<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Access Cisco ASA via ASDM from remote via different Interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5014799#M1108905</link>
    <description>&lt;P&gt;It is actually not a new interface and it was already existing on ASA1.&lt;BR /&gt;GigabitEthernet0/4.2 was already part of the the VPN tunnel between ASA2 &amp;lt;&amp;gt; ASA3.&lt;/P&gt;&lt;P&gt;I have exactly tried this before with GigabitEthernet0/3 management01 (it is also part of the tunnel on both ends) on ASA1 but no luck:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;"if we connect to ASA3 and try to access ASA1 interfaceX&lt;BR /&gt;you need to add interfaceX to Tunnel of ASA2&lt;/P&gt;&lt;P&gt;also we need managment-access interfaceX (remove the management-only under the interfaceX)&lt;/P&gt;&lt;P&gt;then we need to add&lt;BR /&gt;http &amp;lt;subnet&amp;gt; interfaceX"&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Or is there a difference because GigabitEthernet0/3 is hardware and GigabitEthernet0/4.2 a subinterface?&lt;/P&gt;</description>
    <pubDate>Thu, 08 Feb 2024 12:45:43 GMT</pubDate>
    <dc:creator>jensscheuvens</dc:creator>
    <dc:date>2024-02-08T12:45:43Z</dc:date>
    <item>
      <title>Access Cisco ASA via ASDM from remote via different Interface</title>
      <link>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5013517#M1108822</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;we would like to access ASA1`s management01 Interface IP (192.168.4.1) from a host behind ASA4´s Interface GigabitEthernet0/1.1 via ASDM.&lt;BR /&gt;The flow is&amp;nbsp; SRC: 10.10.10.5 DST: 192.168.4.1 Port: 443 &amp;amp; 22 (ASA4 &amp;gt; ASA3 &amp;gt; ASA2 &amp;gt; ASA1)&lt;BR /&gt;&lt;BR /&gt;On ASA1 in the packet tracer I can see "no route to host" and in the log file "failed to locate egress interface".&lt;BR /&gt;We are able to access other hosts behind GigabitEthernet0/3 on ASA1 from hosts behind ASA4´s Interface GigabitEthernet0/1.1 just fine.&lt;BR /&gt;&lt;BR /&gt;We have tried the following to make it work on ASA1:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;specifiy "management-access management01"&lt;BR /&gt;configure SRC host from ASA4 to be allowed to access ASA1 via ASDM &amp;amp; SSH:&lt;/P&gt;&lt;P&gt;http 10.10.10.5 255.255.255.255 transfer-vpn&lt;BR /&gt;ssh 10.10.10.5 255.255.255.255 transfer-vpn&lt;BR /&gt;&lt;BR /&gt;create NAT excemption rule&lt;BR /&gt;nat (transfer-vpn, management01) 7 source static 10.10.10.5 10.10.10.5 destination static 192.168.4.1 192.168.4.1 no-proxy-arp&lt;/P&gt;&lt;P&gt;also tried the other way around:&lt;/P&gt;&lt;P&gt;nat (management01, transfer-vpn) 7 source static 192.168.4.1 192.168.4.1 destination static 10.10.10.5 10.10.10.5 no-proxy-arp&lt;/P&gt;&lt;P&gt;create NAT excemption rule with "lookup route table to locate egress interface" enabled&lt;BR /&gt;&lt;BR /&gt;ASAs 5545 is running 9.12(4)54&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Do we miss something here or is this scenario even not possible?&lt;/P&gt;&lt;P&gt;ASA1:&lt;BR /&gt;GigabitEthernet0/2&lt;BR /&gt;nameif transfer-vpn&lt;BR /&gt;security-level 10&lt;BR /&gt;ip address 194.1.1.1 255.255.255.240&lt;/P&gt;&lt;P&gt;GigabitEthernet0/3&lt;BR /&gt;nameif management01&lt;BR /&gt;security level 100&lt;BR /&gt;ip address 192.168.4.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;lt;Transfer Network between ASA1 and ASA2&amp;gt;&lt;/P&gt;&lt;P&gt;ASA2:&lt;BR /&gt;GigabitEthernet0/2&lt;BR /&gt;nameif transfer-vpn&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 194.1.1.5 255.255.255.240&lt;/P&gt;&lt;P&gt;&amp;lt;VPN ASA2 to ASA3&amp;gt;&lt;/P&gt;&lt;P&gt;ASA3:&lt;BR /&gt;GigabitEthernet0/0&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 193.1.1.1 255.255.255.240&lt;/P&gt;&lt;P&gt;&amp;lt;Transfer Network between ASA3 and ASA4&amp;gt;&lt;/P&gt;&lt;P&gt;ASA4:&lt;/P&gt;&lt;P&gt;GigabitEthernet0/0&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 193.1.1.5 255.255.255.240&lt;/P&gt;&lt;P&gt;GigabitEthernet0/1.1&lt;BR /&gt;vlan 10&lt;BR /&gt;nameif hosts&lt;BR /&gt;security level 66&lt;BR /&gt;ip address 10.10.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;The IPs are of course not our real used.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 06 Feb 2024 12:19:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5013517#M1108822</guid>
