<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ASA 5505 LAN Question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-lan-question/m-p/3089785#M133912</link>
    <description>&lt;P&gt;So I have run into an issue I have never seen before and I thought I would share the issue with a group.&lt;/P&gt;
&lt;P&gt;We installed a new ASA 5505 at a site using 3 interfaces:&lt;/P&gt;
&lt;P&gt;E0/0 = WAN&lt;/P&gt;
&lt;P&gt;E0/1 = 192.168.1.1&lt;/P&gt;
&lt;P&gt;E0/2 = 192.168.2.1&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;We setup interVLAN routing between E0/1 and E0/2 and both VLANs go out the WAN interface for internet. &amp;nbsp;All is working great except for one thing. &amp;nbsp;I'll do my best to explain the issue.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So this site has 5 Point of Sale stations and a POS server all statically assigned and segmented on their own switch with a connection to the ASA.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;POS1 = 192.168.2.11&lt;/P&gt;
&lt;P&gt;POS2 - 192.168.2.102&lt;/P&gt;
&lt;P&gt;POS3 - 192.168.2.103&lt;/P&gt;
&lt;P&gt;POS4 - 192.168.2.104&lt;/P&gt;
&lt;P&gt;POS5 - 192.168.2.5&lt;/P&gt;
&lt;P&gt;POS Server Appliance - 192.168.2.250&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The POS1 Station runs an app called NETePay (192.168.2.11). &amp;nbsp;The other 4 POS stations connect through this device via a software application. &amp;nbsp;I have no software firewalls enabled or AV running (for testing purposes). &amp;nbsp;The NETePay application is what processes the Credit Card transactions and on POS1 they work flawlessly. &amp;nbsp;All stations can talk to the POS server and all have internet access and such. &amp;nbsp;The problem resides when the POS2-5 stations try to talk to the POS1 device to process the transactions. &amp;nbsp;They all fail.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HOWEVER, if we run a continuous pings on the POS2-5 devices (i.e. "ping 192.168.2.11 -t") the transactions go through with no issues on all devices. &amp;nbsp;If the pings are NOT running the transactions fail.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;My question is: &amp;nbsp;What in the ASA would cause traffic to NOT route vs be ABLE to route when a continuous PING is running? &amp;nbsp;Could this be a NAT issue with the VLAN itself? &amp;nbsp;I can ping every station, connect to the POS Server, run all day long with no issues, but the connection to 192.168.2.11 for CC processing only works if I am running a continuous ping. &amp;nbsp;If it was a port blocking issue, I would assume it would not work at all. &amp;nbsp;I have also taken the following troubleshooting steps with no luck toward resolution:&lt;/P&gt;
&lt;P&gt;1. &amp;nbsp;Cleared ARP tables on ASA and all POS Devices&lt;/P&gt;
&lt;P&gt;2. &amp;nbsp;Replaced the Switch with a basic layer2 switch&lt;/P&gt;
&lt;P&gt;3. &amp;nbsp;Performed a packet capture from the POS client to the POS Host (192.168.2.5 to 192.168.2.11). &amp;nbsp;I sent that to the POS vendor and they stated that it said there was a duplicate IP address on the network. &amp;nbsp;That IP was 192.168.2.250 with the MAC of the ASA and the MAC of the POS server but there is not 2.250 address programmed in the ASA at all.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;4. &amp;nbsp;Contacted TAC. &amp;nbsp;They added a&amp;nbsp;"&lt;SPAN&gt;same-security-traffic permit intra-interface" command that seemed to help, but did not resolve the problem.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;So I am at a loss here. &amp;nbsp;I don't claim to be a Cisco Guru by any means, but I do know my way around an ASA and again, have never seen something like this before. &amp;nbsp;I am new to this forum so I hope I didn't break any rules by asking this question here, but I figured if anyone would know where to start, this would be the place.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Sincerely,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;Jason&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 09:42:59 GMT</pubDate>
    <dc:creator>jkelnhofer</dc:creator>
    <dc:date>2019-03-12T09:42:59Z</dc:date>
    <item>
      <title>Cisco ASA 5505 LAN Question</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-lan-question/m-p/3089785#M133912</link>
      <description>&lt;P&gt;So I have run into an issue I have never seen before and I thought I would share the issue with a group.&lt;/P&gt;
&lt;P&gt;We installed a new ASA 5505 at a site using 3 interfaces:&lt;/P&gt;
&lt;P&gt;E0/0 = WAN&lt;/P&gt;
&lt;P&gt;E0/1 = 192.168.1.1&lt;/P&gt;
&lt;P&gt;E0/2 = 192.168.2.1&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;We setup interVLAN routing between E0/1 and E0/2 and both VLANs go out the WAN interface for internet. &amp;nbsp;All is working great except for one thing. &amp;nbsp;I'll do my best to explain the issue.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So this site has 5 Point of Sale stations and a POS server all statically assigned and segmented on their own switch with a connection to the ASA.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;POS1 = 192.168.2.11&lt;/P&gt;
&lt;P&gt;POS2 - 192.168.2.102&lt;/P&gt;
&lt;P&gt;POS3 - 192.168.2.103&lt;/P&gt;
&lt;P&gt;POS4 - 192.168.2.104&lt;/P&gt;
&lt;P&gt;POS5 - 192.168.2.5&lt;/P&gt;
