<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASAv only using the Management interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asav-only-using-the-management-interface/m-p/4296387#M1078752</link>
    <description>&lt;P&gt;Thanks Rob. That kind of answers my question so there is really no need for an outside interface.&lt;/P&gt;</description>
    <pubDate>Tue, 23 Feb 2021 20:21:35 GMT</pubDate>
    <dc:creator>jf1134</dc:creator>
    <dc:date>2021-02-23T20:21:35Z</dc:date>
    <item>
      <title>ASAv only using the Management interface</title>
      <link>https://community.cisco.com/t5/network-security/asav-only-using-the-management-interface/m-p/4296190#M1078735</link>
      <description>&lt;P&gt;I am working on deploying a new ASAv and it's only using the Management and I can't figure this out on how to use the outside interface for traffic. When I try to add a static route using an IP in the outside interface range it gives an error conflicts with existing routes. Since there is only a single public IP in Azure, I suppose I can't use any type of range on that interface.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Feb 2021 16:37:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-only-using-the-management-interface/m-p/4296190#M1078735</guid>
      <dc:creator>jf1134</dc:creator>
      <dc:date>2021-02-23T16:37:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASAv only using the Management interface</title>
      <link>https://community.cisco.com/t5/network-security/asav-only-using-the-management-interface/m-p/4296261#M1078738</link>
      <description>&lt;P&gt;High level you need mode interface, if not you need to configure FW in stick with different sub-interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;can you post show run from FW to understand better.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Feb 2021 17:58:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-only-using-the-management-interface/m-p/4296261#M1078738</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-02-23T17:58:11Z</dc:date>
    </item>
    <item>
      <title>Re: ASAv only using the Management interface</title>
      <link>https://community.cisco.com/t5/network-security/asav-only-using-the-management-interface/m-p/4296301#M1078742</link>
      <description>&lt;P&gt;Here's the config&lt;/P&gt;&lt;P&gt;ASA-AnyConnect&amp;gt; en&lt;BR /&gt;Password: ****************&lt;BR /&gt;ASA-AnyConnect# sh run&lt;BR /&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;BR /&gt;: Serial Number: 9AWXCXLAGGJ&lt;BR /&gt;: Hardware: ASAv, 14336 MB RAM, CPU Xeon E5 series 2400 MHz, 1 CPU (4 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.15(1)1&lt;BR /&gt;!&lt;BR /&gt;hostname ASA-AnyConnect&lt;BR /&gt;enable password ***** pbkdf2&lt;BR /&gt;service-module 0 keepalive-timeout 4&lt;BR /&gt;service-module 0 keepalive-counter 6&lt;BR /&gt;names&lt;BR /&gt;no mac-address auto&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif Outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.75.2.4 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif Inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.75.3.4 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;no management-only&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address dhcp setroute&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CST -6&lt;BR /&gt;clock summer-time CDT recurring&lt;BR /&gt;dns domain-lookup management&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 168.63.129.16&lt;BR /&gt;pager lines 23&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu management 1500&lt;BR /&gt;mtu Outside 1500&lt;BR /&gt;mtu Inside 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;no validation-usage&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;auto-import&lt;BR /&gt;crypto ca certificate chain _SmartCallHome_ServerCA&lt;BR /&gt;certificate ca 0509&lt;BR /&gt;308205b7 3082039f a0030201 