      <dc:creator>jensscheuvens</dc:creator>
      <dc:date>2024-02-06T12:19:07Z</dc:date>
    </item>
    <item>
      <title>Re: Access Cisco ASA via ASDM from remote via different Interface</title>
      <link>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5014134#M1108854</link>
      <description>&lt;P&gt;The asa mgmt routing plane is separate than data routing plane&lt;/P&gt;
&lt;P&gt;You need to make mgmt acces via data interface this done by access-management command&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2024 13:08:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5014134#M1108854</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-07T13:08:40Z</dc:date>
    </item>
    <item>
      <title>Re: Access Cisco ASA via ASDM from remote via different Interface</title>
      <link>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5014276#M1108866</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks for your reply.&amp;nbsp;&lt;/P&gt;&lt;P&gt;"&lt;SPAN&gt;management-access management01&lt;/SPAN&gt;" was already set before but it did not solve the problem.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2024 15:30:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5014276#M1108866</guid>
      <dc:creator>jensscheuvens</dc:creator>
      <dc:date>2024-02-07T15:30:28Z</dc:date>
    </item>
    <item>
      <title>Re: Access Cisco ASA via ASDM from remote via different Interface</title>
      <link>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5014280#M1108867</link>
      <description>&lt;P&gt;Management-access &amp;lt;data interface through which you can access asa&amp;gt;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2024 15:38:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5014280#M1108867</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-07T15:38:27Z</dc:date>
    </item>
    <item>
      <title>Re: Access Cisco ASA via ASDM from remote via different Interface</title>
      <link>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5014289#M1108870</link>
      <description>&lt;P&gt;Traffic is first hitting ASA1 via&amp;nbsp;&lt;SPAN&gt;GigabitEthernet0/2&amp;nbsp;transfer-vpn but I would like to access ASA1 via&amp;nbsp;GigabitEthernet0/3 management01.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So command should be&amp;nbsp;"management-access transfer-vpn" ?&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Will this do any harm or break some traffic?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2024 15:54:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5014289#M1108870</guid>
      <dc:creator>jensscheuvens</dc:creator>
      <dc:date>2024-02-07T15:54:20Z</dc:date>
    </item>
    <item>
      <title>Re: Access Cisco ASA via ASDM from remote via different Interface</title>
      <link>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5014291#M1108871</link>
      <description>&lt;P&gt;Yes you need&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;management-access transfer-vpn&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;And if this command is harmful' NO it suggest by cisco.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Read more about command before apply to be more comfortable.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2024 15:56:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5014291#M1108871</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-07T15:56:46Z</dc:date>
    </item>
    <item>
      <title>Re: Access Cisco ASA via ASDM from remote via different Interface</title>
      <link>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5014639#M1108896</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have changed this to "&lt;SPAN&gt;management-access transfer-vpn&lt;/SPAN&gt;" but it still do not work.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Packet tracer still showing "no route to host" and in the logs I can see "failed to locate egress interface"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Feb 2024 07:19:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5014639#M1108896</guid>
      <dc:creator>jensscheuvens</dc:creator>
      <dc:date>2024-02-08T07:19:07Z</dc:date>
    </item>
    <item>
      <title>Re: Access Cisco ASA via ASDM from remote via different Interface</title>