&lt;P&gt;POS Server Appliance - 192.168.2.250&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The POS1 Station runs an app called NETePay (192.168.2.11). &amp;nbsp;The other 4 POS stations connect through this device via a software application. &amp;nbsp;I have no software firewalls enabled or AV running (for testing purposes). &amp;nbsp;The NETePay application is what processes the Credit Card transactions and on POS1 they work flawlessly. &amp;nbsp;All stations can talk to the POS server and all have internet access and such. &amp;nbsp;The problem resides when the POS2-5 stations try to talk to the POS1 device to process the transactions. &amp;nbsp;They all fail.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HOWEVER, if we run a continuous pings on the POS2-5 devices (i.e. "ping 192.168.2.11 -t") the transactions go through with no issues on all devices. &amp;nbsp;If the pings are NOT running the transactions fail.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;My question is: &amp;nbsp;What in the ASA would cause traffic to NOT route vs be ABLE to route when a continuous PING is running? &amp;nbsp;Could this be a NAT issue with the VLAN itself? &amp;nbsp;I can ping every station, connect to the POS Server, run all day long with no issues, but the connection to 192.168.2.11 for CC processing only works if I am running a continuous ping. &amp;nbsp;If it was a port blocking issue, I would assume it would not work at all. &amp;nbsp;I have also taken the following troubleshooting steps with no luck toward resolution:&lt;/P&gt;
&lt;P&gt;1. &amp;nbsp;Cleared ARP tables on ASA and all POS Devices&lt;/P&gt;
&lt;P&gt;2. &amp;nbsp;Replaced the Switch with a basic layer2 switch&lt;/P&gt;
&lt;P&gt;3. &amp;nbsp;Performed a packet capture from the POS client to the POS Host (192.168.2.5 to 192.168.2.11). &amp;nbsp;I sent that to the POS vendor and they stated that it said there was a duplicate IP address on the network. &amp;nbsp;That IP was 192.168.2.250 with the MAC of the ASA and the MAC of the POS server but there is not 2.250 address programmed in the ASA at all.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;4. &amp;nbsp;Contacted TAC. &amp;nbsp;They added a&amp;nbsp;"&lt;SPAN&gt;same-security-traffic permit intra-interface" command that seemed to help, but did not resolve the problem.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;So I am at a loss here. &amp;nbsp;I don't claim to be a Cisco Guru by any means, but I do know my way around an ASA and again, have never seen something like this before. &amp;nbsp;I am new to this forum so I hope I didn't break any rules by asking this question here, but I figured if anyone would know where to start, this would be the place.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Sincerely,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;Jason&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:42:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-lan-question/m-p/3089785#M133912</guid>
      <dc:creator>jkelnhofer</dc:creator>
      <dc:date>2019-03-12T09:42:59Z</dc:date>
    </item>
    <item>
      <title>Interesting issue. I wonder</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-lan-question/m-p/3089786#M133915</link>
      <description>&lt;P&gt;Interesting issue. I wonder about the pinging from POS2-5 to POS1 as from what I can make out above, this would not involve the ASA at all.&lt;/P&gt;
&lt;P&gt;Where does the POS Server come into play in all this.&lt;/P&gt;
&lt;P&gt;Can you supply the MACs of each POS machine, also the ouptut of the mac address table of the switch these devices reside on.&lt;/P&gt;
&lt;P&gt;Relevant ASA config would be beneficial also.&lt;/P&gt;
&lt;P&gt;To confirm, the POS switch hangs of E0/2 ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is the E0/1 interface/network irrelevant in this issue?&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2017 21:23:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-lan-question/m-p/3089786#M133915</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2017-07-19T21:23:46Z</dc:date>
    </item>
    <item>
      <title>First off, thank you for the</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-lan-question/m-p/3089787#M133917</link>
      <description>&lt;P&gt;First off, thank you for the reply. &amp;nbsp;This issue is nothing less than frustrating&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Where does the POS Server come into play in all this.&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;So the POS server is an appliance from ECRS (POS Vendor) that's in the rack and looks quite like a switch. &amp;nbsp;It holds all the POS DATA (Pricing, Inventory, sales, and anything else related to a grocery store). &amp;nbsp;It's a "server" if you want to call it that. &amp;nbsp;Address = 192.168.2.250&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Can you supply the MACs of each POS machine, also the ouptut of the mac address table of the switch these devices reside on.&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;I can provide these, however I need to get back onsite to get them. &amp;nbsp;The organization has a very strict "no remote access" policy and being the vendor/partner I have to respect that. &amp;nbsp;can go onsite and get this information in the near future.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Relevant ASA config would be beneficial also.&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 9pt; font-family: Arial, sans-serif; color: #ff0000; background: white;"&gt;ASA Version 9.1(6)&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Arial',sans-serif; color: black;"&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;!&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;&lt;SPAN style="background: white;"&gt;hostname ciscoasa&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;enable password *****************&amp;nbsp;encrypted&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;names&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;!&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;interface Ethernet0/0&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;switchport access vlan 2&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;!&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;interface Ethernet0/1&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;!&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;interface Ethernet0/2&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;switchport access vlan 12&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;!&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;interface Ethernet0/3&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;!&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;interface Ethernet0/4&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;!