<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5505 to 5506 replacement - using the 5506 with bridged (switched) ports and vpn 9.8.x in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-to-5506-replacement-using-the-5506-with-bridged/m-p/3075889#M134168</link>
    <description>&lt;P&gt;Hi guys,&lt;/P&gt;
&lt;P&gt;it has been a pain and a year long ongoing process to get Cisco to implement (sorta) switched ports into the ASA 5506.&lt;/P&gt;
&lt;P&gt;Most of us probably use the 5505 for small branches due to the fact it has a built-in switch.&lt;/P&gt;
&lt;P&gt;Now while we were all exited to get our hands on the new 5506 when it finally came out, we also ran into a huge problem. It did not have any switched ports. Jars dropped - worlds crushed.&lt;/P&gt;
&lt;P&gt;While it was pretty neat to have routed interfaces, no small branch would ever need that. Instead most are probably using the convenient switch ports on the 5505 - actually, that was a big selling point to not have to buy a separate switch.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So all our dreams crushed and shattered (the following s..storm to Cisco WTH???), all our ASA5505 still have to stay in place or worse (or not) switch to a different vendor. Some of us may have had no choice as they had to be replaced or demanded so by the customer.&lt;/P&gt;
&lt;P&gt;I decided to convince my customers to hang in there, making promises that Cisco will release an update so that the new ASA will have switching ports as well. AND we waited and waited and nothing seemed to happen. Cisco forgot all about the little guy, forgot that all the hundreds of branches are essentially connected to the HQ, also running the big guy version of the ASA.&lt;/P&gt;
&lt;P&gt;Then once again, we saw the end of the tunnel with the release of v9.7.x, OMG bridge groups ! Something routers had for , I don't know, EVER maybe?&lt;/P&gt;
&lt;P&gt;Well anyway, switching on the 5506 seemed so close, will our dreams come true&amp;nbsp;- finally?&lt;/P&gt;
&lt;P&gt;Quick, get me a 5506, I have got to do this NOW... and tell everyone that we have switching capacity on the ASA now !!!&amp;nbsp;It works oh my good, I can ping two pc's through two interface connected with a bridge group.&lt;/P&gt;
&lt;P&gt;There it is there it is - lets get going and do VPN... oh wait... VPN Handle Error, code crash oh no, I am dead. As I sit here in tears of joy of switching ports, NAT and VPN killed the beat.&lt;/P&gt;
&lt;P&gt;Cisco Cisco on the wall, can you not get the code straight for us all.&lt;/P&gt;
&lt;P&gt;Well, months have passed , the world moved on, we will remember out hero as he has been lynched by his customers for not delivering switching ports as promised.&lt;/P&gt;
&lt;P&gt;But leaving this all behind us, it is now the glory of 9.8 that will get us to where we want to go.&lt;/P&gt;
&lt;P&gt;And this is what everyone has been waiting for&amp;nbsp; - switching ports (well sorta not really), vpn and nat without crashes (so far).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;And how in&amp;nbsp;the world do I get this darn thing running like a 5505?&lt;/P&gt;
&lt;P&gt;While it was pretty straight forward with the 5505, the 5506 seems to be a bumpy curvy road around a mountain top.&lt;/P&gt;
&lt;P&gt;But enough of the tales of our demise, here is watcha gotta do...&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;First, make yourself a bridge group interface:&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN class="pln"&gt;&lt;BR /&gt;&lt;STRONG&gt;interface BVI1&lt;BR /&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;nameif&amp;nbsp;inside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;security-level 100&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;ip address 10.4.83.1 255.255.255.0 &lt;/STRONG&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;STRONG&gt;#(feels good right?)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;now add your routed interfaces to the bridge-group...&lt;/STRONG&gt;&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;STRONG&gt;interface GigabitEthernet1/2&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;bridge-group 1&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;nameif inside2&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;security-level 100&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;interface GigabitEthernet1/3&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;bridge-group 1&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;nameif inside3&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;security-level 100&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;interface GigabitEthernet1/4&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;bridge-group 1&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;nameif inside4&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;security-level 100&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;and so on...(getting funky)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;NOTE1: yes you need a name (and no they can't all be named the same, so I used numbers) and YES they need to be in the same security level&lt;/P&gt;
