<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Here goes: in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5506x-traffic-flow-between-interfaces/m-p/2902958#M157087</link>
    <description>&lt;P&gt;Here goes:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;4 packets captured&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 22:27:29.674907&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.1 &amp;gt; 192.168.5.10: icmp: echo request&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 22:27:34.244814&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.1 &amp;gt; 192.168.5.10: icmp: echo request&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 22:27:39.252809&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.1 &amp;gt; 192.168.5.10: icmp: echo request&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 4: 22:27:44.244387&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.1 &amp;gt; 192.168.5.10: icmp: echo request&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Makes me go bonkers, Marius. Never observed anything similar before.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Jul 2016 20:31:36 GMT</pubDate>
    <dc:creator>OldSchoolTechie</dc:creator>
    <dc:date>2016-07-12T20:31:36Z</dc:date>
    <item>
      <title>ASA 5506X Traffic flow between interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506x-traffic-flow-between-interfaces/m-p/2902944#M157055</link>
      <description>&lt;P&gt;Dear all,&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I am on 9.6 and trying to get traffic flowing between two interfaces. These have the same security level and are permitted to talk&lt;BR /&gt;using same-sec intra|inter. There is no routing in place, meaning everything is directly connected. To cut it short, here's the layout:&lt;BR /&gt;inside=192.168.1.254; LTE=192.168.5.1; outside has public WAN IP. I want to establish traffic between inside and LTE as a&lt;BR /&gt;prerequisite for PBR. &lt;BR /&gt;&lt;BR /&gt;Symptom:&lt;BR /&gt;&lt;BR /&gt;I seem to be unable to get past the interface, that is - i CAN ping from "LTE" to hosts in that segment (and of course within "inside" as well).ICMP is permitted, yes - but I cannot get a ping across these.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;There is no ACL on any interface (as per the docs, you don't need it if you have the same sec-level in place).&lt;BR /&gt;There is NAT exemption in place for 192.168.5.0 against the inside and outside and itself in place, as well for a few VPN pools and subnets (all fine). The packet tracer reveals the following, and I am at my wits end......perhaps s/o can have a look into it.&lt;BR /&gt;&lt;BR /&gt;packet-tracer input inside tcp 192.168.1.254 http 192.168.5.10 http......&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 192.168.5.10 using egress ifc&amp;nbsp; LTE&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,LTE) source static inside_net inside_net destination static LTE LTE no-proxy-arp route-lookup&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface LTE&lt;BR /&gt;Untranslate 192.168.5.10/80 to 192.168.5.10/80&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: SUBOPTIMAL-LOOKUP&lt;BR /&gt;Subtype: suboptimal next-hop&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;ifc selected is not same as preferred ifc&lt;BR /&gt;Doing route lookup again on ifc&amp;nbsp; inside&lt;BR /&gt;&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 192.168.1.254 using egress ifc&amp;nbsp; inside&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;output-interface: LTE&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;TIA+Brgds,&lt;BR /&gt;&lt;BR /&gt;Dan&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:00:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506x-traffic-flow-between-interfaces/m-p/2902944#M157055</guid>
      <dc:creator>OldSchoolTechie</dc:creator>
      <dc:date>2019-03-12T08:00:07Z</dc:date>
    </item>
    <item>
      <title>First off, you do not need to</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506x-traffic-flow-between-interfaces/m-p/2902945#M157057</link>
      <description>&lt;P&gt;First off, you do not need to have the NAT exempt, infact I would remove the inside to LTE NAT exempt all together.&lt;/P&gt;
&lt;P&gt;Could you post a full running config (remember to remove any public IPs, usernames and passwords)?&lt;/P&gt;