&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;interface Ethernet0/5&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;!&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;interface Ethernet0/6&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;!&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;interface Ethernet0/7&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;!&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;interface Vlan1&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;description Connection to Internal LAN&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;nameif inside&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;security-level 100&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;ip address 192.168.1.1 255.255.255.0&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;!&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;interface Vlan2&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;description Connection to Internet&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;nameif outside&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;security-level 0&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;ip address dhcp setroute&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;!&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;interface Vlan12&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;nameif POS&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;security-level 100&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;ip address 192.168.2.1 255.255.255.0&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;!&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;ftp mode passive&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;dns domain-lookup outside&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;dns domain-lookup inside&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;dns domain-lookup POS&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;dns server-group DefaultDNS&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;name-server 8.8.8.8&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;name-server&amp;nbsp;8.8.4.4&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt; &lt;SPAN style="background: white;"&gt;same-security-traffic permit inter-interface&amp;nbsp;&lt;BR /&gt;same-security-traffic permit intra-interface&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 9pt; font-family: Arial, sans-serif;"&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;object network obj_any&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;subnet 0.0.0.0 255.255.255.0&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;object network POS&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;subnet 0.0.0.0 255.255.255.0&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;object network Internal-LAN&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;subnet 192.168.1.0 255.255.255.0&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;object network POS-LAN&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;subnet 192.168.2.0 255.255.255.0&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;description POS connection to internet&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;access-list outside_access_in extended permit icmp any any echo-reply&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;pager lines 24&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;logging asdm informational&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;mtu outside 1500&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;mtu inside 1500&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;mtu POS 1500&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;no failover&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;icmp unreachable rate-limit 1 burst-size 1&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;no asdm history enable&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;arp timeout 14400&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;no arp permit-nonconnected&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;nat (any,any) source static POS POS&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;!&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;object network obj_any&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;nat (inside,outside) dynamic interface&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;object network Internal-LAN&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;nat (any,outside) dynamic interface&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;object network POS-LAN&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;nat (any,outside) dynamic interface&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;!&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;nat (any,any) after-auto source static any any&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;access-group outside_access_in in interface outside&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;route outside 0.0.0.0 0.0.0.0 10.0.0.1 1&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;timeout xlate 3:00:00&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;timeout pat-xlate 0:00:30&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;timeout tcp-proxy-reassembly 0:01:00&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;timeout floating-conn 0:00:00&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;dynamic-access-policy-record DfltAccessPolicy&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;user-identity default-domain LOCAL&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;http server enable&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;http 192.168.1.0 255.255.255.0 inside&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;no snmp-server location&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;no snmp-server contact&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;crypto ipsec security-association pmtu-aging infinite&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;crypto ca trustpool policy&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;telnet timeout 5&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;no ssh stricthostkeycheck&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;ssh timeout 5&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;ssh key-exchange group dh-group1-sha1&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;console timeout 0&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt; &lt;SPAN style="background: white;"&gt;dhcpd auto_config outside&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;!