02020205 09300d06 092a8648 86f70d01 01050500&lt;BR /&gt;3045310b 30090603 55040613 02424d31 19301706 0355040a 13105175 6f566164&lt;BR /&gt;6973204c 696d6974 6564311b 30190603 55040313 1251756f 56616469 7320526f&lt;BR /&gt;6f742043 41203230 1e170d30 36313132 34313832 3730305a 170d3331 31313234&lt;BR /&gt;31383233 33335a30 45310b30 09060355 04061302 424d3119 30170603 55040a13&lt;BR /&gt;1051756f 56616469 73204c69 6d697465 64311b30 19060355 04031312 51756f56&lt;BR /&gt;61646973 20526f6f 74204341 20323082 0222300d 06092a86 4886f70d 01010105&lt;BR /&gt;00038202 0f003082 020a0282 0201009a 18ca4b94 0d002daf 03298af0 0f81c8ae&lt;BR /&gt;4c19851d 089fab29 4485f32f 81ad321e 9046bfa3 86261a1e fe7e1c18 3a5c9c60&lt;BR /&gt;172a3a74 8333307d 615411cb edabe0e6 d2a27ef5 6b6f18b7 0a0b2dfd e93eef0a&lt;BR /&gt;c6b310e9 dcc24617 f85dfda4 daff9e49 5a9ce633 e62496f7 3fba5b2b 1c7a35c2&lt;BR /&gt;d667feab 66508b6d 28602bef d760c3c7 93bc8d36 91f37ff8 db1113c4 9c7776c1&lt;BR /&gt;aeb7026a 817aa945 83e205e6 b956c194 378f4871 6322ec17 6507958a 4bdf8fc6&lt;BR /&gt;5a0ae5b0 e35f5e6b 11ab0cf9 85eb44e9 f80473f2 e9fe5c98 8cf573af 6bb47ecd&lt;BR /&gt;d45c022b 4c39e1b2 95952d42 87d7d5b3 9043b76c 13f1dedd f6c4f889 3fd175f5&lt;BR /&gt;92c391d5 8a88d090 ecdc6dde 89c26571 968b0d03 fd9cbf5b 16ac92db eafe797c&lt;BR /&gt;adebaff7 16cbdbcd 252be51f fb9a9fe2 51cc3a53 0c48e60e bdc9b476 0652e611&lt;BR /&gt;13857263 0304e004 362b2019 02e874a7 1fb6c956 66f07525 dc67c10e 616088b3&lt;BR /&gt;3ed1a8fc a3da1db0 d1b12354 df44766d ed41d8c1 b222b653 1cdf351d dca1772a&lt;BR /&gt;31e42df5 e5e5dbc8 e0ffe580 d70b63a0 ff33a10f ba2c1515 ea97b3d2 a2b5bef2&lt;BR /&gt;8c961e1a 8f1d6ca4 6137b986 7333d797 969e237d 82a44c81 e2a1d1ba 675f9507&lt;BR /&gt;a32711ee 16107bbc 454a4cb2 04d2abef d5fd0c51 ce506a08 31f991da 0c8f645c&lt;BR /&gt;03c33a8b 203f6e8d 673d3ad6 fe7d5b88 c95efbcc 61dc8b33 77d34432 35096204&lt;BR /&gt;921610d8 9e2747fb 3b21e3f8 eb1d5b02 03010001 a381b030 81ad300f 0603551d&lt;BR /&gt;130101ff 04053003 0101ff30 0b060355 1d0f0404 03020106 301d0603 551d0e04&lt;BR /&gt;1604141a 8462bc48 4c332504 d4eed0f6 03c41946 d1946b30 6e060355 1d230467&lt;BR /&gt;30658014 1a8462bc 484c3325 04d4eed0 f603c419 46d1946b a149a447 3045310b&lt;BR /&gt;30090603 55040613 02424d31 19301706 0355040a 13105175 6f566164 6973204c&lt;BR /&gt;696d6974 6564311b 30190603 55040313 1251756f 56616469 7320526f 6f742043&lt;BR /&gt;41203282 02050930 0d06092a 864886f7 0d010105 05000382 0201003e 0a164d9f&lt;BR /&gt;065ba8ae 715d2f05 2f67e613 4583c436 f6f3c026 0c0db547 645df8b4 72c946a5&lt;BR /&gt;03182755 89787d76 ea963480 1720dce7 83f88dfc 07b8da5f 4d2e67b2 84fdd944&lt;BR /&gt;fc775081 e67cb4c9 0d0b7253 f8760707 4147960c fbe08226 93558cfe 221f6065&lt;BR /&gt;7c5fe726 b3f73290 9850d437 7155f692 2178f795 79faf82d 26876656 3077a637&lt;BR /&gt;78335210 58ae3f61 8ef26ab1 ef187e4a 5963ca8d a256d5a7 2fbc561f cf39c1e2&lt;BR /&gt;fb0aa815 2c7d4d7a 63c66c97 443cd26f c34a170a f890d257 a21951a5 2d9741da&lt;BR /&gt;074fa950 da908d94 46e13ef0 94fd1000 38f53be8 40e1b46e 561a20cc 6f588ded&lt;BR /&gt;2e458fd6 e9933fe7 b12cdf3a d6228cdc 84bb226f d0f8e4c6 39e90488 3cc3baeb&lt;BR /&gt;557a6d80 9924f56c 01fbf897 b0945beb fdd26ff1 77680d35 6423acb8 55a103d1&lt;BR /&gt;4d4219dc f8755956 a3f9a849 79f8af0e b911a07c b76aed34 d0b62662 381a870c&lt;BR /&gt;f8e8fd2e d3907f07 912a1dd6 7e5c8583 99b03808 3fe95ef9 3507e4c9 626e577f&lt;BR /&gt;a75095f7 bac89be6 8ea201c5 d666bf79 61f33c1c e1b9825c 5da0c3e9 d848bd19&lt;BR /&gt;a2111419 6eb2861b 683e4837 1a88b75d 965e9cc7 ef276208 e291195c d2f121dd&lt;BR /&gt;ba174282 97718153 31a99ff6 7d62bf72 e1a3931d cc8a265a 0938d0ce d70d8016&lt;BR /&gt;b478a53a 874c8d8a a5d54697 f22c10b9 bc5422c0 01506943 9ef4b2ef 6df8ecda&lt;BR /&gt;f1e3b1ef df918f54 2a0b25c1 2619c452 100565d5 8210eac2 31cd2e&lt;BR /&gt;quit&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group14-sha256&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 management&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username asa_admin password ***** pbkdf2 privilege 15&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect snmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;call-home reporting anonymous prompt 2&lt;BR /&gt;call-home&lt;BR /&gt;profile License&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination transport-method http&lt;BR /&gt;Cryptochecksum:a19a64da13764a2e7f720db7f683e2a1&lt;BR /&gt;: end&lt;BR /&gt;ASA-AnyConnect#&lt;/P&gt;</description>
