), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456857: Jun 15 12:20:55.990 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456858: Jun 15 12:20:55.990 UTC:     TCP src=60239, dst=8014, seq=701022758, ack=0, win=8192 SYN, EPM HTTP Redirect(38), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456859: Jun 15 12:20:55.990 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456860: Jun 15 12:20:55.990 UTC:     TCP src=60239, dst=8014, seq=701022758, ack=0, win=8192 SYN, Access List(39), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE
2456861: Jun 15 12:20:55.990 UTC: IP: s=X.X.50.84 (GigabitEthernet4/0/27), d=X.X.44.16, len 52, input feature
2456862: Jun 15 12:20:55.990 UTC:     TCP src=60239, dst=8014, seq=701022758, ack=0, win=8192 SYN, MCI Check(90), rtype 0, forus FALSE, sendself FALSE, mtu 0, fwdchk FALSE u all
All possible debugging has been turned off
ERH-3750X-1JS01#
2456863: Jun 15 08:22:06: %DOT1X-5-FAIL: Authentication failed for client (f029.2958.f4ac) on Interface Gi4/0/30 AuditSessionID 0A1801150000AE5B5C5E9539
2456864: Jun 15 08:22:06: %EPM-6-POLICY_APP_SUCCESS: Policy Application succeded for Client [X.X.72.54] MAC [f029.2958.f4ac] AuditSession ID [0A1801150000AE5B5C5E9539] for POLICY_TYPE [Named Acl] POLICY_NAME [xACSACLx-IP-PERMIT_ALL_TRAFFIC-4fe7f797]

1 Reply 1

Mark Malone
VIP Alumni
VIP Alumni

If you google the symantec product it should give you the port numbers you need to open in the acl

maybe this link has something

http://www.symantec.com/connect/forums/what-firewall-ports-open-allow-clients-communicate-management-server