&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;dhcpd address 192.168.1.5-192.168.1.254 inside&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;dhcpd dns 8.8.8.8 8.8.4.4 interface inside&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;dhcpd enable inside&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;!&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;dhcpd address 192.168.2.5-192.168.2.100 POS&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;dhcpd dns 8.8.8.8 8.8.4.4 interface POS&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;dhcpd enable POS&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;!&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;threat-detection basic-threat&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;threat-detection statistics access-list&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;no threat-detection statistics tcp-intercept&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;!&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;class-map inspection_default&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;match default-inspection-traffic&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;!&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;!&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;policy-map type inspect dns preset_dns_map&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;parameters&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;message-length maximum client auto&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;message-length maximum 512&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;policy-map global_policy&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;class inspection_default&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;inspect dns preset_dns_map&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;inspect ftp&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;inspect h323 h225&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;inspect h323 ras&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;inspect rsh&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;inspect rtsp&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;inspect esmtp&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;inspect sqlnet&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;inspect skinny&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;inspect sunrpc&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;inspect xdmcp&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;inspect sip&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;inspect netbios&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;inspect tftp&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;inspect ip-options&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;!&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;service-policy global_policy global&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;prompt hostname context&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;call-home reporting anonymous prompt 2&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;Cryptochecksum:0e278a11f11f97a44df23f673727dd9b&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt; &lt;SPAN style="background: white;"&gt;: end&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;To confirm, the POS switch hangs of E0/2 ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;That is correct, and the only devices on that switch are POS Stations, the POS Server and the connection to the interface on the ASA&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Is the E0/1 interface/network irrelevant in this issue?&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;Again, correct. &amp;nbsp;I need some interVLAN routing in order for their wireless Handhelds to be able to reach the POS Server 192.168.2.250 so they can do inventory and price updates out on the floor. &amp;nbsp;They have plans for a new WiFi system that I can eventually tie to the 192.168.2.0 network, but for now they have to route from the 192.168.1.0 network. &amp;nbsp;Eventually PCI will come into play and need to be completely segmented, but for the sake of this issue, yes it is irrelevant.&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2017 21:41:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-lan-question/m-p/3089787#M133917</guid>
      <dc:creator>jkelnhofer</dc:creator>
      <dc:date>2017-07-19T21:41:37Z</dc:date>
    </item>
    <item>
      <title>I have attached quick diagram</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-lan-question/m-p/3089788#M133921</link>
      <description>&lt;P&gt;I have attached quick&amp;nbsp;diagram just to check I am right in thinking&amp;nbsp;how this&amp;nbsp;hangs together.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;With regards to all the NAT statements in the config - can you explain the thinking behind each of them and the order&amp;nbsp;they were configured in?&lt;/P&gt;
&lt;P&gt;There are only two networks that need to&amp;nbsp;be NAT'd outbound&amp;nbsp;on ASA, is that correct? 192.168.1.0/24 &amp;nbsp;and 192.168.2.0/24&lt;/P&gt;
&lt;P&gt;Also, can you provide output of the &lt;EM&gt;show nat&lt;/EM&gt; command on the ASA.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jul 2017 08:29:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-lan-question/m-p/3089788#M133921</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2017-07-20T08:29:29Z</dc:date>
    </item>
  </channel>
</rss>