&lt;P&gt;you are correct in stating that you should not need an ACL on the interface if you have the same-security-traffic permit inter-interface (between two interfaces with same security level) and same-security-traffic permit intra-interface (hairpinning traffic on a single interface regardless of security level).&lt;/P&gt;
&lt;P&gt;do the two subnets connect to the same switch?&lt;/P&gt;
&lt;P&gt;does the switch have vlans configured with IPs in the two VLANs? &amp;nbsp;If so are these VLANs in different VRFs?&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jul 2016 20:19:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506x-traffic-flow-between-interfaces/m-p/2902945#M157057</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-07-07T20:19:51Z</dc:date>
    </item>
    <item>
      <title>Marius,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506x-traffic-flow-between-interfaces/m-p/2902946#M157061</link>
      <description>&lt;P&gt;Marius,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;first off, thanks for taking your time for looking into that, really appreciate it.&lt;/P&gt;
&lt;P&gt;Here's a sanitized running config. I posted the main Networking part which I suspect to contain the culprit.&amp;nbsp;The crypto stuff and the likes of ssh etc. were omitted for reasons of clarity. I initially spoke of PBR which is configured here but not "switched on" an Interface because I lack the requirements for it; PBR would direct packets to a dead end.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Background Info, also answering your questions:&lt;/P&gt;
&lt;P&gt;192.168.[3,4,7].0 are remote VPN Networks.&lt;/P&gt;
&lt;P&gt;192.168.1.0/24 is the&amp;nbsp; inside. Hangs off a small GiE Switch.&lt;/P&gt;
&lt;P&gt;192.168.5.0 is the LTE Segment.&lt;/P&gt;
&lt;P&gt;The LTE unit is wired using CAT6 cable straight 1:1 to giE3/1. &lt;SPAN style="text-decoration: underline;"&gt;No&lt;/SPAN&gt; switching here.&lt;/P&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;ASA Version 9.5(2)&lt;BR /&gt;!&lt;BR /&gt;hostname ******&lt;/DIV&gt;
&lt;DIV&gt;domain-name *******&lt;/DIV&gt;
&lt;DIV&gt;enable password ******************&lt;/DIV&gt;
&lt;DIV&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq Domain&lt;BR /&gt;names&lt;BR /&gt;ip local pool vpn_clientpool 172.16.4.1-172.16.4.10 mask 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;pppoe client vpdn group ******&lt;BR /&gt;&amp;nbsp;ip address pppoe setroute&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;&amp;nbsp;nameif LTE&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.5.1 255.255.255.0&lt;BR /&gt;!&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;[snip]&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;ftp mode passive&lt;BR /&gt;clock timezone CEST 1&lt;BR /&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;name-server 192.168.1.2&lt;BR /&gt;&amp;nbsp;domain-name armato.de&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network *****&lt;BR /&gt;&amp;nbsp;host 192.168.1.2&lt;BR /&gt;object network inside_net&lt;BR /&gt;&amp;nbsp;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network vpn_clientpool&lt;BR /&gt;&amp;nbsp;subnet 172.16.4.0 255.255.255.0&lt;BR /&gt;object network jt_net&lt;BR /&gt;&amp;nbsp;subnet 192.168.2.0 255.255.255.0&lt;BR /&gt;object network cg_net&lt;BR /&gt;&amp;nbsp;subnet 192.168.4.0 255.255.255.0&lt;BR /&gt;object network cg_net_li&lt;BR /&gt;&amp;nbsp;subnet 192.168.7.0 255.255.255.0&lt;BR /&gt;object network LTE&lt;BR /&gt;&amp;nbsp;subnet 192.168.5.0 255.255.255.0&lt;BR /&gt;object network&amp;nbsp;*******************&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;host 192.168.1.1&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;BR /&gt;access-list VPN_Inside remark *****&lt;BR /&gt;access-list VPN_Inside standard permit 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list L2l extended permit ip object inside_net object jt_net&lt;BR /&gt;access-list L2l extended permit ip object inside_net object cg_net&lt;BR /&gt;access-list L2l extended permit ip object inside_net object cg_net_li&lt;BR /&gt;access-list LocalLanAccess standard permit 192.168.4.0 255.255.255.0&lt;BR /&gt;access-list LocalLanAccess standard permit 172.16.4.0 255.255.255.0&lt;BR /&gt;access-list LocalLanAccess standard permit 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list LocalLanAccess standard permit 192.168.7.0 255.255.255.0&lt;BR /&gt;access-list