<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allow-traffic-between-2-inside-same-level-security-interfaces-on/m-p/3033138#M145934</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;That drop is not necessarily due to ACL and could be any reason. Here is the CLI synatx:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;packet-tracer input [src_int] protocol src_addr src_port dest_addr&amp;nbsp; dest_port [detailed] [xml]&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Eg as per your IP addresses (run the cmd in the same way on CLI):&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;for ICMP:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;packet-tracer input&amp;nbsp;Inside-LAN icmp 192.168.75.1 8 0&amp;nbsp;192.168.77.2 detail&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;and for other communications like HTTP:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;packet-tracer input inside tcp 192.168.75.1 1024 &lt;SPAN&gt;192.168.77.2&lt;/SPAN&gt;&amp;nbsp;80 detail&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Tripat Kaur&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 09 Mar 2017 21:12:02 GMT</pubDate>
    <dc:creator>trdatta</dc:creator>
    <dc:date>2017-03-09T21:12:02Z</dc:date>
    <item>
      <title>Allow traffic between 2 INSIDE same level security interfaces on ASA Version 9.0.1</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffic-between-2-inside-same-level-security-interfaces-on/m-p/3033135#M145922</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;For past 2 days I have been searching and looking to solve this one simple problem on my home lab with ASA 5510 and it seems there is no straight forward answer to that, beside most of the answers&amp;nbsp; that I found are related to older pre 8.3 version so many of the commands that people suggesting to try are obsolete . &amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;This is my scenario. &lt;BR /&gt;&lt;BR /&gt;Security Level 0 F0/0 Outside (Internet) &lt;BR /&gt;Security Level 100 F0/1 Inside-LAN 192.168.75.0/24 (L3 Switch)&lt;BR /&gt;Security Level 100 F0/2 Inside-R1 192.168.76.0/24 (Router)&lt;BR /&gt;Security Level 100 F0/3 Inside-R2 192.168.77.0/24 (Router)&lt;BR /&gt;&lt;BR /&gt;What I'm trying to accomplish is that host sitting behind F0/2 or F0/3 will be able to communicate &lt;EM&gt;(ping)&lt;/EM&gt; with host sitting behind F0/1. These are all &lt;STRONG&gt;inside&lt;/STRONG&gt; interfaces with &lt;STRONG&gt;security level 100&lt;/STRONG&gt; and both&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;same-security-traffic permit inter-interface&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;same-security-traffic permit intra-interface&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;are enabled and still no luck. I was trying different "obj" NAT rules, playing with ACL's but still I can't reach (ping) from the router connected to F0/2 in to F0/1. However I'm able to ping all interfaces with in the ASA itself.&lt;BR /&gt;&lt;BR /&gt;Can somebody please give me some hints what else to do? or try? I'm open to any suggestions or changing the level of security as long as I get those inside ports communicate with each other.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:02:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffic-between-2-inside-same-level-security-interfaces-on/m-p/3033135#M145922</guid>
      <dc:creator>CyborgX_CZ</dc:creator>
      <dc:date>2019-03-12T09:02:09Z</dc:date>
    </item>
    <item>
      <title>Can you please run a packet</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffic-between-2-inside-same-level-security-interfaces-on/m-p/3033136#M145927</link>
      <description>&lt;P&gt;Can you please run a packet tracer from source to destination and share the results.&lt;/P&gt;
&lt;P&gt;you can find the packet tracer functionality in ASDM.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Tripat Kaur&lt;/P&gt;</description>
      <pubDate>Thu, 09 Mar 2017 18:16:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffic-between-2-inside-same-level-security-interfaces-on/m-p/3033136#M145927</guid>
      <dc:creator>trdatta</dc:creator>
      <dc:date>2017-03-09T18:16:45Z</dc:date>
    </item>
    <item>
      <title>I can't find anything that</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffic-between-2-inside-same-level-security-interfaces-on/m-p/3033137#M145931</link>