&lt;P&gt;NOTE2: IN CASE you want to or need to change the bridge-group assignment, you have to "no nameif" first, change the BG and do "name if" again.&lt;/P&gt;
&lt;P&gt;Additional Note 2.1: Funny thing, while removing the nameif - all your rules referencing to the now gone interface - lol - are gone too&amp;nbsp;&lt;BR /&gt;So... copy the missing stuff back from the startup-config and i hope you did not save in between or at least had a copy in notepad.&lt;/P&gt;
&lt;P&gt;NOTE3: with the ASDM, it will complain that it can only have 4 interfaces in a bridge group - apparently that is a lie, cause with the shell, it works.&lt;/P&gt;
&lt;P&gt;(If you do not use nameif, the interface will simply not come up)&lt;/P&gt;
&lt;P&gt;NOTE4:&amp;nbsp; Of course now you have to allow inter interface traffic as well:&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN class="pln"&gt;same&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;security&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;traffic permit inter&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;interface&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt;same&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;security&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;traffic permit intra&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;interface&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Whoohoo, I can ping... but not to the outside...yet&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;No, you can not simply NAT to the BVI (Cisco ?? Really?)&lt;/P&gt;
&lt;P&gt;Instead, you have to NAT/PAT ALL of your physical interfaces...&lt;/P&gt;
&lt;P&gt;e.g. with "before NAT rules"&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN class="kwd"&gt;&lt;STRONG&gt;nat (inside4,outside) source dynamic any interface dns&lt;BR /&gt;&lt;/STRONG&gt;&lt;STRONG&gt;nat (inside5,outside) source dynamic any interface dns&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;or Object NAT rules - however you like it better (at this point I assume you are familiar with how NAT on the ASA works)&lt;/P&gt;
&lt;P&gt;ok ok, here...&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN class="kwd"&gt;&lt;STRONG&gt;object network NAT_OUT_DYN_I6&lt;BR /&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; subnet 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; nat (inside5,outside) dynamic interface dns&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;Lazy version that is.&lt;/P&gt;
&lt;P&gt;NOTE: You HAVE to use interface names, (ANY,OUTSIDE) does NOT work.&lt;/P&gt;
&lt;P&gt;So yes for all "switched" interfaces you need a dynamic pat rule - if you want to get out of the matrix, uhm outside interface I mean.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Same difference, VPN&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN class="kwd"&gt;&lt;STRONG&gt;nat (inside4,outside&lt;/STRONG&gt;) source static NETWORK_OBJ_10.4.83.0_24 NETWORK_OBJ_10.4.83.0_24 destination static VPN_TO_HOME VPN_TO_HOME no-proxy-arp route-lookup&lt;BR /&gt;&lt;STRONG&gt;nat (inside5,outside&lt;/STRONG&gt;) source static NETWORK_OBJ_10.4.83.0_24 NETWORK_OBJ_10.4.83.0_24 destination static VPN_TO_HOME VPN_TO_HOME no-proxy-arp route-lookup&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;ALL you NAT are belong to us.&lt;/P&gt;
&lt;P&gt;Ok, Scotty, just don't forget about the &lt;STRONG&gt;access-list,&lt;/STRONG&gt; and you probably guessed - &lt;STRONG&gt;for EACH interface.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;So overall, it is a really big hassle to do it since configuration is multiplied by the number of interfaces you have in the bridge-group.&lt;/P&gt;
&lt;P&gt;On another note, with the last ASDM I tested this funky bridge-group stuff, half is not working right or doing something the shell does not understand - so watch the output before you send it, chances are it is not correct, especially anything with NAT or NAT-EXEMPT&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Also, if you want to access your ASA.... yeah really it is just like that.....&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;ssh 0.0.0.0 0.0.0.0 inside2&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside3&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside4&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside6&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside7&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside8&lt;/PRE&gt;
