<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Sourcefire management port and subinterface communication issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/sourcefire-management-port-and-subinterface-communication-issue/m-p/3082816#M135080</link>
    <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have one problem which I cannot bypass. Usually it works on physical interface out of the box, but this simply I cannot bypass. In short don't know how. I have configured one interface Gi1/8.10 VLAN 10 with IP 192.168.0.1 and management interface for SFR as 192.168.0.254. They are in same subnet. I have connected this management port meant for SFR via switch and on this switch I also connected Interface on which sub interface is configured. So connection goes. Interface (sub interface) -&amp;gt; Switch port trunk port 24 -&amp;gt; access port 1 and 2. Port 1 is connected to my PC and &amp;nbsp;port 2 is connected to Management port on ASA (SFR). Unfortunately I cannot use Sourcefire for some reason. First thought was as sub interface has additional frame for VLAN that it might be an issue, but then again, switch removes that frame as port 1 and 2 is access port so it cannot be issue. The other thing that I noticed is that I cannot ping 192.168.0.254 even though port is enabled. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;What can possibly be an issue here?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;IMG alt="SFR config" title="SFR config" class="media-element file-default" data-delta="1" typeof="foaf:Image" src="https://community.cisco.com/legacyfs/online/media/capture_289.png" data-fid="1449481" data-media-element="1" /&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;IMG alt="Sub Interface config" title="Sub Interface config" class="media-element file-default" data-delta="2" typeof="foaf:Image" src="https://community.cisco.com/legacyfs/online/media/capture2_23.png" data-fid="1449486" data-media-element="1" /&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Config&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;xxx-xxx(config)# show running-config&lt;BR /&gt;: Saved&lt;/P&gt;
&lt;P&gt;:&lt;BR /&gt;: Serial Number: XXXXXXXXXX&lt;BR /&gt;: Hardware: ASA5516, 8192 MB RAM, CPU Atom C2000 series 2416 MHz, 1 CPU (8 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.8(1)&lt;BR /&gt;!&lt;BR /&gt;hostname xxx-xxx&lt;BR /&gt;enable password xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx pbkdf2&lt;BR /&gt;passwd xxxxxxxxxxxxxxxxxxxxx encrypted&lt;BR /&gt;names&lt;BR /&gt;ip local pool XXX_VPN 192.168.2.2-192.168.2.250 mask 255.255.255.0&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;description XXX public IP&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address xxx.xxx.xxx.xxx 255.255.255.xxx&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;nameif WANxxx&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address xxx.xxx.xxx.xxx 255.255.255.xxx&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;nameif insideXXX&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.xx.xx 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8.10&lt;BR /&gt;description administration interface&lt;BR /&gt;vlan 10&lt;BR /&gt;nameif administration&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.0.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8.50&lt;BR /&gt;description voice interface - telephones&lt;BR /&gt;vlan 50&lt;BR /&gt;nameif voice&lt;BR /&gt;security-level 80&lt;BR /&gt;ip address 10.10.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8.100&lt;BR /&gt;vlan 100&lt;BR /&gt;nameif CTS&lt;BR /&gt;security-level 70&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa981-lfbff-k8.SPA&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CEST 1&lt;BR /&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;BR /&gt;object network obj_any&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network XXXGW&lt;BR /&gt;host xxx.xxx.xxx.xxx&lt;BR /&gt;description XXXX Gateway&lt;BR /&gt;object network xxx-gw&lt;BR /&gt;host xxx.xxx.xxx.xxx&lt;BR /&gt;description XXX gateway IP&lt;BR /&gt;object network XXX_NAT&lt;BR /&gt;host 192.168.1.0&lt;BR /&gt;object network XXX_NAT&lt;BR /&gt;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network XXXXNAT&lt;BR /&gt;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;description Raw Gateway&lt;BR /&gt;object network AdminNAT&lt;BR /&gt;subnet 192.168.0.0 255.255.255.0&lt;BR /&gt;description Administration network NAT&lt;BR /&gt;object network NETWORK_OBJ_192.168.2.0_24&lt;BR /&gt;subnet 192.168.2.0 255.255.255.0&lt;BR /&gt;object network tmp&lt;BR /&gt;subnet 192.168.13.0 255.255.255.0&lt;BR /&gt;description tmp subnet&lt;BR /&gt;object network NAT_CTS&lt;BR /&gt;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;description CTS system&lt;BR /&gt;object network NAT_Voice&lt;BR /&gt;subnet 10.10.10.0 255.255.255.0&lt;BR /&gt;description Telephone system&lt;BR /&gt;object network XXX_admin_Sub&lt;BR /&gt;subnet 192.168.0.0 255.255.255.0&lt;BR /&gt;description test out&lt;BR /&gt;access-list insideXXX_access_in extended permit icmp any any&lt;BR /&gt;access-list insideXXX_access_in extended permit ip any any&lt;BR /&gt;access-list WANxxx_access_in extended permit icmp any any echo-reply&lt;BR /&gt;access-list XXX_VPN remark Split tunnel for admin network&lt;BR /&gt;access-list XXX_VPN standard permit 192.168.0.0 255.255.255.0&lt;BR /&gt;access-list outside_access_in extended permit icmp any any echo-reply&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu WANxxx 1500&lt;BR /&gt;mtu insideXXX 1500&lt;BR /&gt;mtu administration 1500&lt;BR /&gt;mtu voice 1500&lt;BR /&gt;mtu CTS 1500&lt;BR /&gt;no failover&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-781.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;nat (administration,outside) source static any any destination static NETWORK_OBJ_192.168.2.0_24 NETWORK_OBJ_192.168.2.0_24 no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;nat (any,outside) dynamic interface&lt;BR /&gt;object network XXXXNAT&lt;BR /&gt;nat (any,WANxxx) dynamic interface dns&lt;BR /&gt;object network AdminNAT&lt;BR /&gt;nat (any,outside) dynamic interface dns&lt;BR /&gt;object network tmp&lt;BR /&gt;nat (insideXXX,WANxxx) dynamic interface dns&lt;BR /&gt;object network NAT_CTS&lt;BR /&gt;nat (any,outside) dynamic interface dns&lt;BR /&gt;object network NAT_Voice&lt;BR /&gt;nat (any,outside) dynamic interface dns&lt;BR /&gt;object network RAW_admin_Sub&lt;BR /&gt;nat (any,WANxxx) dynamic interface dns&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group WANxxx_access_in in interface WANxxx&lt;BR /&gt;access-group insideXXX_access_in in interface insideXXX&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 xxx.xxx.xxx.xxx 1&lt;BR /&gt;route WANxxx 0.0.0.0 0.0.0.0 xxx.xxx.xxx.xxx 2&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http xxx.xxx.xxx.xxx 255.255.255.255 WANxxx&lt;BR /&gt;http 192.168.13.0 255.255.255.0 insideXXX&lt;BR /&gt;http 192.168.0.0 255.255.255.0 administration&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt;protocol esp encryption aes-256&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt;protocol esp encryption aes-192&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt;protocol esp encryption aes&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt;protocol esp encryption 3des&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt;protocol esp encryption des&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;BR /&gt;enrollment terminal&lt;BR /&gt;subject-name CN=XXX.local,O=XXX,C=DK&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint1&lt;BR /&gt;enrollment self&lt;BR /&gt;subject-name CN=XXX.local&lt;BR /&gt;proxy-ldc-issuer&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca certificate chain ASDM_TrustPoint1&lt;BR /&gt;certificate 7cc32459&lt;BR /&gt;3082033b 30820223 a0030201 0202047c c3245930 0d06092a 864886f7 0d01010b&lt;BR /&gt;0500302d 31123010 06035504 03130967 70682e6c 6f63616c 31173015 06092a86&lt;BR /&gt;4886f70d 01090216 08636973 636f6173 61301e17 0d313730 35323430 38323330&lt;BR /&gt;ed3df0ba 834a6aec b6fe1da4 60740980 22cefe83 b89b0047 f2a87238 11f8003a&lt;BR /&gt;2189b396 adf34b71 3f1a92e8 1af372d7 eb6ac7cd b41dd779 118d70e5 66cdbf6f&lt;BR /&gt;4060f9cf a9fa36c6 b2a5ac82 e2a7aba8 49d71ac7 