      <description>&lt;P&gt;I can't find anything that would save the result from POCKET TRACER but running ICMP echo-replay from&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Inside-LAN 192.168.75.1 -&amp;gt; 192.168.77.2 :&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Route Lookup: OK&lt;BR /&gt;&lt;BR /&gt;ACCESS LIST: X&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;Config&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Implicit Rule&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Result: The packet is dropped.&lt;/STRONG&gt;&lt;BR /&gt;&lt;EM&gt;Info: (acl-drop) Flow is denied by configured rule&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Inside-LAN 192.168.75.1 -&amp;gt; 192.168.77.1 :&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Route Lookup: OK&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Route Lookup: OK&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;BR /&gt;&lt;STRONG&gt;Result: The packet is dropped.&lt;/STRONG&gt;&lt;BR /&gt;&lt;EM&gt;Info: (no-route) no route to host&lt;BR /&gt;&lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Mar 2017 21:09:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffic-between-2-inside-same-level-security-interfaces-on/m-p/3033137#M145931</guid>
      <dc:creator>CyborgX_CZ</dc:creator>
      <dc:date>2017-03-09T21:09:39Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffic-between-2-inside-same-level-security-interfaces-on/m-p/3033138#M145934</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;That drop is not necessarily due to ACL and could be any reason. Here is the CLI synatx:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;packet-tracer input [src_int] protocol src_addr src_port dest_addr&amp;nbsp; dest_port [detailed] [xml]&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Eg as per your IP addresses (run the cmd in the same way on CLI):&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;for ICMP:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;packet-tracer input&amp;nbsp;Inside-LAN icmp 192.168.75.1 8 0&amp;nbsp;192.168.77.2 detail&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;and for other communications like HTTP:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;packet-tracer input inside tcp 192.168.75.1 1024 &lt;SPAN&gt;192.168.77.2&lt;/SPAN&gt;&amp;nbsp;80 detail&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Tripat Kaur&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Mar 2017 21:12:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffic-between-2-inside-same-level-security-interfaces-on/m-p/3033138#M145934</guid>
      <dc:creator>trdatta</dc:creator>
      <dc:date>2017-03-09T21:12:02Z</dc:date>
    </item>
    <item>
      <title>Oh gotcha CLI :-) BTW: thank</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffic-between-2-inside-same-level-security-interfaces-on/m-p/3033139#M145937</link>
      <description>&lt;P&gt;Oh gotcha CLI &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; BTW: thank you so much for taking your time....&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;ASA-5510# packet-tracer input Inside-LAN icmp 192.168.75.1 8 0 192.168.77.2 detail&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xace647c8, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=12741, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=Inside-LAN, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 192.168.77.0&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; Inside-R2&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xace6ec00, priority=500, domain=permit, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=0, user_data=0x6, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=192.168.75.1, mask=255.255.255.255, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=Inside-LAN, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: Inside-LAN&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Inside-R2&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;ASA-5510# packet-tracer input inside-lan tcp 192.168.75.1 1024 192.168.77.2 80 detail&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 192.168.77.0&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; Inside-R2&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xace6ec00, priority=500, domain=permit, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1, user_data=0x6, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=192.168.75.1, mask=255.255.255.255, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=Inside-LAN, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: Inside-LAN&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Inside-R2&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Thu, 09 Mar 2017 21:26:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffic-between-2-inside-same-level-security-interfaces-on/m-p/3033139#M145937</guid>
      <dc:creator>CyborgX_CZ</dc:creator>
      <dc:date>2017-03-09T21:26:33Z</dc:date>
    </item>
    <item>
      <title>here is a piece from "sh run"</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffic-between-2-inside-same-level-security-interfaces-on/m-p/3033140#M145939</link>
      <description>&lt;P&gt;here is a piece from "sh run"&amp;nbsp; showing all my access rules.&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;
