<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Can't access management IP on Cisco ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/can-t-access-management-ip-on-cisco-asa/m-p/4862075#M1101977</link>
    <description>&lt;P&gt;From the diagram I can't see how the management interface is connected. When you configure a management interface on the ASA, that interface will not be passing traffic with the other interfaces, it will have its own routing table and you have to connect to it directly, not passing through other interfaces of the firewall. Try to connect that interface to the core switch and place it in the MGMT VLAN, that should work.&lt;/P&gt;</description>
    <pubDate>Sun, 25 Jun 2023 23:06:40 GMT</pubDate>
    <dc:creator>Aref Alsouqi</dc:creator>
    <dc:date>2023-06-25T23:06:40Z</dc:date>
    <item>
      <title>Can't access management IP on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-management-ip-on-cisco-asa/m-p/4862071#M1101974</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I can't ping my ASA's management ip 10.1.50.5 from inside network, only 10.0.28.1. I already added the management ip on the route. Please take a look at this topology and config to see where iam lacking. Thanks.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="asa.png" style="width: 428px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/188479i389A008A1CA24775/image-size/large?v=v2&amp;amp;px=999" role="button" title="asa.png" alt="asa.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA Version 9.12(2)&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password ***** pbkdf2&lt;BR /&gt;!&lt;BR /&gt;license smart&lt;BR /&gt;feature tier standard&lt;BR /&gt;throughput level 1G&lt;BR /&gt;names&lt;BR /&gt;no mac-address auto&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif OUTSIDE&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 172.18.200.167 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif INSIDE&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.0.28.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/6&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;management-only&lt;BR /&gt;nameif MGMT&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.1.50.5 255.255.255.128&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup OUTSIDE&lt;BR /&gt;dns server-group DNS&lt;BR /&gt;name-server 1.1.1.1&lt;BR /&gt;name-server 1.0.0.1&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 1.1.1.1&lt;BR /&gt;name-server 1.0.0.1&lt;BR /&gt;object network obj_any&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network outside&lt;BR /&gt;subnet 172.18.200.0 255.255.255.0&lt;BR /&gt;object network inside&lt;BR /&gt;subnet 10.0.28.0 255.255.255.0&lt;BR /&gt;object network LAN&lt;BR /&gt;subnet 192.168.0.0 255.255.0.0&lt;BR /&gt;object-group network OUTSIDE&lt;BR /&gt;network-object host 192.168.11.22&lt;BR /&gt;access-list OUT-TO-IN extended permit icmp any any&lt;BR /&gt;access-list OUT-TO-IN extended permit tcp any any&lt;BR /&gt;access-list OUT-TO-IN extended permit udp any any&lt;BR /&gt;pager lines 23&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu OUTSIDE 1500&lt;BR /&gt;mtu INSIDE 1500&lt;BR /&gt;mtu MGMT 1500&lt;BR /&gt;no failover&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 8192&lt;BR /&gt;!&lt;BR /&gt;nat (INSIDE,OUTSIDE) after-auto source dynamic any interface&lt;BR /&gt;access-group OUT-TO-IN in interface OUTSIDE&lt;BR /&gt;!&lt;BR /&gt;route-map PBR permit 5&lt;BR /&gt;set ip next-hop verify-availability 172.18.200.1 1 track 1&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;route-map PBR permit 50&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;route OUTSIDE 0.0.0.0 0.0.0.0 172.18.200.1 1&lt;BR /&gt;route INSIDE 192.168.10.0 255.255.255.0 10.0.28.2 1&lt;BR /&gt;route MGMT 192.168.10.0 255.255.255.0 10.1.50.6 1&lt;BR /&gt;route INSIDE 192.168.11.0 255.255.255.0 10.0.28.2 1&lt;BR /&gt;route INSIDE 192.168.50.0 255.255.255.0 10.0.28.2 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 OUTSIDE&lt;BR /&gt;snmp-server host INSIDE 192.168.50.21 community ***** version 2c&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps syslog&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;no validation-usage&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;auto-import&lt;BR /&gt;quit&lt;BR /&gt;!&lt;BR /&gt;track 1 rtr 1 reachability&lt;BR /&gt;telnet timeout 2&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 192.168.10.0 255.255.255.0 INSIDE&lt;BR /&gt;ssh 192.168.11.0 255.255.255.0 INSIDE&lt;BR /&gt;ssh 192.168.10.0 255.255.255.0 MGMT&lt;BR /&gt;ssh 192.168.11.0 255.255.255.0 MGMT&lt;BR /&gt;ssh timeout 2&lt;BR /&gt;ssh version 1 2&lt;BR /&gt;console timeout 2&lt;BR /&gt;console serial&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username admin password ***** pbkdf2 privilege 15&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;privilege show level 5 mode configure command filter&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Sun, 25 Jun 2023 22:30:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-management-ip-on-cisco-asa/m-p/4862071#M1101974</guid>
      <dc:creator>Mikee Hendricks</dc:creator>
      <dc:date>2023-06-25T22:30:00Z</dc:date>
    </item>
    <item>
      <title>Re: Can't access management IP on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-management-ip-on-cisco-asa/m-p/4862072#M1101975</link>
      <description>&lt;P&gt;If you try ping mgmt from host connect to inside' then by default asa will drop packet'&lt;/P&gt;
&lt;P&gt;The asa not allow ping from interface to other interface.&lt;/P&gt;
&lt;P&gt;You can ping only to INside interface if host connect to INside&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And for management you can add&lt;/P&gt;
&lt;P&gt;Telnet 0.0.0.0 0.0.0.0 INSIDE&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 25 Jun 2023 22:39:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-management-ip-on-cisco-asa/m-p/4862072#M1101975</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-25T22:39:30Z</dc:date>
    </item>
    <item>
      <title>Re: Can't access management IP on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-management-ip-on-cisco-asa/m-p/4862073#M1101976</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;Use the commamd&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;same-security-traffic permit inter-interface&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 25 Jun 2023 22:37:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-management-ip-on-cisco-asa/m-p/4862073#M1101976</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2023-06-25T22:37:03Z</dc:date>