      <pubDate>Tue, 23 Feb 2021 19:00:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-only-using-the-management-interface/m-p/4296301#M1078742</guid>
      <dc:creator>jf1134</dc:creator>
      <dc:date>2021-02-23T19:00:30Z</dc:date>
    </item>
    <item>
      <title>Re: ASAv only using the Management interface</title>
      <link>https://community.cisco.com/t5/network-security/asav-only-using-the-management-interface/m-p/4296305#M1078743</link>
      <description>&lt;PRE&gt;interface GigabitEthernet0/0
nameif Outside
security-level 0
ip address 10.75.2.4 255.255.255.0
!
interface GigabitEthernet0/1
nameif Inside
security-level 100
ip address 10.75.3.4 255.255.255.0
!
interface GigabitEthernet0/2
no nameif
no security-level
no ip address
!
interface Management0/0
no management-only
nameif management
security-level 0
ip address dhcp setroute
!&lt;/PRE&gt;
&lt;P&gt;for public ip address you need to use a managment0/0 interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;what static route you tryiing to configure? also could you share the output of show route&lt;/P&gt;</description>
      <pubDate>Tue, 23 Feb 2021 19:13:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-only-using-the-management-interface/m-p/4296305#M1078743</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2021-02-23T19:13:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASAv only using the Management interface</title>
      <link>https://community.cisco.com/t5/network-security/asav-only-using-the-management-interface/m-p/4296313#M1078745</link>
      <description>&lt;P&gt;I'm just trying to get it to use the Outside interface rather than the management interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Gateway of last resort is 10.75.1.1 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;S* 0.0.0.0 0.0.0.0 [1/0] via 10.75.1.1, management&lt;BR /&gt;C 10.75.1.0 255.255.255.0 is directly connected, management&lt;BR /&gt;L 10.75.1.4 255.255.255.255 is directly connected, management&lt;BR /&gt;C 10.75.2.0 255.255.255.0 is directly connected, Outside&lt;BR /&gt;L 10.75.2.4 255.255.255.255 is directly connected, Outside&lt;BR /&gt;C 10.75.3.0 255.255.255.0 is directly connected, Inside&lt;BR /&gt;L 10.75.3.4 255.255.255.255 is directly connected, Inside&lt;/P&gt;</description>
      <pubDate>Tue, 23 Feb 2021 19:17:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-only-using-the-management-interface/m-p/4296313#M1078745</guid>
      <dc:creator>jf1134</dc:creator>
      <dc:date>2021-02-23T19:17:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASAv only using the Management interface</title>
      <link>https://community.cisco.com/t5/network-security/asav-only-using-the-management-interface/m-p/4296321#M1078747</link>
      <description>&lt;DIV id="bodyDisplay_3" class="lia-message-body lia-component-message-view-widget-body lia-component-body-signature-highlight-escalation lia-component-message-view-widget-body-signature-highlight-escalation"&gt;
&lt;DIV class="lia-message-body-content"&gt;I'm just trying to get it to use the Outside interface rather than the management interface&lt;/DIV&gt;
&lt;DIV class="lia-message-body-content"&gt;-- If you trying to use the outside interface as real outside for anyconnect/nat/internet you can do the same thing with managment with command no managment only.&lt;/DIV&gt;