&lt;P&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network Inside-LAN&lt;BR /&gt;&amp;nbsp;subnet 192.168.75.0 255.255.255.0&lt;BR /&gt;object network Inside-R1&lt;BR /&gt;&amp;nbsp;subnet 192.168.76.0 255.255.255.0&lt;BR /&gt;object network Inside-R2&lt;BR /&gt;&amp;nbsp;subnet 192.168.77.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_172.16.0.0_28&lt;BR /&gt;&amp;nbsp;subnet 172.16.0.0 255.255.255.240&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group service DM_INLINE_TCP_2 tcp&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group service DM_INLINE_TCP_3 tcp&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;object-group service DM_INLINE_TCP_4 tcp&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;access-list Outside-TWC_access_in extended permit icmp any any echo-reply&lt;BR /&gt;access-list Outside-TWC_access_in extended permit tcp any any object-group DM_INLINE_TCP_4&lt;BR /&gt;access-list Outside-TWC_access_in extended permit udp any any eq ntp&lt;BR /&gt;access-list Inside-LAN_access_in extended permit ip any any&lt;BR /&gt;access-list Inside-LAN_access_in extended permit tcp any any object-group DM_INLINE_TCP_2&lt;BR /&gt;access-list Inside-LAN_access_in extended permit icmp any any&lt;BR /&gt;access-list Inside-LAN_access_in extended permit udp any any eq ntp&lt;BR /&gt;access-list Inside-R1_access_in extended permit ip any any&lt;BR /&gt;access-list Inside-R1_access_in extended permit tcp any any object-group DM_INLINE_TCP_1&lt;BR /&gt;access-list Inside-R1_access_in extended permit icmp any any&lt;BR /&gt;access-list Inside-R1_access_in extended permit udp any any eq ntp&lt;BR /&gt;access-list Inside-R2_access_in extended permit ip any any&lt;BR /&gt;access-list Inside-R2_access_in extended permit tcp any any object-group DM_INLINE_TCP_3&lt;BR /&gt;access-list Inside-R2_access_in extended permit icmp any any&lt;BR /&gt;access-list Inside-R2_access_in extended permit udp any any eq ntp&lt;BR /&gt;access-list CyberNet_LAN standard permit 192.168.75.0 255.255.255.0&lt;BR /&gt;access-list CyberNet_LAN standard permit 192.168.76.0 255.255.255.0&lt;BR /&gt;access-list CyberNet_LAN standard permit 192.168.77.0 255.255.255.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu Outside-TWC 1500&lt;BR /&gt;mtu Inside-LAN 1500&lt;BR /&gt;mtu Inside-R1 1500&lt;BR /&gt;mtu Inside-R2 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (Inside-LAN,Outside-TWC) source static any any destination static NETWORK_OBJ_172.16.0.0_28 NETWORK_OBJ_172.16.0.0_28 no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network Inside-LAN&lt;BR /&gt;&amp;nbsp;nat (any,Outside-TWC) dynamic interface&lt;BR /&gt;object network Inside-R1&lt;BR /&gt;&amp;nbsp;nat (any,Outside-TWC) dynamic interface&lt;BR /&gt;object network Inside-R2&lt;BR /&gt;&amp;nbsp;nat (any,Outside-TWC) dynamic interface&lt;BR /&gt;access-group Outside-TWC_access_in in interface Outside-TWC&lt;BR /&gt;access-group Inside-LAN_access_in in interface Inside-LAN&lt;BR /&gt;access-group Inside-R1_access_in in interface Inside-R1&lt;BR /&gt;access-group Inside-R2_access_in in interface Inside-R2&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Mar 2017 21:31:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffic-between-2-inside-same-level-security-interfaces-on/m-p/3033140#M145939</guid>
      <dc:creator>CyborgX_CZ</dc:creator>
      <dc:date>2017-03-09T21:31:00Z</dc:date>
    </item>
    <item>
      <title>You're most welcome and we</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffic-between-2-inside-same-level-security-interfaces-on/m-p/3033141#M145942</link>
      <description>&lt;P&gt;You're most welcome and we can give try to some more commands like running another packet tracer from another source like&amp;nbsp;192.168.75.10 as&amp;nbsp;192.168.75.1 could be ASA's interface IP address ? Is that so ?? If yes, the results are not accurate and we might have to run them again. After running the tests, if it again comes the ACL drop, then we also try creating one nat exemption for the traffic as nat comes before ACL and that phase looks missing though thats not required for internal communication but would sometimes also cause the issue.&lt;/P&gt;
&lt;P&gt;For testing, I am writing a nat statement for specifically above source and destination and let's see the results (run the packet tracer again after implementing nat statement)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object network obj-192.168.75.10&lt;/P&gt;
&lt;P&gt;host&amp;nbsp;192.168.75.10&lt;/P&gt;
&lt;P&gt;object network obj-192.168.77.20&lt;/P&gt;
&lt;P&gt;host 192.168.77.2&lt;/P&gt;
&lt;P&gt;nat (Inside-LAN,&amp;nbsp;Inside-R2) 1 source static&amp;nbsp;&lt;SPAN&gt;obj-&lt;/SPAN&gt;&lt;SPAN&gt;192.168.75.10&amp;nbsp;obj-&lt;SPAN&gt;192.168.75.10 destination static&amp;nbsp;obj-&lt;SPAN&gt;192.168.77.20&amp;nbsp;obj-&lt;SPAN&gt;192.168.77.20&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;and let me know how it goes.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;Regard&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;Tripat Kaur&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Mar 2017 22:24:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffic-between-2-inside-same-level-security-interfaces-on/m-p/3033141#M145942</guid>
