<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ASA: transparent mode / bridge group / DHCP traffic blocked in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-transparent-mode-bridge-group-dhcp-traffic-blocked/m-p/4490585#M1084562</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am stuck trying to get the following setup to work on an ASA5506 running in transparent mode.&lt;/P&gt;&lt;P&gt;We use this setup to filter some traffic between our device and the corporate network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We use the ASA5506 (running firmware 9.14) in the following setup:&lt;/P&gt;&lt;P&gt;- Port 1: outside zone (Corporate network)&lt;/P&gt;&lt;P&gt;- Port 2: inside zone&lt;/P&gt;&lt;P&gt;- Port 3: inside2 zone&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Goal:&lt;/P&gt;&lt;P&gt;- We want to apply some simple filtering rules to the traffic that comes into and goes out of the outside zone.&lt;/P&gt;&lt;P&gt;- Devices connected to port 2 and 3 can communicate without any restriction (no rules)&lt;/P&gt;&lt;P&gt;- The DHCP server is located on the outside zone so DHCP should be allowed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Problem:&lt;/STRONG&gt; The firewall however not allow the DHCP traffic to pass from port 1 to port 2 and 3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The logging shows:&lt;/P&gt;&lt;P&gt;Oct 22 2021 13:13:35: %ASA-7-710005: UDP request discarded from 0.0.0.0/68 to inside:255.255.255.255/67&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Questions:&lt;/P&gt;&lt;P&gt;1. Why is the DHCP traffic blocked?&lt;/P&gt;&lt;P&gt;2. Can I have 3 ports that are part of the same BVI or is there another way to get the required functionality?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regard,&lt;/P&gt;&lt;P&gt;T&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is part of the configuration:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;firewall transparent&lt;BR /&gt;&lt;BR /&gt;interface BVI1
 ip address 192.168.0.1 255.255.255.0
 ipv6 enable

interface GigabitEthernet1/1&lt;BR /&gt;nameif outside&lt;BR /&gt;bridge-group 1&lt;BR /&gt;security-level 0&lt;BR /&gt;no shutdown&lt;BR /&gt;! &lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;nameif inside&lt;BR /&gt;bridge-group 1&lt;BR /&gt;security-level 100&lt;BR /&gt;no shutdown&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;nameif inside2&lt;BR /&gt;bridge-group 1&lt;BR /&gt;security-level 100&lt;BR /&gt;no shutdown&lt;BR /&gt;&lt;BR /&gt;....&lt;BR /&gt;....&lt;BR /&gt;clear configure access-list&lt;BR /&gt;!&lt;BR /&gt;access-list outside_access_in extended permit ip any any log disable &lt;BR /&gt;access-list outside_access_in extended permit object-group SERVICES_ICMPV4 any any log disable &lt;BR /&gt;access-list outside_access_in extended permit object-group SERVICES_ICMPV6 any any log disable &lt;BR /&gt;!&lt;BR /&gt;!==============================================================================&lt;BR /&gt;! Access List Configuration: inside to outside&lt;BR /&gt;!==============================================================================&lt;BR /&gt;access-list inside_access_out extended permit ip any any log disable &lt;BR /&gt;access-list inside_access_out extended permit object-group SERVICES_ICMPV4 any any log disable &lt;BR /&gt;access-list inside_access_out extended permit object-group SERVICES_ICMPV6 any any log disable &lt;BR /&gt;!&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_access_out out interface outside&lt;BR /&gt;same-security-traffic permit inter-interface &lt;BR /&gt;&lt;BR /&gt;arp permit-nonconnected&lt;/PRE&gt;</description>
    <pubDate>Fri, 22 Oct 2021 12:30:30 GMT</pubDate>
    <dc:creator>tom.fransen</dc:creator>
    <dc:date>2021-10-22T12:30:30Z</dc:date>
    <item>