LocalLanAccess standard permit 192.168.5.0 255.255.255.0&lt;BR /&gt;access-list LTE_WAN extended permit tcp host 192.168.1.1 any eq www&lt;BR /&gt;access-list LTE_WAN extended permit tcp host 192.168.1.1 any eq https&lt;BR /&gt;pager lines 24&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;BR /&gt;nat (inside,outside) source static inside_net inside_net destination static vpn_clientpool vpn_clientpool no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static inside_net inside_net destination static jt_net jt_net no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static inside_net inside_net destination static cg_net cg_net no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static inside_net inside_net destination static cg_net_li cg_net_li no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,LTE) source static inside_net inside_net destination static LTE LTE no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (any,outside) dynamic interface&lt;BR /&gt;object network inside_net&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface dns&lt;BR /&gt;!&lt;BR /&gt;route-map LTE permit 10&lt;BR /&gt;&amp;nbsp;match ip address LTE_WAN&lt;BR /&gt;&amp;nbsp;set ip next-hop verify-availability 192.168.5.10 1 track 1&lt;BR /&gt;&amp;nbsp;set interface LTE&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 08 Jul 2016 06:59:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506x-traffic-flow-between-interfaces/m-p/2902946#M157061</guid>
      <dc:creator>OldSchoolTechie</dc:creator>
      <dc:date>2016-07-08T06:59:28Z</dc:date>
    </item>
    <item>
      <title>You have some accessories</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506x-traffic-flow-between-interfaces/m-p/2902947#M157064</link>
      <description>&lt;P&gt;You have some accessories lists configured. Are you sure that the LTE-WAN acl is not assigned to the LTE interface?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jul 2016 09:59:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506x-traffic-flow-between-interfaces/m-p/2902947#M157064</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-07-08T09:59:21Z</dc:date>
    </item>
    <item>
      <title>As you can see, there is no</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506x-traffic-flow-between-interfaces/m-p/2902948#M157068</link>
      <description>&lt;P&gt;As you can see, there is no access-group on the Interface - that means no ACL is in effect. The LTE_WAN ACL you see is intended for PBR control.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jul 2016 10:42:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506x-traffic-flow-between-interfaces/m-p/2902948#M157068</guid>
      <dc:creator>OldSchoolTechie</dc:creator>
      <dc:date>2016-07-08T10:42:02Z</dc:date>
    </item>
    <item>
      <title>your packet-tracer is</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506x-traffic-flow-between-interfaces/m-p/2902949#M157069</link>
      <description>&lt;P&gt;your packet-tracer is incorrect. &amp;nbsp;You are using a source IP of the inside interface which is why it is failing. &amp;nbsp;try it using 192.168.1.10 for example.&lt;/P&gt;
&lt;P&gt;How are you testing traffic between the two subnets? &amp;nbsp;Ping?&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;--&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please remember to select a correct answer and rate helpful posts&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jul 2016 14:52:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506x-traffic-flow-between-interfaces/m-p/2902949#M157069</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-07-08T14:52:57Z</dc:date>
    </item>
    <item>
      <title>Marius, you cannot use the PT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506x-traffic-flow-between-interfaces/m-p/2902950#M157072</link>
      <description>&lt;P&gt;Marius, you cannot use the PT on Interfaces other than those you have on the Hardware; to my Knowledge it is unable to intercept stuff coming thru the ASA.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Anyway, testing back and forth using ping between LTE and inside -&amp;gt; no avail.&lt;/P&gt;
&lt;P&gt;And yes, ICMP is permitted.&lt;/P&gt;</description>
      <pubDate>Sat, 09 Jul 2016 08:59:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506x-traffic-flow-between-interfaces/m-p/2902950#M157072</guid>