&lt;P&gt;and for telnet and for http...&lt;/P&gt;
&lt;P&gt;or use the management interface if you can - unless you use Firepower ...little treacherous firewall...&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This should cover the base, getting the 5505 replaced by the 5506.&lt;/P&gt;
&lt;P&gt;We switched, we PAT/NAT and we's VPNed.&lt;/P&gt;
&lt;P&gt;Should take care of most 5505 setups out there.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for reading now get out of the basement and plant a tree or do something useful instead of wasting away in front of putty.&lt;/P&gt;
&lt;P&gt;Cheers&lt;/P&gt;
&lt;P&gt;Markus&lt;/P&gt;
&lt;P&gt;p.s. This config was NOT tested with Firepower Services installed so i have no clue how those two will react to each other considering how "abstract" the config looks like. Somehow i have doubts Cisco did some tests with it either....&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 09:40:57 GMT</pubDate>
    <dc:creator>Michael Braun</dc:creator>
    <dc:date>2019-03-12T09:40:57Z</dc:date>
    <item>
      <title>ASA 5505 to 5506 replacement - using the 5506 with bridged (switched) ports and vpn 9.8.x</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-5506-replacement-using-the-5506-with-bridged/m-p/3075889#M134168</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;
&lt;P&gt;it has been a pain and a year long ongoing process to get Cisco to implement (sorta) switched ports into the ASA 5506.&lt;/P&gt;
&lt;P&gt;Most of us probably use the 5505 for small branches due to the fact it has a built-in switch.&lt;/P&gt;
&lt;P&gt;Now while we were all exited to get our hands on the new 5506 when it finally came out, we also ran into a huge problem. It did not have any switched ports. Jars dropped - worlds crushed.&lt;/P&gt;
&lt;P&gt;While it was pretty neat to have routed interfaces, no small branch would ever need that. Instead most are probably using the convenient switch ports on the 5505 - actually, that was a big selling point to not have to buy a separate switch.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So all our dreams crushed and shattered (the following s..storm to Cisco WTH???), all our ASA5505 still have to stay in place or worse (or not) switch to a different vendor. Some of us may have had no choice as they had to be replaced or demanded so by the customer.&lt;/P&gt;
&lt;P&gt;I decided to convince my customers to hang in there, making promises that Cisco will release an update so that the new ASA will have switching ports as well. AND we waited and waited and nothing seemed to happen. Cisco forgot all about the little guy, forgot that all the hundreds of branches are essentially connected to the HQ, also running the big guy version of the ASA.&lt;/P&gt;
&lt;P&gt;Then once again, we saw the end of the tunnel with the release of v9.7.x, OMG bridge groups ! Something routers had for , I don't know, EVER maybe?&lt;/P&gt;
&lt;P&gt;Well anyway, switching on the 5506 seemed so close, will our dreams come true&amp;nbsp;- finally?&lt;/P&gt;
&lt;P&gt;Quick, get me a 5506, I have got to do this NOW... and tell everyone that we have switching capacity on the ASA now !!!&amp;nbsp;It works oh my good, I can ping two pc's through two interface connected with a bridge group.&lt;/P&gt;
&lt;P&gt;There it is there it is - lets get going and do VPN... oh wait... VPN Handle Error, code crash oh no, I am dead. As I sit here in tears of joy of switching ports, NAT and VPN killed the beat.&lt;/P&gt;
&lt;P&gt;Cisco Cisco on the wall, can you not get the code straight for us all.&lt;/P&gt;
&lt;P&gt;Well, months have passed , the world moved on, we will remember out hero as he has been lynched by his customers for not delivering switching ports as promised.&lt;/P&gt;
&lt;P&gt;But leaving this all behind us, it is now the glory of 9.8 that will get us to where we want to go.&lt;/P&gt;
&lt;P&gt;And this is what everyone has been waiting for&amp;nbsp; - switching ports (well sorta not really), vpn and nat without crashes (so far).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;And how in&amp;nbsp;the world do I get this darn thing running like a 5505?&lt;/P&gt;
&lt;P&gt;While it was pretty straight forward with the 5505, the 5506 seems to be a bumpy curvy road around a mountain top.&lt;/P&gt;