      <dc:creator>trdatta</dc:creator>
      <dc:date>2017-03-09T22:24:20Z</dc:date>
    </item>
    <item>
      <title>Yes you right 192.168.75.1 is</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffic-between-2-inside-same-level-security-interfaces-on/m-p/3033142#M145946</link>
      <description>&lt;P&gt;Yes you right 192.168.75.1 is the ASA F0/1 Interface static IP.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Anyway assuming in your NAT statement you meant host &lt;STRONG&gt;192.168.77.20&lt;/STRONG&gt; not host &lt;STRONG&gt;192.168.77.2 &lt;/STRONG&gt;here is the result.... Oh and also I switch your &lt;STRONG&gt;192.168.75.10&lt;/STRONG&gt; to &lt;STRONG&gt;192.168.75.200&lt;/STRONG&gt; because 192.168.75.10 is a IP address of my printer in case that will give wrong results.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Note: I was experimenting and created another obj rule for entire subnet and I'm able to ping any address in range 192.168.75.2 - 254 and 192.168.77.2-254 but once I use the ASA ethernet IP address... in my case 192.168.75.1 or 192.168.76.1 or 192.168.77.1 packet gets dropped &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; even changing security level doesn't help.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;ASA-5510# packet-tracer input Inside-LAN icmp 192.168.75.200 8 0 192.168.77.20 detail&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xace692f8, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3320, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=Inside-LAN, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 192.168.77.0&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; Inside-R2&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (Inside-LAN,Inside-R2) source static obj-192.168.75.200 obj-192.168.75.200 destination static obj-192.168.77.20 obj-192.168.77.20&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface Inside-R2&lt;BR /&gt;Untranslate 192.168.77.20/0 to 192.168.77.20/0&lt;BR /&gt;&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group Inside-LAN_access_in in interface Inside-LAN&lt;BR /&gt;access-list Inside-LAN_access_in extended permit ip any any&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xacf17b98, priority=13, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=697, user_data=0xaa46b880, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=Inside-LAN, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (Inside-LAN,Inside-R2) source static obj-192.168.75.200 obj-192.168.75.200 destination static obj-192.168.77.20 obj-192.168.77.20&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 192.168.75.200/0 to 192.168.75.200/0&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xae1dff48, priority=6, domain=nat, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=0, user_data=0xac5b1898, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=192.168.75.200, mask=255.255.255.255, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=192.168.77.20, mask=255.255.255.255, port=0, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=Inside-LAN, output_ifc=Inside-R2&lt;BR /&gt;&lt;BR /&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xac71ac48, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1372, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xace6eb50, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=862, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=Inside-LAN, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 8&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xace6e650, priority=66, domain=inspect-icmp-error, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=113, user_data=0xace6dc60, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=Inside-LAN, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (Inside-LAN,Inside-R2) source static obj-192.168.75.200 obj-192.168.75.200 destination static obj-192.168.77.20 obj-192.168.77.20&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0xae1e0170, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1, user_data=0xace9f068, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=192.168.75.200, mask=255.255.255.255, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=192.168.77.20, mask=255.255.255.255, port=0, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=Inside-LAN, output_ifc=Inside-R2&lt;BR /&gt;&lt;BR /&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 1268, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;BR /&gt;&lt;BR /&gt;Module information for reverse flow ...