<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic https://supportforums.cisco in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/5506-x-bridge-group-no-comm-to-outside/m-p/3008894#M146057</link>
    <description>&lt;P&gt;https://supportforums.cisco.com/discussion/13330246/asa-5505-5506-replacement-using-5506-bridged-switched-ports-and-vpn-98x&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 11 Jul 2017 08:54:09 GMT</pubDate>
    <dc:creator>Michael Braun</dc:creator>
    <dc:date>2017-07-11T08:54:09Z</dc:date>
    <item>
      <title>5506-X bridge-group no comm to outside</title>
      <link>https://community.cisco.com/t5/network-security/5506-x-bridge-group-no-comm-to-outside/m-p/3008891#M146053</link>
      <description>&lt;P&gt;I'm trying to deal with the awful 5506-X firewall (and 5506H version). We brought them up to code version 9.7.1 and I tested with multiple devices; was able to reach the gateway (interface BVI1) from any device plugged in to a port in the bridge group. Unfortunately, I forgot to test getting from the bridge group to the outside. I tried putting one in production and it didn't work. I got a message stating "unable to locate egress interface" while pinging, and no traffic at all would get from the outside interface to the inside. The firewall itself couldn't even ping a device on a port in the bridge group. I wasn't able to test FROM the device, as it is an industrial control device and has no user interface.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Here's some of the config used:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;interface bvi1&lt;BR /&gt; description SCADA&lt;BR /&gt; nameif SCADA&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 10.xxx.5.1 255.255.255.0&lt;BR /&gt; no shut&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt; description&amp;nbsp;TO CORE SWITCH&lt;BR /&gt; nameif BUSINESS&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.xxx.2.245 255.255.255.248&lt;BR /&gt; no shut&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt; description SCADA&lt;BR /&gt; no nameif&lt;BR /&gt; security-level 0&lt;BR /&gt; bridge-group 1&lt;BR /&gt; no shut&lt;BR /&gt;!&lt;BR /&gt;route BUSINESS 0.0.0.0 0.0.0.0 10.xxx.2.241&lt;BR /&gt;!&lt;/PRE&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;(&lt;/STRONG&gt;&lt;/EM&gt;&lt;STRONG&gt;^Switch is a L3 3560CG with an SVI addressed as 10.xxx.2.241 255.255.255.248 and&lt;/STRONG&gt;&lt;EM&gt;&lt;STRONG&gt; ip route 10.xxx.5.0 255.255.255.0&lt;/STRONG&gt;&lt;/EM&gt;&lt;STRONG&gt; 10.xxx.2.245, EIGRP running with&amp;nbsp;&lt;EM&gt;redistribute static&lt;/EM&gt;&lt;/STRONG&gt;&lt;STRONG&gt;)&lt;/STRONG&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;access-list BUSINESS_IN extended permit ip any any log&lt;BR /&gt;access-list BUSINESS_IN extended permit icmp any any log&lt;BR /&gt;access-list SCADA_IN extended permit ip any any log&lt;BR /&gt;access-list SCADA_IN extended permit icmp any any log&lt;BR /&gt;access-group BUSINESS_IN in interface BUSINESS&lt;BR /&gt;access-group SCADA_IN in interface SCADA&lt;/PRE&gt;
&lt;P&gt;----------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This is a testing period before implementing rules, so we're just allowing everything for now.&lt;/P&gt;
&lt;P&gt;When I remove the bridge group setup and just put the config from BVI1 on Gig1/2 instead, everything works fine when a single node or a switch is plugged in to Gig1/2.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have 10+ small sites that need this config on the 5506 and am under major pressure to get them going like yesterday. Any suggestions?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:00:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5506-x-bridge-group-no-comm-to-outside/m-p/3008891#M146053</guid>
      <dc:creator>Jason Vanlandingham</dc:creator>
      <dc:date>2019-03-12T09:00:44Z</dc:date>
    </item>
    <item>
      <title>I got it figured out, and it</title>
      <link>https://community.cisco.com/t5/network-security/5506-x-bridge-group-no-comm-to-outside/m-p/3008892#M146054</link>
