<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic To be precise here is my in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-transparent-with-multiple-interfaces-vlans/m-p/3029162#M147533</link>
    <description>&lt;P&gt;Please refer the attached diagram.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now I need to introduce a single firewall in transparent mode without context based firewall. Two ACL's. One common ACL for two outside systems and another common &amp;nbsp;ACL for two Inside systems.&lt;/P&gt;
&lt;P&gt;How can I achieve the firewall solution?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Sat, 21 Jan 2017 15:47:15 GMT</pubDate>
    <dc:creator>avilt</dc:creator>
    <dc:date>2017-01-21T15:47:15Z</dc:date>
    <item>
      <title>ASA Transparent With Multiple Interfaces &amp; Vlans</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-with-multiple-interfaces-vlans/m-p/3029159#M147528</link>
      <description>&lt;P&gt;Can i use ASA-5525X in transparent mode with following situations&lt;/P&gt;
&lt;P&gt;1. Four interfaces in the same vlan (two inside, two outside)&lt;/P&gt;
&lt;P&gt;2. Two interfaces in one subnet and another two interfaces in another subnet&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:48:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-with-multiple-interfaces-vlans/m-p/3029159#M147528</guid>
      <dc:creator>avilt</dc:creator>
      <dc:date>2019-03-12T08:48:28Z</dc:date>
    </item>
    <item>
      <title>When running in transparent</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-with-multiple-interfaces-vlans/m-p/3029160#M147529</link>
      <description>&lt;P&gt;When running in transparent mode, all interfaces belong to one IP subnet. But you can use VLANs (to be more exact, subinterfaces that belong to a VLAN) to separate the systems&amp;nbsp;to different firewall-interfaces. That is how I run my home-office ASA. All devices and the ESX-Server are connected to one layer2-switch and belong to the same IP subnet, but all traffic between the systems (also the virtual ones) is filtered by the transparent firewall.&lt;/P&gt;
&lt;P&gt;But when running transparent, the ASA doesn't route any more.&amp;nbsp;I've never set up it that way, but as a workaround, you could convert the ASA to multiple context mode (which gives you multiple virtual firewalls) and run one context transparent and another one routed.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2017 10:25:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-with-multiple-interfaces-vlans/m-p/3029160#M147529</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2017-01-20T10:25:17Z</dc:date>
    </item>
    <item>
      <title>1. Four interfaces in the</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-with-multiple-interfaces-vlans/m-p/3029161#M147531</link>
      <description>&lt;P&gt;&lt;STRONG&gt;1. Four interfaces in the same vlan (two inside, two outside)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Having four interfaces in the same VLAN will not accomplish anything with regard to the transparent firewall. &amp;nbsp;They would still be in the same broadcast domain so traffic will actually never go through the ASA for inspection / packet filtering. &amp;nbsp;This is why you need a minimum of two VLANs for transparent firewall setup to work.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;2. Two interfaces in one subnet and another two interfaces in another subnet&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This is easily done, just create two BVI interfaces and then add each interface to the required bridge-group. &amp;nbsp;For example, you could do something like the following:&lt;/P&gt;
&lt;P&gt;interface BVI1&lt;BR /&gt;&amp;nbsp; ip address 10.10.10.1 255.255.255.0&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;interface BVI2&lt;BR /&gt;&amp;nbsp; ip address 10.10.11.1 255.255.255.0&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;int ethernet 1&lt;/P&gt;
&lt;P&gt;&amp;nbsp; security-level 100&lt;/P&gt;
&lt;P&gt;&amp;nbsp; nameif inside1&lt;/P&gt;
&lt;P&gt;&amp;nbsp; bridge-group 1&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;int ethernet 2&lt;/P&gt;