      <dc:creator>OldSchoolTechie</dc:creator>
      <dc:date>2016-07-09T08:59:41Z</dc:date>
    </item>
    <item>
      <title>First off packet-tracer only</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506x-traffic-flow-between-interfaces/m-p/2902951#M157075</link>
      <description>&lt;P&gt;First off packet-tracer only simulates a packet passing through the ASA and because traffic can not be simulated using an ASA asigned IP you need to use a different IP than that is configured on the ASA interface.&lt;/P&gt;
&lt;P&gt;If these are Windows machines have you turned off the windows firewall while testing?&lt;/P&gt;
&lt;P&gt;Please post the packet tracer output using IPs other than that is configured on the ASA interfaces.&lt;/P&gt;
&lt;P&gt;If this still fails and windows firewall is turned off please post a full running config of your ASA.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sat, 09 Jul 2016 09:22:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506x-traffic-flow-between-interfaces/m-p/2902951#M157075</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-07-09T09:22:17Z</dc:date>
    </item>
    <item>
      <title>Sorry for being late re. the</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506x-traffic-flow-between-interfaces/m-p/2902952#M157077</link>
      <description>&lt;P&gt;Sorry for being late re. the weekend.&lt;/P&gt;
&lt;P&gt;Please find below what the PT yields. Interesting enough - upon pinging manually - I can observe (using deb ic tr ) only the request from .1.2 to 5.10 but nothing comes back. Pinging from 5.1. to 5.10 yields request &lt;STRONG&gt;and&lt;/STRONG&gt; reply. And yes, the windows F/W is of course off (deactivated) and no other security software is out there.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;packet-tracer input inside icmp 192.168.1.2 8 0 192.168.5.10 detailed&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 192.168.5.10 using egress ifc&amp;nbsp; LTE&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,LTE) source static inside_net inside_net destination static LTE LTE no-proxy-arp route-lookup&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface LTE&lt;BR /&gt;Untranslate 192.168.5.10/0 to 192.168.5.10/0&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 192.168.1.2 using egress ifc&amp;nbsp; inside&lt;BR /&gt;&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,LTE) source static inside_net inside_net destination static LTE LTE no-proxy-arp route-lookup&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 192.168.1.2/0 to 192.168.1.2/0&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fe99f7d2a60, priority=6, domain=nat, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=14, user_data=0x7fe9a0f68610, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=192.168.1.0, mask=255.255.255.0, port=0, tag=any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=192.168.5.0, mask=255.255.255.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=LTE&lt;BR /&gt;&lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fe9a0e40510, priority=2, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=26, user_data=0x0, cs_id=0x0, flags=0x3000, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fe99ec89c40, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=624702, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fe99f77c9c0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=258460, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 8&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fe99f77c1d0, priority=66, domain=inspect-icmp-error, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3717, user_data=0x7fe99f77b740, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 9&lt;BR /&gt;Type: DEBUG-ICMP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fe9a0cf3030, priority=13, domain=debug-icmp-trace, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3715, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 10&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,LTE) source static inside_net inside_net destination static LTE LTE no-proxy-arp route-lookup&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0x7fe9a1123a50, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=15, user_data=0x7fe9a0f6c0a0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=192.168.1.0, mask=255.255.255.0, port=0, tag=any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=192.168.5.0, mask=255.255.255.