&lt;P&gt;But enough of the tales of our demise, here is watcha gotta do...&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;First, make yourself a bridge group interface:&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN class="pln"&gt;&lt;BR /&gt;&lt;STRONG&gt;interface BVI1&lt;BR /&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;nameif&amp;nbsp;inside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;security-level 100&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;ip address 10.4.83.1 255.255.255.0 &lt;/STRONG&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;STRONG&gt;#(feels good right?)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;now add your routed interfaces to the bridge-group...&lt;/STRONG&gt;&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;STRONG&gt;interface GigabitEthernet1/2&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;bridge-group 1&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;nameif inside2&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;security-level 100&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;interface GigabitEthernet1/3&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;bridge-group 1&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;nameif inside3&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;security-level 100&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;interface GigabitEthernet1/4&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;bridge-group 1&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;nameif inside4&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;security-level 100&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;and so on...(getting funky)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;NOTE1: yes you need a name (and no they can't all be named the same, so I used numbers) and YES they need to be in the same security level&lt;/P&gt;
&lt;P&gt;NOTE2: IN CASE you want to or need to change the bridge-group assignment, you have to "no nameif" first, change the BG and do "name if" again.&lt;/P&gt;
&lt;P&gt;Additional Note 2.1: Funny thing, while removing the nameif - all your rules referencing to the now gone interface - lol - are gone too&amp;nbsp;&lt;BR /&gt;So... copy the missing stuff back from the startup-config and i hope you did not save in between or at least had a copy in notepad.&lt;/P&gt;
&lt;P&gt;NOTE3: with the ASDM, it will complain that it can only have 4 interfaces in a bridge group - apparently that is a lie, cause with the shell, it works.&lt;/P&gt;
&lt;P&gt;(If you do not use nameif, the interface will simply not come up)&lt;/P&gt;
&lt;P&gt;NOTE4:&amp;nbsp; Of course now you have to allow inter interface traffic as well:&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN class="pln"&gt;same&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;security&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;traffic permit inter&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;interface&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt;same&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;security&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;traffic permit intra&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;interface&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Whoohoo, I can ping... but not to the outside...yet&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;No, you can not simply NAT to the BVI (Cisco ?? Really?)&lt;/P&gt;
&lt;P&gt;Instead, you have to NAT/PAT ALL of your physical interfaces...&lt;/P&gt;
&lt;P&gt;e.g. with "before NAT rules"&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN class="kwd"&gt;&lt;STRONG&gt;nat (inside4,outside) source dynamic any interface dns&lt;BR /&gt;&lt;/STRONG&gt;&lt;STRONG&gt;nat (inside5,outside) source dynamic any interface dns&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;or Object NAT rules - however you like it better (at this point I assume you are familiar with how NAT on the ASA works)&lt;/P&gt;
&lt;P&gt;ok ok, here...&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN class="kwd"&gt;&lt;STRONG&gt;object network NAT_OUT_DYN_I6&lt;BR /&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; subnet 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; nat (inside5,outside) dynamic interface dns&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;Lazy version that is.&lt;/P&gt;
&lt;P&gt;NOTE: You HAVE to use interface names, (ANY,OUTSIDE) does NOT work.&lt;/P&gt;