&lt;P&gt;&amp;nbsp; security-level 0&lt;/P&gt;
&lt;P&gt;&amp;nbsp; nameif outside1&lt;/P&gt;
&lt;P&gt;&amp;nbsp; bridge-group 1&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;int ethernet 3&lt;/P&gt;
&lt;P&gt;&amp;nbsp; security-level 100&lt;/P&gt;
&lt;P&gt;&amp;nbsp; nameif inside2&lt;/P&gt;
&lt;P&gt;&amp;nbsp; bridge-group 2&lt;/P&gt;
&lt;P&gt;int ethernet 4&lt;/P&gt;
&lt;P&gt;&amp;nbsp; security-level 0&lt;/P&gt;
&lt;P&gt;&amp;nbsp; nameif outside2&lt;/P&gt;
&lt;P&gt;&amp;nbsp; bridge-group 2&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 21 Jan 2017 15:11:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-with-multiple-interfaces-vlans/m-p/3029161#M147531</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-01-21T15:11:42Z</dc:date>
    </item>
    <item>
      <title>To be precise here is my</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-with-multiple-interfaces-vlans/m-p/3029162#M147533</link>
      <description>&lt;P&gt;Please refer the attached diagram.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now I need to introduce a single firewall in transparent mode without context based firewall. Two ACL's. One common ACL for two outside systems and another common &amp;nbsp;ACL for two Inside systems.&lt;/P&gt;
&lt;P&gt;How can I achieve the firewall solution?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 21 Jan 2017 15:47:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-with-multiple-interfaces-vlans/m-p/3029162#M147533</guid>
      <dc:creator>avilt</dc:creator>
      <dc:date>2017-01-21T15:47:15Z</dc:date>
    </item>
    <item>
      <title>What are system A, B, C and D</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-with-multiple-interfaces-vlans/m-p/3029163#M147537</link>
      <description>&lt;P&gt;What are system A, B, C and D? &amp;nbsp;switches, routers, PCs?&lt;/P&gt;
&lt;P&gt;you could slip the transparent firewall in between system A and systems B/C or between Systems B/C and System D. &amp;nbsp;Depending on what systems B and C are you might also be able to place it between them also.&lt;/P&gt;
&lt;P&gt;If one of the systems is a switch you could connect the ASA to the switch.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P style="padding-left: 150px;"&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 21 Jan 2017 15:47:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-with-multiple-interfaces-vlans/m-p/3029163#M147537</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-01-21T15:47:16Z</dc:date>
    </item>
    <item>
      <title>Please refer the attached</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-with-multiple-interfaces-vlans/m-p/3029164#M147538</link>
      <description>&lt;P&gt;Please refer the attached diagram in the previous thread, they are just end systems.&lt;/P&gt;
&lt;P&gt;Now I need to introduce a single firewall in transparent mode without context based firewall. Two ACL's. One common ACL for two outside systems and another common &amp;nbsp;ACL for two Inside systems.&lt;/P&gt;
&lt;P&gt;How can I achieve the firewall solution?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 21 Jan 2017 16:26:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-with-multiple-interfaces-vlans/m-p/3029164#M147538</guid>
      <dc:creator>avilt</dc:creator>
      <dc:date>2017-01-21T16:26:44Z</dc:date>
    </item>
    <item>
      <title>I am not sure if that is</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-with-multiple-interfaces-vlans/m-p/3029165#M147542</link>
      <description>&lt;P&gt;I am not sure if that is possible with two ACLs. &amp;nbsp;is using two ACLs a requirement? &amp;nbsp;The issue here is that ACLs are applied on a per interface basis or use the global ACL.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sat, 21 Jan 2017 16:56:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-with-multiple-interfaces-vlans/m-p/3029165#M147542</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-01-21T16:56:32Z</dc:date>
    </item>
    <item>
      <title>With that easy setup (looks</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-with-multiple-interfaces-vlans/m-p/3029166#M147545</link>