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=LTE&lt;BR /&gt;&lt;BR /&gt;Phase: 11&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0x7fe9a0ce3330, priority=0, domain=user-statistics, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=111, user_data=0x7fe9a06910d0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=LTE&lt;BR /&gt;&lt;BR /&gt;Phase: 12&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 308937, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_dbg_icmp&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;BR /&gt;&lt;BR /&gt;Module information for reverse flow ...&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;output-interface: LTE&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jul 2016 14:31:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506x-traffic-flow-between-interfaces/m-p/2902952#M157077</guid>
      <dc:creator>OldSchoolTechie</dc:creator>
      <dc:date>2016-07-11T14:31:09Z</dc:date>
    </item>
    <item>
      <title>Please post a full running</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506x-traffic-flow-between-interfaces/m-p/2902953#M157079</link>
      <description>&lt;P&gt;Please post a full running config (please remember to remove any public IPs, usernames and passwords).&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jul 2016 20:32:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506x-traffic-flow-between-interfaces/m-p/2902953#M157079</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-07-11T20:32:31Z</dc:date>
    </item>
    <item>
      <title>Here goes; crypto certs</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506x-traffic-flow-between-interfaces/m-p/2902954#M157081</link>
      <description>&lt;DIV&gt;Here goes; crypto certs omitted, remainder is anonymized.&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;names&lt;BR /&gt;ip local pool vpn_clientpool 172.16.4.1-172.16.4.10 mask 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;pppoe client vpdn group [SNIP]&lt;BR /&gt;&amp;nbsp;ip address pppoe setroute&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;&amp;nbsp;nameif LTE&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.5.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CEST 1&lt;BR /&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;name-server 192.168.1.2&lt;BR /&gt;&amp;nbsp;domain-name [SNIP].de&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network W2K8SBS&lt;BR /&gt;&amp;nbsp;host 192.168.1.2&lt;BR /&gt;object network inside_net&lt;BR /&gt;&amp;nbsp;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network vpn_clientpool&lt;BR /&gt;&amp;nbsp;subnet 172.16.4.0 255.255.255.0&lt;BR /&gt;object network jt_net&lt;BR /&gt;&amp;nbsp;subnet 192.168.2.0 255.255.255.0&lt;BR /&gt;object network cg_net&lt;BR /&gt;&amp;nbsp;subnet 192.168.4.0 255.255.255.0&lt;BR /&gt;object network cg_net_li&lt;BR /&gt;&amp;nbsp;subnet 192.168.7.0 255.255.255.0&lt;BR /&gt;object network LTE&lt;BR /&gt;&amp;nbsp;subnet 192.168.5.0 255.255.255.0&lt;BR /&gt;object network W2K8TSSERV&lt;BR /&gt;&amp;nbsp;host 192.168.1.1&lt;BR /&gt;object-group service [SNIP]_Outside tcp&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;access-list VPN_Inside remark [SNIP] Userland&lt;BR /&gt;access-list VPN_Inside standard permit 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list L2l extended permit ip object inside_net object jt_net&lt;BR /&gt;access-list L2l extended permit ip object inside_net object cg_net&lt;BR /&gt;access-list L2l extended permit ip object inside_net object cg_net_li&lt;BR /&gt;access-list LocalLanAccess standard permit 192.168.4.0 255.255.255.0&lt;BR /&gt;access-list LocalLanAccess standard permit 172.16.4.0 255.255.255.0&lt;BR /&gt;access-list LocalLanAccess standard permit 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list LocalLanAccess standard permit 192.168.7.0 255.255.255.0&lt;BR /&gt;access-list LocalLanAccess standard permit 192.168.5.0 255.255.255.0&lt;BR /&gt;access-list LTE_WAN extended permit tcp host 192.168.1.1 any eq www&lt;BR /&gt;access-list LTE_WAN extended permit tcp host 192.168.1.1 any eq https&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging console debugging&lt;BR /&gt;logging trap errors&lt;BR /&gt;logging asdm notifications&lt;BR /&gt;mtu outside 1492&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu LTE 1500&lt;BR /&gt;ip verify reverse-path interface