&lt;P&gt;So yes for all "switched" interfaces you need a dynamic pat rule - if you want to get out of the matrix, uhm outside interface I mean.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Same difference, VPN&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN class="kwd"&gt;&lt;STRONG&gt;nat (inside4,outside&lt;/STRONG&gt;) source static NETWORK_OBJ_10.4.83.0_24 NETWORK_OBJ_10.4.83.0_24 destination static VPN_TO_HOME VPN_TO_HOME no-proxy-arp route-lookup&lt;BR /&gt;&lt;STRONG&gt;nat (inside5,outside&lt;/STRONG&gt;) source static NETWORK_OBJ_10.4.83.0_24 NETWORK_OBJ_10.4.83.0_24 destination static VPN_TO_HOME VPN_TO_HOME no-proxy-arp route-lookup&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;ALL you NAT are belong to us.&lt;/P&gt;
&lt;P&gt;Ok, Scotty, just don't forget about the &lt;STRONG&gt;access-list,&lt;/STRONG&gt; and you probably guessed - &lt;STRONG&gt;for EACH interface.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;So overall, it is a really big hassle to do it since configuration is multiplied by the number of interfaces you have in the bridge-group.&lt;/P&gt;
&lt;P&gt;On another note, with the last ASDM I tested this funky bridge-group stuff, half is not working right or doing something the shell does not understand - so watch the output before you send it, chances are it is not correct, especially anything with NAT or NAT-EXEMPT&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Also, if you want to access your ASA.... yeah really it is just like that.....&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;ssh 0.0.0.0 0.0.0.0 inside2&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside3&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside4&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside6&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside7&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside8&lt;/PRE&gt;
&lt;P&gt;and for telnet and for http...&lt;/P&gt;
&lt;P&gt;or use the management interface if you can - unless you use Firepower ...little treacherous firewall...&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This should cover the base, getting the 5505 replaced by the 5506.&lt;/P&gt;
&lt;P&gt;We switched, we PAT/NAT and we's VPNed.&lt;/P&gt;
&lt;P&gt;Should take care of most 5505 setups out there.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for reading now get out of the basement and plant a tree or do something useful instead of wasting away in front of putty.&lt;/P&gt;
&lt;P&gt;Cheers&lt;/P&gt;
&lt;P&gt;Markus&lt;/P&gt;
&lt;P&gt;p.s. This config was NOT tested with Firepower Services installed so i have no clue how those two will react to each other considering how "abstract" the config looks like. Somehow i have doubts Cisco did some tests with it either....&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:40:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-5506-replacement-using-the-5506-with-bridged/m-p/3075889#M134168</guid>
      <dc:creator>Michael Braun</dc:creator>
      <dc:date>2019-03-12T09:40:57Z</dc:date>
    </item>
    <item>
      <title>..and of course there has to</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-5506-replacement-using-the-5506-with-bridged/m-p/3075890#M134169</link>
      <description>&lt;P&gt;..and of course there has to be something that does not work...&lt;/P&gt;
&lt;P&gt;DHCP RELAY&lt;/P&gt;
&lt;P&gt;can't enable it on any of the bridge-group interfaces nor on the BVI itself....&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2017 08:59:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-5506-replacement-using-the-5506-with-bridged/m-p/3075890#M134169</guid>
      <dc:creator>Michael Braun</dc:creator>
      <dc:date>2017-07-11T08:59:08Z</dc:date>
    </item>
    <item>
      <title>Thank you for the</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-5506-replacement-using-the-5506-with-bridged/m-p/3075891#M134170</link>
      <description>&lt;P&gt;Thank you for the comprehensive description, for both the WHAT and especially the HOW!&lt;/P&gt;
&lt;P&gt;cheers&lt;/P&gt;
&lt;P&gt;Johannes&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jul 2017 12:41:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-5506-replacement-using-the-5506-with-bridged/m-p/3075891#M134170</guid>
      <dc:creator>johannes88</dc:creator>
      <dc:date>2017-07-12T12:41:13Z</dc:date>
    </item>
    <item>
      <title>You are very welcome, in case</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-5506-replacement-using-the-5506-with-bridged/m-p/3075892#M134172</link>
      <description>&lt;P&gt;You are very welcome, in case you run into additional issues, please post them here too.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;I have only one setup right now that requires bridged ports and it is not due for installation for another two weeks - if that.&lt;/P&gt;