0e2de6c2 bbc2ae6b b26ef986&lt;BR /&gt;8b3a9ecb 2d470d7f 4ee27bd1 d3cc7103 a85bcf1c 055e3366 8ae0dcd8 b22d2efd&lt;BR /&gt;eeaadd58 81bdf651 33c2b735 1f34695d b161f107 7943c075 788b85ad 7bd1a9ae&lt;BR /&gt;a4a0b5a3 c2c0ce7b 81bd791e 8fc647dd ff2a2a47 21eab083 73652c44 c0c0c135&lt;BR /&gt;d55d524b 507aa9bf ea2bc3f5 6bc7ea69 66f8e42a 20ba4583 163fa878 f0c9c41b&lt;BR /&gt;8af01c80 405c8564 91f4a20b 79b1b976 7b6b2a0a bb0253b1 df612bc2 aa4e1a&lt;BR /&gt;quit&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt;encryption aes-256&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt;encryption aes-192&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 20&lt;BR /&gt;encryption aes&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 30&lt;BR /&gt;encryption 3des&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 40&lt;BR /&gt;encryption des&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 enable outside client-services port 443&lt;BR /&gt;crypto ikev2 remote-access trustpoint ASDM_TrustPoint1&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 30&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.13.2-192.168.13.230 insideXXX&lt;BR /&gt;dhcpd dns 8.8.8.8 208.67.222.222 interface insideXXX&lt;BR /&gt;dhcpd enable insideXXX&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.0.2-192.168.0.244 administration&lt;BR /&gt;dhcpd dns 8.8.8.8 208.67.222.222 interface administration&lt;BR /&gt;dhcpd enable administration&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.10.10.2-10.10.10.250 voice&lt;BR /&gt;dhcpd dns 8.8.8.8 208.67.222.222 interface voice&lt;BR /&gt;dhcpd enable voice&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.250 CTS&lt;BR /&gt;dhcpd dns 8.8.8.8 208.67.222.222 interface CTS&lt;BR /&gt;dhcpd enable CTS&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ssl trust-point ASDM_TrustPoint1 outside&lt;BR /&gt;ssl trust-point ASDM_TrustPoint1 WANxxx&lt;BR /&gt;ssl trust-point ASDM_TrustPoint1 insideXXX&lt;BR /&gt;ssl trust-point ASDM_TrustPoint1 administration&lt;BR /&gt;ssl trust-point ASDM_TrustPoint1 voice&lt;BR /&gt;webvpn&lt;BR /&gt;enable outside&lt;BR /&gt;anyconnect image disk0:/anyconnect-win-4.3.01095-k9.pkg 1&lt;BR /&gt;anyconnect profiles XXX_VPN_client_profile disk0:/XXX_VPN_client_profile.xml&lt;BR /&gt;anyconnect enable&lt;BR /&gt;tunnel-group-list enable&lt;BR /&gt;cache&lt;BR /&gt;disable&lt;BR /&gt;error-recovery disable&lt;BR /&gt;group-policy GroupPolicy_XXX_VPN internal&lt;BR /&gt;group-policy GroupPolicy_XXX_VPN attributes&lt;BR /&gt;wins-server none&lt;BR /&gt;dns-server value 8.8.8.8&lt;BR /&gt;vpn-tunnel-protocol ikev2 ssl-client&lt;BR /&gt;split-tunnel-policy excludespecified&lt;BR /&gt;split-tunnel-network-list value XXX_VPN&lt;BR /&gt;default-domain none&lt;BR /&gt;webvpn&lt;BR /&gt;anyconnect profiles value XXX_VPN_client_profile type user&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username xxadmin password XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX pbkdf2 privilege 15&lt;BR /&gt;username xyadmin password XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX privilege 15&lt;BR /&gt;tunnel-group XXX_VPN type remote-access&lt;BR /&gt;tunnel-group XXX_VPN general-attributes&lt;BR /&gt;address-pool XXX_VPN&lt;BR /&gt;default-group-policy GroupPolicy_XXX_VPN&lt;BR /&gt;tunnel-group XXX_VPN webvpn-attributes&lt;BR /&gt;group-alias XXX_VPN enable&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:1xxxxxxxxxxxxxxxxxxxxxxxx&lt;BR /&gt;: end&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you in advance&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 09:27:06 GMT</pubDate>
    <dc:creator>Rawit2015</dc:creator>
    <dc:date>2019-03-12T09:27:06Z</dc:date>
    <item>
      <title>Sourcefire management port and subinterface communication issue</title>
