<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Problem communication between two private network Cisco ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/problem-communication-between-two-private-network-cisco-asa/m-p/4553941#M1087510</link>
    <description>&lt;P&gt;&amp;nbsp;that OK, since the ping is from the Inside to DMZ and reply from DMZ to Inside, and if there is ACL apply to DMZ then need ACL to permit the return reply to Inside.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;access-list inbound permit icmp &lt;STRONG&gt;any any&lt;/STRONG&gt; echo-reply&lt;BR /&gt;!&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;access-list inbound permit icmp &lt;STRONG&gt;any any&lt;/STRONG&gt; time-exceeded&lt;BR /&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;access-list inbound permit icmp &lt;STRONG&gt;any any&lt;/STRONG&gt; unreachable&lt;BR /&gt;!&lt;BR /&gt;access-group inbound in interface &lt;STRONG&gt;DMZ&lt;/STRONG&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 16 Feb 2022 21:48:43 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2022-02-16T21:48:43Z</dc:date>
    <item>
      <title>Problem communication between two private network Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/problem-communication-between-two-private-network-cisco-asa/m-p/4552740#M1087448</link>
      <description>&lt;P&gt;hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have an ASA&amp;nbsp;&lt;/P&gt;&lt;P&gt;with 3 interfaces configured&lt;/P&gt;&lt;P&gt;INSIDE ( 10.40.1.0) on Gi/2&lt;BR /&gt;OUTSIDE ( 10.0.0.0) on Gi/1&lt;BR /&gt;BIO ( 10.0.2.0) on Gi/3&lt;/P&gt;&lt;P&gt;Interface 3 was added by me.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;I want INSIDE and BIO to communicate in FTP and ICMP in both directions.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The ASA already had an outside interface. Communication between INSIDE and OUTSIDE works (for FTP and ICMP).&lt;BR /&gt;I didn't originally install the ASA. OUTSIDE is connected to a router (202). It was installed by an outside contractor because in addition to the PC there is a medical analyzer.&lt;BR /&gt;The ASA was installed and configured by a colleague a few years ago.&lt;BR /&gt;I was asked to install a 3rd subnet (10.0.2.0) and to communicate, in FTP and ICMP (in both directions) between INSIDE and BIO (no need for OUTSIDE and BIO to communicate).&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I don't want to modify the already existing part between INSIDE and OUTSIDE, this one is in production and functional.&lt;/P&gt;&lt;P&gt;But the communications between INSIDE and BIO do not work.&lt;/P&gt;&lt;P&gt;For my test, Gi/3 (BIO) is connected directly to a computer with the following configuration:&lt;BR /&gt;10.0.2.10&lt;BR /&gt;255.255.255.0&lt;BR /&gt;10.0.2.254&lt;/P&gt;&lt;P&gt;The configuration :&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/1&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.0.1.254 255.255.255.0 standby 10.0.1.208&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.40.1.249 255.255.255.0 standby 10.40.1.208&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;nameif bio&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 10.0.2.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;description LAN/STATE Failover Interface&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;object network obj_any&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network DIPLABO&lt;BR /&gt;host 10.40.1.5&lt;BR /&gt;object network 10.0.0.201&lt;BR /&gt;host 10.0.0.201&lt;BR /&gt;object network 10.0.2.254&lt;BR /&gt;host 10.0.2.254&lt;BR /&gt;description Reseau BIO&lt;BR /&gt;object network 10.0.1.251&lt;BR /&gt;host 10.0.1.251&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt;service-object icmp&lt;BR /&gt;service-object tcp destination eq ftp&lt;BR /&gt;object-group service DM_INLINE_SERVICE_3&lt;BR /&gt;service-object icmp&lt;BR /&gt;service-object tcp destination eq ftp&lt;/P&gt;&lt;P&gt;access-list inside_access remark permission ftp diplabo vers automate&lt;BR /&gt;access-list inside_access extended permit tcp 10.40.1.0 255.255.255.0 10.0.0.0 255.255.255.0 eq ftp&lt;BR /&gt;access-list inside_access remark Permission ping diplabo vers automate&lt;BR /&gt;access-list inside_access extended permit icmp 10.40.1.0 255.255.255.0 10.0.0.0 255.255.255.0&lt;BR /&gt;access-list inside_access remark Permission ping DIPLABO vers automate + PC1 et PC2 TEMPO&lt;BR /&gt;access-list inside_access extended permit ip 10.40.1.0 255.255.255.0 10.0.2.0 255.255.255.0&lt;BR /&gt;access-list inside_access extended permit icmp 10.40.1.0 255.255.255.0 host 10.0.1.252&lt;BR /&gt;access-list inside_access extended permit icmp 10.40.1.0 255.255.255.0 10.0.1.0 255.255.255.0&lt;BR /&gt;access-list inside_access extended permit icmp 10.40.1.0 255.255.255.0 host 10.0.1.253&lt;BR /&gt;access-list inside_access extended permit object-group DM_INLINE_SERVICE_3 10.40.1.0 255.255.255.0 10.0.2.0 255.255.255.0&lt;BR /&gt;access-list inside_access remark permission ftp diplabo == automate&lt;BR /&gt;access-list inside_access remark Permission ping diplabo == automate&lt;BR /&gt;access-list