outside&lt;BR /&gt;ip verify reverse-path interface inside&lt;BR /&gt;ip audit name [SNIP]_Outside attack action alarm drop&lt;BR /&gt;ip audit interface outside [SNIP]_Outside&lt;BR /&gt;ip audit attack action alarm drop&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;icmp permit any LTE&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,outside) source static inside_net inside_net destination static vpn_clientpool vpn_clientpool no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static inside_net inside_net destination static jt_net jt_net no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static inside_net inside_net destination static cg_net cg_net no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static inside_net inside_net destination static cg_net_li cg_net_li no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,LTE) source static inside_net inside_net destination static LTE LTE no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (any,outside) dynamic interface&lt;BR /&gt;object network inside_net&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface dns&lt;BR /&gt;!&lt;BR /&gt;route-map LTE permit 10&lt;BR /&gt;&amp;nbsp;match ip address LTE_WAN&lt;BR /&gt;&amp;nbsp;set ip next-hop verify-availability 192.168.5.10 1 track 1&lt;BR /&gt;&amp;nbsp;set interface LTE&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;!&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;aaa-server [SNIP] protocol radius&lt;BR /&gt;aaa-server [SNIP] (inside) host 192.168.1.2&lt;BR /&gt;&amp;nbsp;key *****&lt;BR /&gt;&amp;nbsp;radius-common-pw [SNIP]&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication telnet console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.0.0 255.255.0.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;sysopt noproxyarp inside&lt;BR /&gt;sla monitor 1&lt;BR /&gt;&amp;nbsp;type echo protocol ipIcmpEcho 192.168.5.1 interface LTE&lt;BR /&gt;&amp;nbsp;frequency 10&lt;BR /&gt;sla monitor schedule 1 life forever start-time now&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec ikev1 transform-set ARM_0 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ARM_1 esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ARM_2 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ARM_3 esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto dynamic-map ARM_MAP 65535 set pfs&lt;BR /&gt;crypto dynamic-map ARM_MAP 65535 set ikev1 transform-set ARM_0 ARM_1 ARM_2 ARM_3&lt;BR /&gt;crypto dynamic-map ARM_MAP 65535 set reverse-route&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic ARM_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto ca trustpoint [SNIP].[SNIP].de&lt;BR /&gt;&amp;nbsp;fqdn [SNIP].[SNIP].de&lt;BR /&gt;&amp;nbsp;subject-name CN=[SNIP].[SNIP].de,OU=IT,O=[SNIP] ... [SNIP]&lt;BR /&gt;&amp;nbsp;keypair [SNIP].[SNIP].de&lt;BR /&gt;&amp;nbsp;crl configure&lt;BR /&gt;crypto ca trustpoint primary_rootca&lt;BR /&gt;&amp;nbsp;enrollment terminal&lt;BR /&gt;&amp;nbsp;crl configure&lt;BR /&gt;crypto ca trustpoint secondary_rootca&lt;BR /&gt;&amp;nbsp;enrollment terminal&lt;BR /&gt;&amp;nbsp;fqdn [SNIP].[SNIP].[SNIP]&lt;BR /&gt;&amp;nbsp;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 5&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash md5&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;client-update enable&lt;BR /&gt;!&lt;BR /&gt;track 1 rtr 1 reachability&lt;BR /&gt;telnet 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;ssh 192.168.3.0 255.255.255.0 inside&lt;BR /&gt;ssh 192.168.2.0 255.255.255.0 inside&lt;BR /&gt;ssh 192.168.7.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 30&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;vpdn group [SNIP] request dialout pppoe&lt;BR /&gt;vpdn group [SNIP] localname [SNIP] &lt;BR /&gt;vpdn group [SNIP] ppp authentication pap&lt;BR /&gt;vpdn username [SNIP] password [SNIP] store-local&lt;BR /&gt;no vpn-addr-assign aaa&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics host&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 206.246.122.250 source outside prefer&lt;BR /&gt;ssl cipher default custom "RC4-SHA:AES256-SHA:DES-CBC3-SHA"&lt;BR /&gt;ssl cipher tlsv1 custom "RC4-SHA:AES256-SHA:DES-CBC3-SHA"&lt;BR /&gt;ssl cipher dtlsv1 custom "RC4-SHA:AES256-SHA:DES-CBC3-SHA"&lt;BR /&gt;ssl trust-point [SNIP].[SNIP].de outside&lt;BR /&gt;ssl trust-point [SNIP].