&lt;DIV class="lia-message-body-content"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 23 Feb 2021 21:45:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-only-using-the-management-interface/m-p/4296321#M1078747</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2021-02-23T21:45:28Z</dc:date>
    </item>
    <item>
      <title>Re: ASAv only using the Management interface</title>
      <link>https://community.cisco.com/t5/network-security/asav-only-using-the-management-interface/m-p/4296361#M1078749</link>
      <description>&lt;P&gt;Not sure I get what you mean&lt;/P&gt;</description>
      <pubDate>Tue, 23 Feb 2021 20:01:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-only-using-the-management-interface/m-p/4296361#M1078749</guid>
      <dc:creator>jf1134</dc:creator>
      <dc:date>2021-02-23T20:01:41Z</dc:date>
    </item>
    <item>
      <title>Re: ASAv only using the Management interface</title>
      <link>https://community.cisco.com/t5/network-security/asav-only-using-the-management-interface/m-p/4296371#M1078750</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/914580"&gt;@jf1134&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In Azure, the first defined interface is always the Management interface. For edge firewall configurations,&lt;STRONG&gt; the Management interface is also used as the “outside” interface.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asav/quick-start-book/asav-98-qsg/asav-azure.html" target="_self"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asav/quick-start-book/asav-98-qsg/asav-azure.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So there should be no need to detine another outside interface, route oubound using the management interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Feb 2021 20:08:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-only-using-the-management-interface/m-p/4296371#M1078750</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-02-23T20:08:54Z</dc:date>
    </item>
    <item>
      <title>Re: ASAv only using the Management interface</title>
      <link>https://community.cisco.com/t5/network-security/asav-only-using-the-management-interface/m-p/4296387#M1078752</link>
      <description>&lt;P&gt;Thanks Rob. That kind of answers my question so there is really no need for an outside interface.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Feb 2021 20:21:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-only-using-the-management-interface/m-p/4296387#M1078752</guid>
      <dc:creator>jf1134</dc:creator>
      <dc:date>2021-02-23T20:21:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASAv only using the Management interface</title>
      <link>https://community.cisco.com/t5/network-security/asav-only-using-the-management-interface/m-p/5375733#M1124689</link>
      <description>&lt;P&gt;Hi Rob,&lt;BR /&gt;Based on the Cisco documentation there is a dedicated interface for outside, I am wondering if I can attach a static public IP address to an interface that called outside&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2026 16:54:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-only-using-the-management-interface/m-p/5375733#M1124689</guid>
      <dc:creator>SamoSam83</dc:creator>
      <dc:date>2026-03-10T16:54:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASAv only using the Management interface</title>
      <link>https://community.cisco.com/t5/network-security/asav-only-using-the-management-interface/m-p/5375740#M1124693</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1983092"&gt;@SamoSam83&lt;/a&gt;&amp;nbsp;yes, you can assign a public IP address to any interface and use that for "outside", the nameif doesn't need to be called outside.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2026 17:07:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-only-using-the-management-interface/m-p/5375740#M1124693</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2026-03-10T17:07:32Z</dc:date>
    </item>
  </channel>
</rss>