outside_access_in remark permission ftp automate == diplabo&lt;BR /&gt;access-list outside_access_in extended permit tcp 10.0.0.0 255.255.255.0 10.40.1.0 255.255.255.0 eq ftp&lt;BR /&gt;access-list outside_access_in remark permission ping automate == diplabo&lt;BR /&gt;access-list outside_access_in extended permit icmp 10.0.0.0 255.255.255.0 10.40.1.0 255.255.255.0&lt;BR /&gt;access-list outside_access_in extended permit icmp 10.0.1.0 255.255.255.0 10.40.1.0 255.255.255.0&lt;BR /&gt;access-list outside_access_in extended permit icmp 10.0.0.0 255.255.255.0 host 10.0.1.254&lt;BR /&gt;access-list outside_access_in remark permission ftp automate vers diplabo&lt;BR /&gt;access-list outside_access_in remark permission&amp;nbsp; ping automate == diplabo&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip object DIPLABO any4&lt;BR /&gt;access-list bio_access_in remark Accès reseau Biomerieux en PING + FTP pour diplabo&lt;BR /&gt;access-list bio_access_in extended permit object-group DM_INLINE_SERVICE_1 10.0.2.0 255.255.255.0 10.0.0.0 255.255.255.0&lt;BR /&gt;access-list bio_access_in extended permit ip 10.0.2.0 255.255.255.0 10.40.1.0 255.255.255.0&lt;BR /&gt;....&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;nat (inside,any) source static DIPLABO DIPLABO no-proxy-arp&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;nat (any,outside) dynamic interface&lt;BR /&gt;!&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_access in interface inside&lt;BR /&gt;access-group bio_access_in in interface bio&lt;BR /&gt;route inside 0.0.0.0 0.0.0.0 10.40.1.254 1&lt;BR /&gt;route outside 10.0.0.1 255.255.255.255 10.0.0.201 1&lt;BR /&gt;route outside 10.0.0.10 255.255.255.255 10.0.1.252 1&lt;BR /&gt;route outside 10.0.1.5 255.255.255.255 10.0.1.251 1&lt;BR /&gt;route inside 10.39.1.0 255.255.255.0 10.40.1.254 1&lt;BR /&gt;route inside 10.239.11.0 255.255.255.0 10.40.1.254 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm not very familiar with that. Nate problem? Access List? Routing?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your help&lt;/P&gt;</description>
      <pubDate>Tue, 15 Feb 2022 14:05:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-communication-between-two-private-network-cisco-asa/m-p/4552740#M1087448</guid>
      <dc:creator>Beaurr</dc:creator>
      <dc:date>2022-02-15T14:05:05Z</dc:date>
    </item>
    <item>
      <title>Re: Problem communication between two private network Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/problem-communication-between-two-private-network-cisco-asa/m-p/4552758#M1087450</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/869996"&gt;@Beaurr&lt;/a&gt; you are going to need a NAT exemption rule between your DMZ and INSIDE network.&lt;/P&gt;
&lt;P&gt;Run packet-tracer from the CLI to simulate the traffic and provide the output for review.&lt;/P&gt;
&lt;P&gt;You should also look to add the standby IP address to GigabitEthernet1/3.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Feb 2022 14:18:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-communication-between-two-private-network-cisco-asa/m-p/4552758#M1087450</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-02-15T14:18:00Z</dc:date>
    </item>
    <item>
      <title>Re: Problem communication between two private network Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/problem-communication-between-two-private-network-cisco-asa/m-p/4552802#M1087455</link>
      <description>&lt;P&gt;&lt;STRONG&gt;packet-tracer input bio icmp 10.0.2.10 0 1 10.40.1.218&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 10.40.1.218 using egress ifc inside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group bio_access_in in interface bio&lt;BR /&gt;access-list bio_access_in extended permit ip 10.0.2.0 255.255.255.0 10.40.1.0 255.255.255.0&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 26530, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group bio_access_in in interface bio&lt;BR /&gt;access-list bio_access_in extended permit ip 10.0.2.0 255.255.255.0 10.40.1.0 255.255.255.0&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 10.40.1.218 using egress ifc inside&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: next-hop and adjacency&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;adjacency Active&lt;BR /&gt;next-hop mac address 0050.56b6.0b27 hits 0 reference 1&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: bio&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside icmp 10.40.1.218 0 1 10.0.2.10&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 10.0.2.10 using egress ifc bio&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside_access in interface inside&lt;BR /&gt;access-list inside_access remark Permission ping DIPLABO vers automate + PC1 et PC2 TEMPO&lt;BR /&gt;access-list inside_access extended permit ip 10.40.1.0 255.255.255.0 10.0.2.0 255.255.255.0&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 26574, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside_access in interface inside&lt;BR /&gt;access-list inside_access remark Permission ping DIPLABO vers automate + PC1 et PC2 TEMPO&lt;BR /&gt;access-list inside_access extended permit ip 10.40.1.0 255.255.255.0 10.0.2.0 255.255.255.0&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 10.0.2.10 using egress ifc bio&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: next-hop and adjacency&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;adjacency Active&lt;BR /&gt;next-hop mac address ecf4.bb21.ad98 hits 3 reference 1&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: bio&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For the standby, there is currently only one ASA available. The other is down.