&lt;P&gt;Markus&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jul 2017 14:58:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-5506-replacement-using-the-5506-with-bridged/m-p/3075892#M134172</guid>
      <dc:creator>Michael Braun</dc:creator>
      <dc:date>2017-07-12T14:58:34Z</dc:date>
    </item>
    <item>
      <title>Thank you verry much! I've</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-5506-replacement-using-the-5506-with-bridged/m-p/3075893#M134173</link>
      <description>&lt;P&gt;Thank you verry much! I've spent 2 hours trying to figure this out. I couldn't understand why I wasn't able to do a simple "nat(inside,outside)..." So one rule per interface it is then.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jul 2017 20:18:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-5506-replacement-using-the-5506-with-bridged/m-p/3075893#M134173</guid>
      <dc:creator>Philip Vilhelmsson</dc:creator>
      <dc:date>2017-07-20T20:18:22Z</dc:date>
    </item>
    <item>
      <title>Welcome, we all have been</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-5506-replacement-using-the-5506-with-bridged/m-p/3075894#M134176</link>
      <description>&lt;P&gt;Welcome, we all have been wondering that i am sure.&lt;/P&gt;
&lt;P&gt;Let's just hope in the future this will be changed so that the BVI interface actually gets to do what it is ment to do.&lt;/P&gt;
&lt;P&gt;Although, i recently tested the new Firepower Device Manager (its the one supposedly replacing the ASDM) and it works the same way except, the Web Interface does the work for you.&lt;/P&gt;
&lt;P&gt;Worst of all, no more console access with it. So it is one thing to stay away from as far as possible.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Markus&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jul 2017 06:23:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-5506-replacement-using-the-5506-with-bridged/m-p/3075894#M134176</guid>
      <dc:creator>Michael Braun</dc:creator>
      <dc:date>2017-07-21T06:23:17Z</dc:date>
    </item>
    <item>
      <title>Re: Welcome, we all have been</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-5506-replacement-using-the-5506-with-bridged/m-p/3193619#M134179</link>
      <description>&lt;P&gt;Thank you for that information! That is probably the config I should have used but I went a different route and I am finding I have issues with Port Forwarding. I am going to change my NATing to your example above. Did you get a chance to mess with port forwarding with your NAT for the interfaces set up the way you have them?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;
&lt;P&gt;Brett&lt;/P&gt;</description>
      <pubDate>Wed, 04 Oct 2017 12:54:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-5506-replacement-using-the-5506-with-bridged/m-p/3193619#M134179</guid>
      <dc:creator>MCITadmin</dc:creator>
      <dc:date>2017-10-04T12:54:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 to 5506 replacement - using the 5506 with bridged (switched) ports and vpn 9.8.x</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-5506-replacement-using-the-5506-with-bridged/m-p/3193634#M134181</link>
      <description>&lt;P&gt;Thank you for that information! That is probably the config I should have used but I went a different route and I am finding I have issues with Port Forwarding. I am going to change my NATing to your example above. Did you get a chance to mess with port forwarding with your NAT for the interfaces set up the way you have them?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;
&lt;P&gt;Brett&lt;/P&gt;</description>
      <pubDate>Wed, 04 Oct 2017 13:16:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-5506-replacement-using-the-5506-with-bridged/m-p/3193634#M134181</guid>
      <dc:creator>MCITadmin</dc:creator>
      <dc:date>2017-10-04T13:16:11Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 to 5506 replacement - using the 5506 with bridged (switched) ports and vpn 9.8.x</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-5506-replacement-using-the-5506-with-bridged/m-p/3214446#M134183</link>
      <description>&lt;P&gt;Hiya,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you advise if&amp;nbsp;this will work in the same way for 2 outside interfaces&amp;nbsp; being added to a BVI?&amp;nbsp; I have&amp;nbsp; a few ACL entries for incoming traffic outside and NAT's&amp;nbsp; on my 5506-X and need to implement a solution for a Primary and secondary outside connections on the same subnet.&lt;/P&gt;