      <link>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5014729#M1108900</link>
      <description>&lt;P&gt;Note the VPN traffic is terminating on ASA2 and not ASA1.&lt;/P&gt;&lt;P&gt;I have also tried the following:&lt;/P&gt;&lt;P&gt;On ASA1 there is a subinterface (which was not used) which I have configured with the "management only" command.&lt;/P&gt;&lt;P&gt;ASA1:&lt;BR /&gt;GigabitEthernet0/4.2&lt;BR /&gt;management-only&lt;BR /&gt;vlan 40&lt;BR /&gt;nameif test_log&lt;BR /&gt;security level 90&lt;BR /&gt;ip address 10.3.50.254 255.255.255.0&lt;/P&gt;&lt;P&gt;If trying now to access 10.3.50.254 via ASDM via transfer-vpn at least in the log I am not promted with the "failed to locate egress interface" but traffic timeouts because it seems not beeing forwared to test_log:&lt;BR /&gt;Teardown TCP connection for transfer-vpn:10.10.10.5/57230 to transfer-vpn:10.3.50.254/443 duration 0:00:30 bytes 0 SYN Timeout&lt;/P&gt;</description>
      <pubDate>Thu, 08 Feb 2024 10:15:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5014729#M1108900</guid>
      <dc:creator>jensscheuvens</dc:creator>
      <dc:date>2024-02-08T10:15:39Z</dc:date>
    </item>
    <item>
      <title>Re: Access Cisco ASA via ASDM from remote via different Interface</title>
      <link>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5014736#M1108901</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;interfaceX : this is new subinterface you add in ASA1&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;ASA1(&lt;FONT color="#FF0000"&gt;interfaceX&lt;/FONT&gt;)&lt;/STRONG&gt;-&lt;STRONG&gt;ASA2&lt;/STRONG&gt;-&lt;FONT color="#00FF00"&gt;&lt;STRONG&gt;Tunnel IPSec S2S VPN&lt;/STRONG&gt;&lt;/FONT&gt;-&lt;STRONG&gt;ASA3&lt;/STRONG&gt;&lt;BR /&gt;if we connect to ASA3 and try to access ASA1&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt; interfaceX&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;you need to add &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;interfaceX&amp;nbsp;&lt;/STRONG&gt;&lt;FONT color="#000000"&gt; to Tunnel of &lt;STRONG&gt;ASA2&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;FONT color="#000000"&gt;also we need&lt;/FONT&gt;&lt;STRONG style="color: #000000;"&gt; managment-access &lt;/STRONG&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG style="color: #000000;"&gt;&lt;FONT color="#FF0000"&gt;interfaceX&lt;/FONT&gt; (remove the &lt;/STRONG&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;management&lt;/STRONG&gt;&lt;/FONT&gt;&lt;STRONG style="color: #000000;"&gt;-only under the &lt;FONT color="#FF0000"&gt;interfaceX&lt;/FONT&gt;)&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;FONT color="#FF0000"&gt;&lt;FONT color="#000000"&gt;then we need to add&amp;nbsp;&lt;/FONT&gt;&lt;BR /&gt;&lt;STRONG style="color: #000000;"&gt;http &amp;lt;subnet&amp;gt;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;interfaceX&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Feb 2024 10:29:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5014736#M1108901</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-08T10:29:56Z</dc:date>
    </item>
    <item>
      <title>Re: Access Cisco ASA via ASDM from remote via different Interface</title>
      <link>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5014799#M1108905</link>
      <description>&lt;P&gt;It is actually not a new interface and it was already existing on ASA1.&lt;BR /&gt;GigabitEthernet0/4.2 was already part of the the VPN tunnel between ASA2 &amp;lt;&amp;gt; ASA3.&lt;/P&gt;&lt;P&gt;I have exactly tried this before with GigabitEthernet0/3 management01 (it is also part of the tunnel on both ends) on ASA1 but no luck:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;"if we connect to ASA3 and try to access ASA1 interfaceX&lt;BR /&gt;you need to add interfaceX to Tunnel of ASA2&lt;/P&gt;&lt;P&gt;also we need managment-access interfaceX (remove the management-only under the interfaceX)&lt;/P&gt;&lt;P&gt;then we need to add&lt;BR /&gt;http &amp;lt;subnet&amp;gt; interfaceX"&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Or is there a difference because GigabitEthernet0/3 is hardware and GigabitEthernet0/4.2 a subinterface?&lt;/P&gt;</description>
      <pubDate>Thu, 08 Feb 2024 12:45:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5014799#M1108905</guid>