      <description>&lt;P&gt;With that easy setup (looks now easier then in your initial request) I would&amp;nbsp;use&amp;nbsp;four&amp;nbsp;ACLs, one per system, and each ACL controls what this device is allowed to reach.&lt;/P&gt;</description>
      <pubDate>Sat, 21 Jan 2017 17:01:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-with-multiple-interfaces-vlans/m-p/3029166#M147545</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2017-01-21T17:01:38Z</dc:date>
    </item>
    <item>
      <title>If possible I would like to</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-with-multiple-interfaces-vlans/m-p/3029167#M147549</link>
      <description>&lt;P&gt;If possible I would like to define 4 acl, each for a interface. Is it possible &amp;amp; what should be my transparent config?&lt;/P&gt;</description>
      <pubDate>Sat, 21 Jan 2017 19:24:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-with-multiple-interfaces-vlans/m-p/3029167#M147549</guid>
      <dc:creator>avilt</dc:creator>
      <dc:date>2017-01-21T19:24:13Z</dc:date>
    </item>
    <item>
      <title>You could do something like</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-with-multiple-interfaces-vlans/m-p/3029168#M147550</link>
      <description>&lt;P&gt;You could do something like the following. &amp;nbsp;just replace interface, nameif, and security levels as needed:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;conf t&lt;/P&gt;
&lt;P&gt;firewall transparent&lt;/P&gt;
&lt;P&gt;int bvi 1&lt;/P&gt;
&lt;P&gt;&amp;nbsp; ip add 192.168.10.x 255.255.255.0&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;int e1&lt;/P&gt;
&lt;P&gt;&amp;nbsp; security-level 100&lt;/P&gt;
&lt;P&gt;&amp;nbsp; nameif inside1&lt;/P&gt;
&lt;P&gt;&amp;nbsp; bridge-group 1&lt;/P&gt;
&lt;P&gt;&amp;nbsp; no shut&lt;/P&gt;
&lt;P&gt;int e2&lt;/P&gt;
&lt;P&gt;&amp;nbsp; security-level 80&lt;/P&gt;
&lt;P&gt;&amp;nbsp; nameif inside2&lt;/P&gt;
&lt;P&gt;&amp;nbsp; bridge-group 1&lt;/P&gt;
&lt;P&gt;&amp;nbsp; no shut&lt;/P&gt;
&lt;P&gt;int e3&lt;/P&gt;
&lt;P&gt;&amp;nbsp; security-level 60&lt;/P&gt;
&lt;P&gt;&amp;nbsp; nameif inside3&lt;/P&gt;
&lt;P&gt;&amp;nbsp; bridge-group 1&lt;/P&gt;
&lt;P&gt;&amp;nbsp; no shut&lt;/P&gt;
&lt;P&gt;int e4&lt;/P&gt;
&lt;P&gt;&amp;nbsp; security-level 40&lt;/P&gt;
&lt;P&gt;&amp;nbsp; nameif inside4&lt;/P&gt;
&lt;P&gt;&amp;nbsp; bridge-group 1&lt;/P&gt;
&lt;P&gt;&amp;nbsp; no shut&lt;/P&gt;
&lt;P&gt;access-list inside1_in permit ip host 192.168.10.1 any&lt;/P&gt;
&lt;P&gt;access-list inside2_in permit ip host 192.168.10.2 host 192.168.10.1&lt;/P&gt;
&lt;P&gt;access-list inside2_in permit tcp host 192.168.10.2 host 192.168.10.3 eq 80&lt;/P&gt;
&lt;P&gt;access-list inside2_in deny ip host 192.168.10.2&amp;nbsp;192.168.10.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;access-list inside2_in permit ip any any&lt;/P&gt;
&lt;P&gt;access-list inside3_in permit udp host 192.168.10.3 host 192.168.10.2 eq 53&lt;/P&gt;
&lt;P&gt;access-list inside3_in deny ip host 192.168.10.3 192.168.10.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;access-list inside3_in permit ip any any&lt;/P&gt;
&lt;P&gt;access-list inside4_in deny ip host 192.168.10.4 192.168.10.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;access-list inside4_in permit ip any any&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;access-group inside1_in in interface inside1&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-group inside2_in in interface inside2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-group inside3_in in interface inside3&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-group inside4_in in interface inside4&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;--&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please remember to select a correct answer and rate helpful posts&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 21 Jan 2017 20:33:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-with-multiple-interfaces-vlans/m-p/3029168#M147550</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-01-21T20:33:32Z</dc:date>
    </item>
  </channel>
</rss>

