Cisco Support Community
cancel
Showing results for 
Search instead for 
Did you mean: 
Announcements

Welcome to Cisco Support Community. We would love to have your feedback.

For an introduction to the new site, click here. And see here for current known issues.

New Member

TCP Inspection

Hi.

I have OpenVPN set up to a remote site.

On the outward path traffic is directed through the VPN and straight in to the remote sites subent, however on the return path the traffic first hits the firewall before being re-routed back in to the subnet to the firewall (this was to avoid route statements on servers).

The problem with this is that the ASA denys TCP traffic on the return path as it did not see the original connection??

Deny TCP (no connection) Flags SYN ACK interface Inside

How do I either turn off this type of stateful inspection (not a great idea I know) or work around this?

1 REPLY
Cisco Employee

Re: TCP Inspection

Mike,

How about using the "Nailed" option under the static configuration.

nailed

(Optional) Allows TCP sessions for asymmetrically routed traffic. This option allows inbound traffic to traverse the security appliance without a corresponding outbound connection to establish the state. This command is used in conjunction with the failover timeout command. The failover timeout command specifies the amount of time after a system boots or becomes active that the nailed sessions are accepted. If not configured, the connections cannot be reestablished.

Note Adding the nailed option to the static command causes TCP state tracking and sequence checking to be skipped for the connection. Using the asr-group command to configure asymmetric routing support is more secure than using the static command with the nailed option and is the recommended method for configuring asymmetric routing support.

http://www.cisco.com/en/US/docs/security/asa/asa72/command/reference/s8_72.html#wp1202525

Regards,

Arul

*Pls rate if it helps*

172
Views
0
Helpful
1
Replies
CreatePlease login to create content