&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: Inside-LAN&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Inside-R2&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;ASA-5510# packet-tracer input inside-lan tcp 192.168.75.200 1024 192.168.77.20 80 detail&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 192.168.77.0&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; Inside-R2&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (Inside-LAN,Inside-R2) source static obj-192.168.75.200 obj-192.168.75.200 destination static obj-192.168.77.20 obj-192.168.77.20&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface Inside-R2&lt;BR /&gt;Untranslate 192.168.77.20/80 to 192.168.77.20/80&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group Inside-LAN_access_in in interface Inside-LAN&lt;BR /&gt;access-list Inside-LAN_access_in extended permit ip any any&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xacf17b98, priority=13, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=883, user_data=0xaa46b880, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=Inside-LAN, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (Inside-LAN,Inside-R2) source static obj-192.168.75.200 obj-192.168.75.200 destination static obj-192.168.77.20 obj-192.168.77.20&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 192.168.75.200/1024 to 192.168.75.200/1024&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xae1dff48, priority=6, domain=nat, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1, user_data=0xac5b1898, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=192.168.75.200, mask=255.255.255.255, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=192.168.77.20, mask=255.255.255.255, port=0, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=Inside-LAN, output_ifc=Inside-R2&lt;BR /&gt;&lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xac718948, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1047, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xace6eb50, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1102, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=Inside-LAN, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (Inside-LAN,Inside-R2) source static obj-192.168.75.200 obj-192.168.75.200 destination static obj-192.168.77.20 obj-192.168.77.20&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0xae1e0170, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=2, user_data=0xace9f068, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=192.168.75.200, mask=255.255.255.255, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=192.168.77.20, mask=255.255.255.255, port=0, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=Inside-LAN, output_ifc=Inside-R2&lt;BR /&gt;&lt;BR /&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xac718948, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1049, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 9&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xacebc700, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=642, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0 dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=Inside-R2, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 1603, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;BR /&gt;&lt;BR /&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: Inside-LAN&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Inside-R2&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Fri, 10 Mar 2017 02:16:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffic-between-2-inside-same-level-security-interfaces-on/m-p/3033142#M145946</guid>
      <dc:creator>CyborgX_CZ</dc:creator>
      <dc:date>2017-03-10T02:16:01Z</dc:date>
    </item>
    <item>
      <title>Yes, that true. You won't be</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffic-between-2-inside-same-level-security-interfaces-on/m-p/3033143#M145949</link>
      <description>&lt;P&gt;Yes, that true. You won't be able to ping any device using ASA's IP address as the source in the packet tracer and it will always give you result as "drop" because when you take ASA's interface IP address as "source" then it becomes to-the-box traffic where as the tools like packet-tracer are used to check the through-the-box traffic.&lt;/P&gt;
&lt;P&gt;Now, as you said, you are able to ping the rest of the IP addresses in the subnet, so after this what exactly you trying to achieve.&lt;/P&gt;
&lt;P&gt;Just a more bit of information:: If you can only ping the facing interface of the ASA and not the far ones. for eg: &amp;nbsp;users behind&amp;nbsp;&lt;STRONG&gt;inside-lan can only ping 192.168.75.1 and cannot&amp;nbsp;&lt;SPAN&gt;Inside-R2 192.168.77.1 due to security reasons.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;As mentioned earlier, the pings between the hosts of Inside-lan and Inside-R2 are working, so is that resolve the purpose or is there something else you looking for ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If this answers all your concerns, you can mark the answer as correct.&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Tripat Kaur&lt;/P&gt;</description>