    </item>
    <item>
      <title>Re: Can't access management IP on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-management-ip-on-cisco-asa/m-p/4862075#M1101977</link>
      <description>&lt;P&gt;From the diagram I can't see how the management interface is connected. When you configure a management interface on the ASA, that interface will not be passing traffic with the other interfaces, it will have its own routing table and you have to connect to it directly, not passing through other interfaces of the firewall. Try to connect that interface to the core switch and place it in the MGMT VLAN, that should work.&lt;/P&gt;</description>
      <pubDate>Sun, 25 Jun 2023 23:06:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-management-ip-on-cisco-asa/m-p/4862075#M1101977</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-06-25T23:06:40Z</dc:date>
    </item>
    <item>
      <title>Re: Can't access management IP on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-management-ip-on-cisco-asa/m-p/4862076#M1101978</link>
      <description>&lt;P&gt;I already tried the command but unfortunately it still won't work.&lt;/P&gt;</description>
      <pubDate>Sun, 25 Jun 2023 23:09:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-management-ip-on-cisco-asa/m-p/4862076#M1101978</guid>
      <dc:creator>Mikee Hendricks</dc:creator>
      <dc:date>2023-06-25T23:09:09Z</dc:date>
    </item>
    <item>
      <title>Re: Can't access management IP on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-management-ip-on-cisco-asa/m-p/4862092#M1101983</link>
      <description>&lt;P&gt;I already connect the mgmt on the core switch and it works! Thank you.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jun 2023 00:17:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-management-ip-on-cisco-asa/m-p/4862092#M1101983</guid>
      <dc:creator>Mikee Hendricks</dc:creator>
      <dc:date>2023-06-26T00:17:15Z</dc:date>
    </item>
    <item>
      <title>Re: Can't access management IP on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-management-ip-on-cisco-asa/m-p/4862096#M1101984</link>
      <description>&lt;P&gt;even if you ping OUTside from host connect to INside, the ping will failed (bot INside and OUTside in same routing table), this not relate to mgmt routing table, this default behave of ASA.&lt;BR /&gt;just want to notice you&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jun 2023 00:53:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-management-ip-on-cisco-asa/m-p/4862096#M1101984</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-26T00:53:38Z</dc:date>
    </item>
    <item>
      <title>Re: Can't access management IP on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-management-ip-on-cisco-asa/m-p/4862106#M1101985</link>
      <description>&lt;P&gt;Although that is true unless you configure access management over a VPN, but the scenario with the dedicated management interface is slightly different in the sense that the firewall dedicated management interface is never meant to be accessed through the firewall itself because it is actually segregated from the other interfaces hence it has its own routing table. Also if you try to connect to a host connected to the management interface through the firewall itself that wouldn't work for the same reason, the management interface traffic wouldn't be routed to the normal interfaces.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jun 2023 01:27:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-management-ip-on-cisco-asa/m-p/4862106#M1101985</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-06-26T01:27:12Z</dc:date>
    </item>
    <item>
      <title>Re: Can't access management IP on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-management-ip-on-cisco-asa/m-p/4862111#M1101986</link>
      <description>&lt;P&gt;Friend&amp;nbsp;&lt;BR /&gt;for example we have management interface and then we config one data interface with management only&lt;BR /&gt;here both interface will be in same routing table even so you can not&amp;nbsp; connect to management interface and try ping/telent to data interface.&lt;BR /&gt;this default behave of ASA, it not allow traffic enter from one interface and directed to ASA other interface.&lt;BR /&gt;the issue is not routing the issue is ASA security behave which drop the packet.&amp;nbsp;&lt;BR /&gt;that why I suggest to him if he connect his PC (get IP same as INside subnet) to INside then he can use INside as mgmt.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jun 2023 01:48:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-management-ip-on-cisco-asa/m-p/4862111#M1101986</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-26T01:48:34Z</dc:date>
    </item>
    <item>
      <title>Re: Can't access management IP on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-management-ip-on-cisco-asa/m-p/4862203#M1101990</link>
      <description>&lt;P&gt;Yes, we agree on this :). My point on the dedicated management interfaces is that usually we use them for OOB accesses, so from the design point of view we should have them connected to a switch potentially a separate switch to form OOB segment and potentially where we have yet an additional firewall to segregate the traffic to/from them. However, this won't be applicable to the normal data interfaces as you just can't terminate the traffic on them if you come from an opposite interface&amp;nbsp;due to that default behaviour on the firewalls. The difference between using a data interface for management and a dedicated interface for management lies into having logically a separate routing table to segregate the traffic between the global routing table traffic and the management routing table, it is the same exact concept as when you use an SVI to manage a switch and when you use a dedicated management interface, on the switches there is more flexibility though because you can create an additional VRF and place the SVI into it and set its default gateway to a security device for the traffic segregation.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jun 2023 08:22:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-management-ip-on-cisco-asa/m-p/4862203#M1101990</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-06-26T08:22:49Z</dc:date>
    </item>
  </channel>
</rss>