      <link>https://community.cisco.com/t5/network-security/sourcefire-management-port-and-subinterface-communication-issue/m-p/3082816#M135080</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have one problem which I cannot bypass. Usually it works on physical interface out of the box, but this simply I cannot bypass. In short don't know how. I have configured one interface Gi1/8.10 VLAN 10 with IP 192.168.0.1 and management interface for SFR as 192.168.0.254. They are in same subnet. I have connected this management port meant for SFR via switch and on this switch I also connected Interface on which sub interface is configured. So connection goes. Interface (sub interface) -&amp;gt; Switch port trunk port 24 -&amp;gt; access port 1 and 2. Port 1 is connected to my PC and &amp;nbsp;port 2 is connected to Management port on ASA (SFR). Unfortunately I cannot use Sourcefire for some reason. First thought was as sub interface has additional frame for VLAN that it might be an issue, but then again, switch removes that frame as port 1 and 2 is access port so it cannot be issue. The other thing that I noticed is that I cannot ping 192.168.0.254 even though port is enabled. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;What can possibly be an issue here?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;IMG alt="SFR config" title="SFR config" class="media-element file-default" data-delta="1" typeof="foaf:Image" src="https://community.cisco.com/legacyfs/online/media/capture_289.png" data-fid="1449481" data-media-element="1" /&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;IMG alt="Sub Interface config" title="Sub Interface config" class="media-element file-default" data-delta="2" typeof="foaf:Image" src="https://community.cisco.com/legacyfs/online/media/capture2_23.png" data-fid="1449486" data-media-element="1" /&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Config&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;xxx-xxx(config)# show running-config&lt;BR /&gt;: Saved&lt;/P&gt;
&lt;P&gt;:&lt;BR /&gt;: Serial Number: XXXXXXXXXX&lt;BR /&gt;: Hardware: ASA5516, 8192 MB RAM, CPU Atom C2000 series 2416 MHz, 1 CPU (8 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.8(1)&lt;BR /&gt;!&lt;BR /&gt;hostname xxx-xxx&lt;BR /&gt;enable password xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx pbkdf2&lt;BR /&gt;passwd xxxxxxxxxxxxxxxxxxxxx encrypted&lt;BR /&gt;names&lt;BR /&gt;ip local pool XXX_VPN 192.168.2.2-192.168.2.250 mask 255.255.255.0&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;description XXX public IP&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address xxx.xxx.xxx.xxx 255.255.255.xxx&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;nameif WANxxx&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address xxx.xxx.xxx.xxx 255.255.255.xxx&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;nameif insideXXX&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.xx.xx 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8.10&lt;BR /&gt;description administration interface&lt;BR /&gt;vlan 10&lt;BR /&gt;nameif administration&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.0.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8.50&lt;BR /&gt;description voice interface - telephones&lt;BR /&gt;vlan 50&lt;BR /&gt;nameif voice&lt;BR /&gt;security-level 80&lt;BR /&gt;ip address 10.10.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8.100&lt;BR /&gt;vlan 100&lt;BR /&gt;nameif CTS&lt;BR /&gt;security-level 70&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa981-lfbff-k8.SPA&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CEST 1&lt;BR /&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;BR /&gt;object network obj_any&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network XXXGW&lt;BR /&gt;host xxx.xxx.xxx.xxx&lt;BR /&gt;description XXXX Gateway&lt;BR /&gt;object network xxx-gw&lt;BR /&gt;host xxx.xxx.xxx.xxx&lt;BR /&gt;description XXX gateway IP&lt;BR /&gt;object network XXX_NAT&lt;BR /&gt;host 192.168.1.0&lt;BR /&gt;object network XXX_NAT&lt;BR /&gt;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network XXXXNAT&lt;BR /&gt;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;description Raw Gateway&lt;BR /&gt;object network AdminNAT&lt;BR /&gt;subnet 192.168.0.0 255.255.255.0&lt;BR /&gt;description Administration network NAT&lt;BR /&gt;object network NETWORK_OBJ_192.168.2.0_24&lt;BR /&gt;subnet 192.168.2.0 255.255.255.0&lt;BR /&gt;object network tmp&lt;BR /&gt;subnet 192.168.13.0 255.255.255.0&lt;BR /&gt;description tmp subnet&lt;BR /&gt;object network NAT_CTS&lt;BR /&gt;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;description CTS system&lt;BR /&gt;object network NAT_Voice&lt;BR /&gt;subnet 10.10.10.0 255.255.255.0&lt;BR /&gt;description Telephone system&lt;BR /&gt;object network XXX_admin_Sub&lt;BR /&gt;subnet 192.168.0.0 255.255.255.0&lt;BR /&gt;description test out&lt;BR /&gt;access-list insideXXX_access_in extended permit icmp any any&lt;BR /&gt;access-list insideXXX_access_in extended permit ip any any&lt;BR /&gt;access-list WANxxx_access_in extended permit icmp any any echo-reply&lt;BR /&gt;access-list XXX_VPN remark Split tunnel for admin network&lt;BR /&gt;access-list XXX_VPN standard permit 192.168.0.0 255.255.255.0&lt;BR /&gt;access-list outside_access_in extended permit icmp any any echo-reply&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu WANxxx 1500&lt;BR /&gt;mtu insideXXX 1500&lt;BR /&gt;mtu administration 1500&lt;BR /&gt;mtu voice 1500&lt;BR /&gt;mtu CTS 1500&lt;BR /&gt;no failover&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-781.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;nat (administration,outside) source static any any destination static NETWORK_OBJ_192.168.2.0_24 NETWORK_OBJ_192.168.2.0_24 no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;nat (any,outside) dynamic interface&lt;BR /&gt;object network XXXXNAT&lt;BR /&gt;nat (any,WANxxx) dynamic interface dns&lt;BR /&gt;object network AdminNAT&lt;BR /&gt;nat (any,outside) dynamic interface dns&lt;BR /&gt;object network tmp&lt;BR /&gt;nat (insideXXX,WANxxx) dynamic interface dns&lt;BR /&gt;object network NAT_CTS&lt;BR /&gt;nat (any,outside) dynamic interface dns&lt;BR /&gt;object network NAT_Voice&lt;BR /&gt;nat (any,outside) dynamic interface dns&lt;BR /&gt;object network RAW_admin_Sub&lt;BR /&gt;nat (any,WANxxx) dynamic interface dns&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group WANxxx_access_in in interface WANxxx&lt;BR /&gt;access-group insideXXX_access_in in interface insideXXX&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 xxx.xxx.xxx.xxx 1&lt;BR /&gt;route WANxxx 0.0.0.0 0.0.0.0 xxx.xxx.xxx.xxx 2&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http xxx.xxx.xxx.xxx 255.255.255.255 WANxxx&lt;BR /&gt;http 192.168.13.0 255.255.255.0 insideXXX&lt;BR /&gt;http 192.168.0.0 255.255.255.0 administration&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt;protocol esp encryption aes-256&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt;protocol esp encryption aes-192&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt;protocol esp encryption aes&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt;protocol esp encryption 3des&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt;protocol esp encryption des&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;BR /&gt;enrollment terminal&lt;BR /&gt;subject-name CN=XXX.local,O=XXX,C=DK&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint1&lt;BR /&gt;enrollment self&lt;BR /&gt;subject-name CN=XXX.local&lt;BR /&gt;proxy-ldc-issuer&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca certificate chain ASDM_TrustPoint1&lt;BR /&gt;certificate 7cc32459&lt;BR /&gt;3082033b 30820223 a0030201 0202047c c3245930 0d06092a 864886f7 0d01010b&lt;BR /&gt;0500302d 31123010 06035504 03130967 70682e6c 6f63616c 31173015 06092a86&lt;BR /&gt;4886f70d 01090216 08636973 636f6173 61301e17 0d313730 35323430 38323330&lt;BR /&gt;ed3df0ba 834a6aec b6fe1da4 60740980 22cefe83 b89b0047 f2a87238 11f8003a&lt;BR /&gt;2189b396 adf34b71 3f1a92e8 1af372d7 eb6ac7cd b41dd779 118d70e5 66cdbf6f&lt;BR /&gt;4060f9cf a9fa36c6 b2a5ac82 e2a7aba8 49d71ac7 0e2de6c2 bbc2ae6b b26ef986&lt;BR /&gt;8b3a9ecb 2d470d7f 4ee27bd1 d3cc7103 a85bcf1c 055e3366 8ae0dcd8 b22d2efd&lt;BR /&gt;eeaadd58 81bdf651 33c2b735 1f34695d b161f107 7943c075 788b85ad 7bd1a9ae&lt;BR /&gt;a4a0b5a3 c2c0ce7b 81bd791e 8fc647dd ff2a2a47 21eab083 73652c44 c0c0c135&lt;BR /&gt;d55d524b 507aa9bf ea2bc3f5 6bc7ea69 66f8e42a 20ba4583 163fa878 f0c9c41b&lt;BR /&gt;8af01c80 405c8564 91f4a20b 79b1b976 7b6b2a0a bb0253b1 df612bc2 aa4e1a&lt;BR /&gt;quit&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt;encryption