      <pubDate>Fri, 10 Mar 2017 06:23:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffic-between-2-inside-same-level-security-interfaces-on/m-p/3033143#M145949</guid>
      <dc:creator>trdatta</dc:creator>
      <dc:date>2017-03-10T06:23:54Z</dc:date>
    </item>
    <item>
      <title>Well my problem is basically</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffic-between-2-inside-same-level-security-interfaces-on/m-p/3033144#M145951</link>
      <description>&lt;P&gt;Well my problem is basically this ... and I will try to explain to you as much as I can but this is just me playing around with bunch of older Cisco gear with 0 real time experience so bear with me.&lt;/P&gt;
&lt;P&gt;F0/0 Outside (Internet) &lt;BR /&gt; F0/1 Inside-LAN 192.168.75.0/24 -&amp;gt; valn75 on 3750G switch&lt;BR /&gt; F0/2 Inside-R1 192.168.76.0/24 (Router)&lt;BR /&gt; F0/3 Inside-R2 192.168.77.0/24 (Router)&lt;/P&gt;
&lt;P&gt;Now the ASA and&amp;nbsp; my 3750G are the only devices that will give me full internet speed so all my wired computers are connected to that switch in to vlan75. Besides the vlan75 there is also vlan99 on my switch and on rest of&amp;nbsp; mine devices except the ASA which is mine management vlan. The switch has connection from vlan99 to each of my devices:&lt;/P&gt;
&lt;P&gt;2x &amp;nbsp;1811W&lt;/P&gt;
&lt;P&gt;1x&amp;nbsp; 2811&lt;/P&gt;
&lt;P&gt;1x&amp;nbsp; 2950&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Now on my computer which is connected to vlan75 I'm able to receive ICMP packets through the vlan99 IP address 192.168.90.x from any devices on my network except that switch. Basically I'm practicing now with some Network Monitor tools and I would like to add my switch in to the list and this is the only one that is unreachable. If I trace the ping it get stuck on the Router R2 which is connected like this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;WANport&lt;/P&gt;
&lt;P&gt;F0/1 to F0/3 on ASA&lt;/P&gt;
&lt;P&gt;Switchport&lt;/P&gt;
&lt;P&gt;F0/5 to G0/23 on 3750G via vlan99&lt;/P&gt;
&lt;P&gt;&amp;nbsp;This is only happening when I'm trying to ping that switch with my computer vlan75 (same as ASA F0/1) &amp;nbsp;if I SSH in to any devices on my network using their vlan99 address &amp;nbsp;I have no problem to communicate with that switch.&lt;/P&gt;
&lt;P&gt;If i ping any other devices like S2-2950 with my computer the tracert command will show me:&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;C:\Users\VMStation-1&amp;gt;tracert 192.168.90.40&lt;BR /&gt;&lt;BR /&gt;Tracing route to 192.168.90.40 over a maximum of 30 hops&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;1 ms&amp;nbsp; 192.168.77.9&lt;BR /&gt;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2 ms&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2 ms&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2 ms&amp;nbsp; 192.168.90.40&lt;BR /&gt;&lt;BR /&gt;Trace complete.&lt;BR /&gt;&lt;BR /&gt;C:\Users\VMStation-1&amp;gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;and this is when I ping the S1-3750&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;C:\Users\VMStation-1&amp;gt;tracert 192.168.90.30&lt;/P&gt;
&lt;P&gt;Tracing route to 192.168.90.30 over a maximum of 30 hops&lt;/P&gt;
&lt;P&gt;1 1 ms &amp;lt;1 ms &amp;lt;1 ms 192.168.77.9&lt;BR /&gt; 2 * * * Request timed out.&lt;BR /&gt; 3 * * * Request timed out.&lt;BR /&gt; 4 * * * Request timed out.&lt;BR /&gt; 5 * * * Request timed out.&lt;BR /&gt; 6 * * * Request timed out.&lt;BR /&gt; 7 * * * Request timed out.&lt;BR /&gt; 8 * * * Request timed out.&lt;BR /&gt; 9 * * * Request timed out.&lt;BR /&gt; 10 * * * Request timed out.&lt;BR /&gt; 11&lt;/P&gt;
&lt;P&gt;&amp;nbsp;I know that I will be probably better with router sitting after my ASA but unfortunately I have nothing powerful enough to deliver my 100MB internet speed, if I use any other devices the throughput speed cuts in to 30mb.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Anyway I hope that I explained my situations enough and sorry if I wasted your time. I really taught the problem is somewhere with those interfaces on my ASA now I think it's the actual design of my network that is wrong &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;PS: Including screenshot of my topology, the only thing that is missing on that picture is the ASA&lt;/P&gt;
&lt;P&gt;Note: Picture manually edited so you can see my troubled area... I think it's because the ASA is sitting on the same vlan let me know if that's the case and and I will have to figured out different way. I was thinking about few scenarios while I was working that I will try tonight when I get home but want to make sure this is a dead end.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Mar 2017 17:55:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffic-between-2-inside-same-level-security-interfaces-on/m-p/3033144#M145951</guid>
      <dc:creator>CyborgX_CZ</dc:creator>
      <dc:date>2017-03-10T17:55:16Z</dc:date>
    </item>
  </channel>
</rss>