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;you are going to need a NAT exemption rule between your DMZ and INSIDE network.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you give me more details please?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Feb 2022 14:57:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-communication-between-two-private-network-cisco-asa/m-p/4552802#M1087455</guid>
      <dc:creator>Beaurr</dc:creator>
      <dc:date>2022-02-15T14:57:07Z</dc:date>
    </item>
    <item>
      <title>Re: Problem communication between two private network Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/problem-communication-between-two-private-network-cisco-asa/m-p/4552818#M1087457</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have come up with the below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network inside_10_40_1_0&lt;BR /&gt;subnet 10.40.1.0 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;object network bio_10_0_2_0&lt;BR /&gt;subnet 10.0.2.0 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;access-list DMZ_ACL extended permit icmp object bio_10_0_2_0 inside_10_40_1_0&lt;BR /&gt;access-list DMZ_ACL extended permit tcp object bio_10_0_2_0 inside_10_40_1_0 eq ftp&lt;BR /&gt;!&lt;BR /&gt;access-group DMZ_ACL in interface bio&lt;BR /&gt;!&lt;BR /&gt;nat (bio,inside) source static object bio_10_0_2_0 object bio_10_0_2_0 destination static inside_10_40_1_0 inside_10_40_1_0 no-proxy-arp route-lookup&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Feb 2022 15:14:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-communication-between-two-private-network-cisco-asa/m-p/4552818#M1087457</guid>
      <dc:creator>Georg Pauwen</dc:creator>
      <dc:date>2022-02-15T15:14:02Z</dc:date>
    </item>
    <item>
      <title>Re: Problem communication between two private network Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/problem-communication-between-two-private-network-cisco-asa/m-p/4552940#M1087462</link>
      <description>&lt;P&gt;Your packet tracer command is wrong,&lt;/P&gt;&lt;P&gt;You select the interface as input then you must config source ip and finally desntaiotn ip.&lt;/P&gt;&lt;P&gt;You config firdt destination ip then source ip.&lt;/P&gt;&lt;P&gt;Please do it right again and share the output.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Feb 2022 17:39:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-communication-between-two-private-network-cisco-asa/m-p/4552940#M1087462</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-02-15T17:39:59Z</dc:date>
    </item>
    <item>
      <title>Re: Problem communication between two private network Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/problem-communication-between-two-private-network-cisco-asa/m-p/4553061#M1087465</link>
      <description>&lt;P&gt;My knowledge is very limited on firewalling.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you give me the command line?&lt;/P&gt;</description>
      <pubDate>Tue, 15 Feb 2022 20:17:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-communication-between-two-private-network-cisco-asa/m-p/4553061#M1087465</guid>
      <dc:creator>Beaurr</dc:creator>
      <dc:date>2022-02-15T20:17:17Z</dc:date>
    </item>
    <item>
      <title>Re: Problem communication between two private network Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/problem-communication-between-two-private-network-cisco-asa/m-p/4553461#M1087482</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network bio-network&lt;BR /&gt;subnet 10.0.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network inside-network&lt;BR /&gt;subnet 10.40.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list DMZ_ACL extended permit icmp object bio-network object inside-network&lt;/P&gt;&lt;P&gt;access-list DMZ_ACL extended permit tcp object bio-network object inside-network eq ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-group DMZ_ACL in interface bio&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (bio,inside) &lt;STRONG&gt;after-auto&lt;/STRONG&gt; source static bio-network bio-network destination static inside-network inside-network no-proxy-arp route-lookup&amp;nbsp; &amp;nbsp;(I generated the line via asdm,&amp;nbsp;it added after auto).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;unfortunately, it doesn't work. I launched a continuous PING from the pc 10.02.10 towards a pc in 10.40.1..&lt;/P&gt;&lt;P&gt;And, a continuous PING from a pc in 10.40.1.x to 10.0.2.10 and it does not work&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Feb 2022 11:33:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-communication-between-two-private-network-cisco-asa/m-p/4553461#M1087482</guid>