&lt;P&gt;Thanks in advance&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Fee &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Nov 2017 10:58:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-5506-replacement-using-the-5506-with-bridged/m-p/3214446#M134183</guid>
      <dc:creator>Fee</dc:creator>
      <dc:date>2017-11-10T10:58:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 to 5506 replacement - using the 5506 with bridged (switched) ports and vpn 9.8.x</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-5506-replacement-using-the-5506-with-bridged/m-p/3337184#M134185</link>
      <description>&lt;P&gt;Hi thanks for the info - i wish i would have seen this "for each interface"quirk from the start, i would have many less grey hairs.&amp;nbsp; I've got most of my bridge-group dreams figured out except for one item: port-forwarding to an inside-server in a bridge group.&amp;nbsp; The packet trace gets to un-nat and matches the correct rule and shows the proper host and port target - but then chokes with a "no valid adjacency, route failed to find next hop" Forwarding to a single inside interface, even logical ones, works fine.&amp;nbsp; If anybody could post a working config example of this i would be much indebted...&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 24 Feb 2018 16:44:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-5506-replacement-using-the-5506-with-bridged/m-p/3337184#M134185</guid>
      <dc:creator>ScottyMac</dc:creator>
      <dc:date>2018-02-24T16:44:43Z</dc:date>
    </item>
    <item>
      <title>Re: Welcome, we all have been</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-5506-replacement-using-the-5506-with-bridged/m-p/3337185#M134186</link>
      <description>&lt;P&gt;Hi&amp;nbsp;did you get the port forwarding to a bridge-group inside-server working?&amp;nbsp; I've tried everything but the packet trace gets to un-nat and matches the correct rule and shows the proper host and port target - but then chokes with a "no valid adjacency, route failed to find next hop" Forwarding to a single inside interface, even logical ones, works fine. If anybody could post a working config example of this i would be much indebted...&lt;/P&gt;</description>
      <pubDate>Sat, 24 Feb 2018 16:46:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-5506-replacement-using-the-5506-with-bridged/m-p/3337185#M134186</guid>
      <dc:creator>ScottyMac</dc:creator>
      <dc:date>2018-02-24T16:46:23Z</dc:date>
    </item>
    <item>
      <title>Re: Welcome, we all have been</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-5506-replacement-using-the-5506-with-bridged/m-p/3337203#M134187</link>
      <description>got it! "nat (outside,any)" changed to a bunch of "nat (outside, inside_1)"&lt;BR /&gt;this was the key to the solution.  turns out that even though you can have a few ports "bridged" you still have to repeat the nat rules specifically for each physical interface - both the inbound nat and outbound pat rules.  imho one should be able to setup nat rules against just the bridge-group logical interface, as it is with any other logical interface.  cisco should then internally span those rules to each physical interface that is part of the bridge group on their own behind the scenes.</description>
      <pubDate>Sat, 24 Feb 2018 18:28:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-5506-replacement-using-the-5506-with-bridged/m-p/3337203#M134187</guid>
      <dc:creator>ScottyMac</dc:creator>
      <dc:date>2018-02-24T18:28:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 to 5506 replacement - using the 5506 with bridged (switched) ports and vpn 9.8.x</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-5506-replacement-using-the-5506-with-bridged/m-p/3337204#M134188</link>
      <description>got it! "nat (outside,any)" changed to a bunch of "nat (outside, inside_1)"&lt;BR /&gt;this was the key to the solution.  turns out that even though you can have a few ports "bridged" you still have to repeat the nat rules specifically for each physical interface - both the inbound nat and outbound pat rules.  imho one should be able to setup nat rules against just the bridge-group logical interface, as it is with any other logical interface.  cisco should then internally span those rules to each physical interface that is part of the bridge group on their own behind the scenes.</description>
      <pubDate>Sat, 24 Feb 2018 18:28:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-5506-replacement-using-the-5506-with-bridged/m-p/3337204#M134188</guid>
      <dc:creator>ScottyMac</dc:creator>
      <dc:date>2018-02-24T18:28:50Z</dc:date>
    </item>
  </channel>
</rss>