      <dc:creator>jensscheuvens</dc:creator>
      <dc:date>2024-02-08T12:45:43Z</dc:date>
    </item>
    <item>
      <title>Re: Access Cisco ASA via ASDM from remote via different Interface</title>
      <link>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5015296#M1108931</link>
      <description>&lt;P&gt;&lt;SPAN&gt;there are two concept here&amp;nbsp;&lt;BR /&gt;1- &lt;STRONG&gt;management&lt;/STRONG&gt;-&lt;STRONG&gt;access&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;below form cisco doc.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;If your VPN tunnel terminates on one interface, but you want to manage the ASA by accessing a different interface, you can identify that interface as a management-access interface. For example, if you enter the ASA from the outside interface, this feature lets you connect to the inside interface using ASDM, SSH, Telnet, or SNMP; or you can ping the inside interface when entering from the outside interface. Management access is available via the following VPN tunnel types: IPsec clients, IPsec site-to-site, and the AnyConnect SSL VPN client.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;2- &lt;STRONG&gt;management&lt;/STRONG&gt;-&lt;STRONG&gt;only&lt;/STRONG&gt;&amp;nbsp;&lt;BR /&gt;this use to turn the data interface into mgmt interface (i.e. add it to mgmt plane)&lt;BR /&gt;&lt;BR /&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2024 06:05:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5015296#M1108931</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-09T06:05:30Z</dc:date>
    </item>
    <item>
      <title>Re: Access Cisco ASA via ASDM from remote via different Interface</title>
      <link>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5015329#M1108936</link>
      <description>&lt;P&gt;ok thanks. If I understood correctly then in our case option&amp;nbsp;&lt;SPAN&gt;1-&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;management&lt;/STRONG&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;STRONG&gt;access&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;will not work since VPN traffic is terminating on ASA2. But we would like to access other interface on ASA1 (&lt;SPAN&gt;GigabitEthernet0/3&lt;/SPAN&gt;). So there should be no VPN traffic accessing ASA1 on&amp;nbsp;&lt;SPAN&gt;GigabitEthernet0/2.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;For the option&amp;nbsp;&lt;SPAN&gt;2-&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;management&lt;/STRONG&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;STRONG&gt;only&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp; I have tried that with a different inside interface on ASA1&amp;nbsp;GigabitEthernet0/4.2 but I am also not able to access the ASA via that.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Traffic seems not to be forwarded to&amp;nbsp;GigabitEthernet0/4.2 but instead going back directly via&amp;nbsp;GigabitEthernet0/2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2024 07:39:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5015329#M1108936</guid>
      <dc:creator>jensscheuvens</dc:creator>
      <dc:date>2024-02-09T07:39:16Z</dc:date>
    </item>
    <item>
      <title>Re: Access Cisco ASA via ASDM from remote via different Interface</title>
      <link>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5015346#M1108938</link>
      <description>&lt;P&gt;show route&amp;nbsp;&lt;BR /&gt;then&amp;nbsp;&lt;BR /&gt;show route management-only&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;check if the mgmt plane use different egress interface for return traffic&amp;nbsp;&lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2024 08:09:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5015346#M1108938</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-09T08:09:47Z</dc:date>
    </item>
    <item>
      <title>Re: Access Cisco ASA via ASDM from remote via different Interface</title>
      <link>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5015360#M1108939</link>