      <dc:creator>Beaurr</dc:creator>
      <dc:date>2022-02-16T11:33:11Z</dc:date>
    </item>
    <item>
      <title>Re: Problem communication between two private network Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/problem-communication-between-two-private-network-cisco-asa/m-p/4553557#M1087492</link>
      <description>&lt;P&gt;first you must config the ICMP inspection,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;*&lt;STRONG&gt;policy-map global_policy&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN class=""&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;class inspection_default&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;SPAN class=""&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;inspect icmp&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;no need for ACL since the traffic initiate from High&amp;nbsp;Security level "Inside" to low&amp;nbsp;security level "DMZ"&lt;BR /&gt;Need NAT "without after-auto" since some ASA version do NAT for each traffic enter the Interface.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;then try again ping.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Feb 2022 13:45:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-communication-between-two-private-network-cisco-asa/m-p/4553557#M1087492</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-02-16T13:45:16Z</dc:date>
    </item>
    <item>
      <title>Re: Problem communication between two private network Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/problem-communication-between-two-private-network-cisco-asa/m-p/4553667#M1087503</link>
      <description>&lt;P&gt;Hello, thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have already this configuration :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;policy-map global_policy&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;class inspection_default&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect dns preset_dns_map&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect ftp&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect h323 h225&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect h323 ras&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect rsh&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect rtsp&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect esmtp&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect sqlnet&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect skinny&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect sunrpc&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect xdmcp&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect sip&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect netbios&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect tftp&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect ip-options&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect icmp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Security level is 100 for INSIDE&lt;/P&gt;&lt;P&gt;50 for DMZ(BIO)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need it to work both ways&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I regenerated the NAT rule&lt;/P&gt;&lt;P&gt;nat (bio,inside) source static bio-network bio-network destination static inside-network inside-network no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If i check the NAT rules in ASDM, I see the direction at both&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;AND...no ping from INSIDE to OUTSIDE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Feb 2022 15:43:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-communication-between-two-private-network-cisco-asa/m-p/4553667#M1087503</guid>
      <dc:creator>Beaurr</dc:creator>
      <dc:date>2022-02-16T15:43:29Z</dc:date>
    </item>
    <item>
      <title>Re: Problem communication between two private network Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/problem-communication-between-two-private-network-cisco-asa/m-p/4553941#M1087510</link>
      <description>&lt;P&gt;&amp;nbsp;that OK, since the ping is from the Inside to DMZ and reply from DMZ to Inside, and if there is ACL apply to DMZ then need ACL to permit the return reply to Inside.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;access-list inbound permit icmp &lt;STRONG&gt;any any&lt;/STRONG&gt; echo-reply&lt;BR /&gt;!&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;access-list inbound permit icmp &lt;STRONG&gt;any any&lt;/STRONG&gt; time-exceeded&lt;BR /&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;access-list inbound permit icmp &lt;STRONG&gt;any any&lt;/STRONG&gt; unreachable&lt;BR /&gt;!&lt;BR /&gt;access-group inbound in interface &lt;STRONG&gt;DMZ&lt;/STRONG&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Feb 2022 21:48:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-communication-between-two-private-network-cisco-asa/m-p/4553941#M1087510</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-02-16T21:48:43Z</dc:date>
    </item>
  </channel>
</rss>