aes-256&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt;encryption aes-192&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 20&lt;BR /&gt;encryption aes&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 30&lt;BR /&gt;encryption 3des&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 40&lt;BR /&gt;encryption des&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 enable outside client-services port 443&lt;BR /&gt;crypto ikev2 remote-access trustpoint ASDM_TrustPoint1&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 30&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.13.2-192.168.13.230 insideXXX&lt;BR /&gt;dhcpd dns 8.8.8.8 208.67.222.222 interface insideXXX&lt;BR /&gt;dhcpd enable insideXXX&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.0.2-192.168.0.244 administration&lt;BR /&gt;dhcpd dns 8.8.8.8 208.67.222.222 interface administration&lt;BR /&gt;dhcpd enable administration&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.10.10.2-10.10.10.250 voice&lt;BR /&gt;dhcpd dns 8.8.8.8 208.67.222.222 interface voice&lt;BR /&gt;dhcpd enable voice&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.250 CTS&lt;BR /&gt;dhcpd dns 8.8.8.8 208.67.222.222 interface CTS&lt;BR /&gt;dhcpd enable CTS&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ssl trust-point ASDM_TrustPoint1 outside&lt;BR /&gt;ssl trust-point ASDM_TrustPoint1 WANxxx&lt;BR /&gt;ssl trust-point ASDM_TrustPoint1 insideXXX&lt;BR /&gt;ssl trust-point ASDM_TrustPoint1 administration&lt;BR /&gt;ssl trust-point ASDM_TrustPoint1 voice&lt;BR /&gt;webvpn&lt;BR /&gt;enable outside&lt;BR /&gt;anyconnect image disk0:/anyconnect-win-4.3.01095-k9.pkg 1&lt;BR /&gt;anyconnect profiles XXX_VPN_client_profile disk0:/XXX_VPN_client_profile.xml&lt;BR /&gt;anyconnect enable&lt;BR /&gt;tunnel-group-list enable&lt;BR /&gt;cache&lt;BR /&gt;disable&lt;BR /&gt;error-recovery disable&lt;BR /&gt;group-policy GroupPolicy_XXX_VPN internal&lt;BR /&gt;group-policy GroupPolicy_XXX_VPN attributes&lt;BR /&gt;wins-server none&lt;BR /&gt;dns-server value 8.8.8.8&lt;BR /&gt;vpn-tunnel-protocol ikev2 ssl-client&lt;BR /&gt;split-tunnel-policy excludespecified&lt;BR /&gt;split-tunnel-network-list value XXX_VPN&lt;BR /&gt;default-domain none&lt;BR /&gt;webvpn&lt;BR /&gt;anyconnect profiles value XXX_VPN_client_profile type user&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username xxadmin password XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX pbkdf2 privilege 15&lt;BR /&gt;username xyadmin password XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX privilege 15&lt;BR /&gt;tunnel-group XXX_VPN type remote-access&lt;BR /&gt;tunnel-group XXX_VPN general-attributes&lt;BR /&gt;address-pool XXX_VPN&lt;BR /&gt;default-group-policy GroupPolicy_XXX_VPN&lt;BR /&gt;tunnel-group XXX_VPN webvpn-attributes&lt;BR /&gt;group-alias XXX_VPN enable&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:1xxxxxxxxxxxxxxxxxxxxxxxx&lt;BR /&gt;: end&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you in advance&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:27:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sourcefire-management-port-and-subinterface-communication-issue/m-p/3082816#M135080</guid>
      <dc:creator>Rawit2015</dc:creator>
      <dc:date>2019-03-12T09:27:06Z</dc:date>
    </item>
    <item>
      <title>Quite bizarre, it look like</title>
      <link>https://community.cisco.com/t5/network-security/sourcefire-management-port-and-subinterface-communication-issue/m-p/3082817#M135081</link>
      <description>&lt;P&gt;Quite bizarre, it look like it start to work after couple of minutes, even though I haven't changed config. Also what I noticed for some reason each "DHCP server" on sub interface takes&amp;nbsp;at least 3 minutes to start of&amp;nbsp;releasing IP from the pool.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Jun 2017 12:49:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sourcefire-management-port-and-subinterface-communication-issue/m-p/3082817#M135081</guid>
      <dc:creator>Rawit2015</dc:creator>
      <dc:date>2017-06-01T12:49:41Z</dc:date>
    </item>
  </channel>
</rss>