      <title>Cisco ASA: transparent mode / bridge group / DHCP traffic blocked</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-transparent-mode-bridge-group-dhcp-traffic-blocked/m-p/4490585#M1084562</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am stuck trying to get the following setup to work on an ASA5506 running in transparent mode.&lt;/P&gt;&lt;P&gt;We use this setup to filter some traffic between our device and the corporate network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We use the ASA5506 (running firmware 9.14) in the following setup:&lt;/P&gt;&lt;P&gt;- Port 1: outside zone (Corporate network)&lt;/P&gt;&lt;P&gt;- Port 2: inside zone&lt;/P&gt;&lt;P&gt;- Port 3: inside2 zone&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Goal:&lt;/P&gt;&lt;P&gt;- We want to apply some simple filtering rules to the traffic that comes into and goes out of the outside zone.&lt;/P&gt;&lt;P&gt;- Devices connected to port 2 and 3 can communicate without any restriction (no rules)&lt;/P&gt;&lt;P&gt;- The DHCP server is located on the outside zone so DHCP should be allowed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Problem:&lt;/STRONG&gt; The firewall however not allow the DHCP traffic to pass from port 1 to port 2 and 3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The logging shows:&lt;/P&gt;&lt;P&gt;Oct 22 2021 13:13:35: %ASA-7-710005: UDP request discarded from 0.0.0.0/68 to inside:255.255.255.255/67&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Questions:&lt;/P&gt;&lt;P&gt;1. Why is the DHCP traffic blocked?&lt;/P&gt;&lt;P&gt;2. Can I have 3 ports that are part of the same BVI or is there another way to get the required functionality?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regard,&lt;/P&gt;&lt;P&gt;T&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is part of the configuration:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;firewall transparent&lt;BR /&gt;&lt;BR /&gt;interface BVI1
 ip address 192.168.0.1 255.255.255.0
 ipv6 enable

interface GigabitEthernet1/1&lt;BR /&gt;nameif outside&lt;BR /&gt;bridge-group 1&lt;BR /&gt;security-level 0&lt;BR /&gt;no shutdown&lt;BR /&gt;! &lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;nameif inside&lt;BR /&gt;bridge-group 1&lt;BR /&gt;security-level 100&lt;BR /&gt;no shutdown&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;nameif inside2&lt;BR /&gt;bridge-group 1&lt;BR /&gt;security-level 100&lt;BR /&gt;no shutdown&lt;BR /&gt;&lt;BR /&gt;....&lt;BR /&gt;....&lt;BR /&gt;clear configure access-list&lt;BR /&gt;!&lt;BR /&gt;access-list outside_access_in extended permit ip any any log disable &lt;BR /&gt;access-list outside_access_in extended permit object-group SERVICES_ICMPV4 any any log disable &lt;BR /&gt;access-list outside_access_in extended permit object-group SERVICES_ICMPV6 any any log disable &lt;BR /&gt;!&lt;BR /&gt;!==============================================================================&lt;BR /&gt;! Access List Configuration: inside to outside&lt;BR /&gt;!==============================================================================&lt;BR /&gt;access-list inside_access_out extended permit ip any any log disable &lt;BR /&gt;access-list inside_access_out extended permit object-group SERVICES_ICMPV4 any any log disable &lt;BR /&gt;access-list inside_access_out extended permit object-group SERVICES_ICMPV6 any any log disable &lt;BR /&gt;!&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_access_out out interface outside&lt;BR /&gt;same-security-traffic permit inter-interface &lt;BR /&gt;&lt;BR /&gt;arp permit-nonconnected&lt;/PRE&gt;</description>
      <pubDate>Fri, 22 Oct 2021 12:30:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-transparent-mode-bridge-group-dhcp-traffic-blocked/m-p/4490585#M1084562</guid>
      <dc:creator>tom.fransen</dc:creator>
      <dc:date>2021-10-22T12:30:30Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA: transparent mode / bridge group / DHCP traffic blocked</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-transparent-mode-bridge-group-dhcp-traffic-blocked/m-p/4490805#M1084568</link>
      <description>&lt;P&gt;where is the DHCP Server - add below rule and test it&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list XXXXXXXXXXXX extended permit udp host 0.0.0.0 eq bootpc host 255.255.255.255 eq bootps&amp;nbsp; (XXXXX&amp;nbsp; direction in or out)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Oct 2021 16:27:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-transparent-mode-bridge-group-dhcp-traffic-blocked/m-p/4490805#M1084568</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-10-22T16:27:20Z</dc:date>
    </item>
  </channel>
</rss>