      <description>&lt;P&gt;Result of the command: "show route | inc 10.3.50.0"&lt;/P&gt;&lt;P&gt;The command has been sent to the device&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;######################################################################################&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Result of the command: "show route management-only"&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Routing Table: mgmt-only&lt;BR /&gt;Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;BR /&gt;D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;BR /&gt;N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;BR /&gt;E1 - OSPF external type 1, E2 - OSPF external type 2, V - VPN&lt;BR /&gt;i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;BR /&gt;ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;BR /&gt;o - ODR, P - periodic downloaded static route, + - replicated route&lt;BR /&gt;Gateway of last resort is not set&lt;/P&gt;&lt;P&gt;C 10.3.50.0 255.255.255.0 is directly connected, test_log&lt;BR /&gt;L 10.3.50.254 255.255.255.255 is directly connected, test_log&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Interface should be correct. Instead of passing from transfer-vpn to test_log in the logs it shows traffic directly returned back to transfer-vpn:&lt;/P&gt;&lt;P&gt;Teardown TCP connection for transfer-vpn:10.10.10.5/57230 to transfer-vpn:10.3.50.254/443 duration 0:00:30 bytes 0 SYN Timeout&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2024 08:29:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5015360#M1108939</guid>
      <dc:creator>jensscheuvens</dc:creator>
      <dc:date>2024-02-09T08:29:52Z</dc:date>
    </item>
    <item>
      <title>Re: Access Cisco ASA via ASDM from remote via different Interface</title>
      <link>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5015399#M1108944</link>
      <description>&lt;P&gt;to make it clear for both I make this topology&amp;nbsp;&lt;BR /&gt;please check it and write note if there is&amp;nbsp;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (689).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/209946iD49CEEBEAB6320BE/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (689).png" alt="Screenshot (689).png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2024 09:30:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5015399#M1108944</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-09T09:30:53Z</dc:date>
    </item>
    <item>
      <title>Re: Access Cisco ASA via ASDM from remote via different Interface</title>
      <link>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5015510#M1108951</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;thanks for all your effort &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;As a workaround we did now the following:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;- created a NAT on ASA4 so that traffic to 192.168.4.1 will be translated to public IP&lt;BR /&gt;- permit ASDM/SSH traffic for IP on ASA1&lt;/P&gt;&lt;P&gt;With that traffic flow is no longer via ASA4 &amp;lt;transfer net&amp;gt; ASA3 &amp;lt;VPN&amp;gt; ASA2 &amp;lt;transfer net&amp;gt; ASA1.&lt;BR /&gt;Now we are able to access ASA1 via 192.168.4.1 via ASDM and SSH from internal hosts behind ASA4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2024 13:21:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5015510#M1108951</guid>
      <dc:creator>jensscheuvens</dc:creator>
      <dc:date>2024-02-09T13:21:51Z</dc:date>
    </item>
    <item>
      <title>Re: Access Cisco ASA via ASDM from remote via different Interface</title>
      <link>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5015525#M1108953</link>
      <description>&lt;P&gt;Friend you are so so welcome&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have a nice weekend&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2024 13:41:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5015525#M1108953</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-09T13:41:12Z</dc:date>
    </item>
    <item>
      <title>Re: Access Cisco ASA via ASDM from remote via different Interface</title>
      <link>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5015530#M1108954</link>
      <description>&lt;P&gt;thanks you too&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2024 13:49:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-cisco-asa-via-asdm-from-remote-via-different-interface/m-p/5015530#M1108954</guid>
      <dc:creator>jensscheuvens</dc:creator>
      <dc:date>2024-02-09T13:49:17Z</dc:date>
    </item>
  </channel>
</rss>