      <description>&lt;P&gt;I got it figured out, and it is a mess. Each port has to have a nameif, but you can't put a port in the bridge group if it has a nameif, so you have to...&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;no nameif&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif &lt;EM&gt;BLAH&lt;BR /&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/PRE&gt;
&lt;P&gt;AND THEN you have to repeat your access groups for EVERY port, AND THEN allow same zone traffic...&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;INT G1/2&lt;BR /&gt; DESC SCADA_1&lt;BR /&gt; BRIDGE-GROUP 1&lt;BR /&gt; NAMEIF SCADA_1&lt;BR /&gt; security-level 0&lt;BR /&gt; NO SHUT&lt;BR /&gt;!&lt;BR /&gt;INT G1/3&lt;BR /&gt; DESC SCADA_2&lt;BR /&gt; BRIDGE-GROUP 1&lt;BR /&gt; NAMEIF SCADA_2&lt;BR /&gt; security-level 0&lt;BR /&gt; NO SHUT&lt;BR /&gt;!&lt;BR /&gt;INT G1/4&lt;BR /&gt; DESC SCADA_3&lt;BR /&gt; BRIDGE-GROUP 1&lt;BR /&gt; NAMEIF SCADA_3&lt;BR /&gt; security-level 0&lt;BR /&gt; NO SHUT&lt;BR /&gt;!&lt;BR /&gt;access-group SCADA_IN in interface SCADA&lt;BR /&gt;access-group SCADA_IN in interface SCADA_1&lt;BR /&gt;access-group SCADA_IN in interface SCADA_2&lt;BR /&gt;access-group SCADA_IN in interface SCADA_3&lt;BR /&gt;!&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;/PRE&gt;</description>
      <pubDate>Fri, 10 Mar 2017 16:33:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5506-x-bridge-group-no-comm-to-outside/m-p/3008892#M146054</guid>
      <dc:creator>Jason Vanlandingham</dc:creator>
      <dc:date>2017-03-10T16:33:02Z</dc:date>
    </item>
    <item>
      <title>Hi Jason - did you get your</title>
      <link>https://community.cisco.com/t5/network-security/5506-x-bridge-group-no-comm-to-outside/m-p/3008893#M146055</link>
      <description>&lt;P&gt;Hi Jason - did you get your NAT to work with the multiple interfaces and use PAT to outside interface?&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2017 21:13:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5506-x-bridge-group-no-comm-to-outside/m-p/3008893#M146055</guid>
      <dc:creator>jxplon08870</dc:creator>
      <dc:date>2017-06-09T21:13:25Z</dc:date>
    </item>
    <item>
      <title>https://supportforums.cisco</title>
      <link>https://community.cisco.com/t5/network-security/5506-x-bridge-group-no-comm-to-outside/m-p/3008894#M146057</link>
      <description>&lt;P&gt;https://supportforums.cisco.com/discussion/13330246/asa-5505-5506-replacement-using-5506-bridged-switched-ports-and-vpn-98x&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2017 08:54:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5506-x-bridge-group-no-comm-to-outside/m-p/3008894#M146057</guid>
      <dc:creator>Michael Braun</dc:creator>
      <dc:date>2017-07-11T08:54:09Z</dc:date>
    </item>
    <item>
      <title>Been a while since I came</title>
      <link>https://community.cisco.com/t5/network-security/5506-x-bridge-group-no-comm-to-outside/m-p/3008895#M146058</link>
      <description>&lt;P&gt;Been a while since I came back here. Fast paced so I really moved on after working this out. I actually didn't need to do any NAT/PAT. This was entirely on a private network...microwave links shooting 30 miles out in to the middle of nowhere, etc.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jul 2017 13:39:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5506-x-bridge-group-no-comm-to-outside/m-p/3008895#M146058</guid>
      <dc:creator>Jason Vanlandingham</dc:creator>
      <dc:date>2017-07-25T13:39:04Z</dc:date>
    </item>
    <item>
      <title>Wow. I'm SO glad I didn't</title>
      <link>https://community.cisco.com/t5/network-security/5506-x-bridge-group-no-comm-to-outside/m-p/3008896#M146059</link>
      <description>&lt;P&gt;Wow. I'm SO glad I didn't have to do any of that stuff...no VPN, no NAT/PAT, no DHCP for devices behind the firewall, ssh/https to the non-bridged interface only. I actually left that project before 9.8 came out...that's life in contracting.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jul 2017 13:41:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/5506-x-bridge-group-no-comm-to-outside/m-p/3008896#M146059</guid>
      <dc:creator>Jason Vanlandingham</dc:creator>
      <dc:date>2017-07-25T13:41:54Z</dc:date>
    </item>
  </channel>
</rss>