[SNIP].de inside&lt;BR /&gt;webvpn&lt;BR /&gt;&amp;nbsp;enable outside&lt;BR /&gt;&amp;nbsp;anyconnect image disk0:/anyconnect-win-3.1.12020-k9.pkg 1&lt;BR /&gt;&amp;nbsp;anyconnect enable&lt;BR /&gt;&amp;nbsp;tunnel-group-list enable&lt;BR /&gt;&amp;nbsp;cache&lt;BR /&gt;&amp;nbsp; disable&lt;BR /&gt;&amp;nbsp;error-recovery disable&lt;BR /&gt;group-policy [SNIP]policy internal&lt;BR /&gt;group-policy [SNIP]policy attributes&lt;BR /&gt;&amp;nbsp;dns-server value 192.168.1.2&lt;BR /&gt;&amp;nbsp;vpn-simultaneous-logins 5&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ikev1 ssl-client ssl-clientless&lt;BR /&gt;&amp;nbsp;group-lock value [SNIP]_mobility&lt;BR /&gt;&amp;nbsp;pfs enable&lt;BR /&gt;&amp;nbsp;split-tunnel-policy tunnelspecified&lt;BR /&gt;&amp;nbsp;split-tunnel-network-list value LocalLanAccess&lt;BR /&gt;&amp;nbsp;split-dns value firma.local&lt;BR /&gt;&amp;nbsp;intercept-dhcp enable&lt;BR /&gt;&amp;nbsp;webvpn&lt;BR /&gt;&amp;nbsp; anyconnect modules value dart vpngina&lt;BR /&gt;&amp;nbsp; anyconnect ask none default anyconnect&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username [SNIP] password [SNIP] encrypted privilege 15&lt;BR /&gt;tunnel-group DefaultL2LGroup ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;tunnel-group [SNIP]_mobility type remote-access&lt;BR /&gt;tunnel-group [SNIP]_mobility general-attributes&lt;BR /&gt;&amp;nbsp;address-pool vpn_clientpool&lt;BR /&gt;&amp;nbsp;authentication-server-group [SNIP]&lt;BR /&gt;&amp;nbsp;authentication-server-group (outside) [SNIP]&lt;BR /&gt;&amp;nbsp;default-group-policy [SNIP]policy&lt;BR /&gt;&amp;nbsp;password-management&lt;BR /&gt;tunnel-group [SNIP]_mobility webvpn-attributes&lt;BR /&gt;&amp;nbsp;group-alias 1 disable&lt;BR /&gt;&amp;nbsp;group-alias [SNIP]_mobility enable&lt;BR /&gt;tunnel-group [SNIP]_mobility ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;tunnel-group [SNIP]_mobility ppp-attributes&lt;BR /&gt;&amp;nbsp;no authentication chap&lt;BR /&gt;&amp;nbsp;no authentication ms-chap-v1&lt;BR /&gt;tunnel-group 192.168.2.0 type ipsec-l2l&lt;BR /&gt;tunnel-group 192.168.2.0 ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;tunnel-group 192.168.7.0 type ipsec-l2l&lt;BR /&gt;tunnel-group 192.168.7.0 ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;&amp;nbsp; id-randomization&lt;BR /&gt;&amp;nbsp; id-mismatch action log&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; user-statistics accounting&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;/DIV&gt;</description>
      <pubDate>Tue, 12 Jul 2016 08:38:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506x-traffic-flow-between-interfaces/m-p/2902954#M157081</guid>
      <dc:creator>OldSchoolTechie</dc:creator>
      <dc:date>2016-07-12T08:38:13Z</dc:date>
    </item>
    <item>
      <title>Add the following:</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506x-traffic-flow-between-interfaces/m-p/2902955#M157083</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Add the following:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;policy-map global_policy&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;class inspection_default&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; &amp;nbsp;inspect icmp&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Then you should be able to ping between the two subnets.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;--&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please remember to select a correct answer and rate helpful posts&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jul 2016 19:15:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506x-traffic-flow-between-interfaces/m-p/2902955#M157083</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-07-12T19:15:50Z</dc:date>
    </item>
    <item>
      <title>FAIL. Same behavior as before</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506x-traffic-flow-between-interfaces/m-p/2902956#M157085</link>
      <description>&lt;P&gt;FAIL. Same behavior as before. Can observe request, no echo (from 192.168.1.1 -&amp;gt; 5.10 ), can observe request AND echo from 5.1. to 5.10&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jul 2016 20:00:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506x-traffic-flow-between-interfaces/m-p/2902956#M157085</guid>
      <dc:creator>OldSchoolTechie</dc:creator>
      <dc:date>2016-07-12T20:00:36Z</dc:date>
    </item>
    <item>
      <title>set up a capture on the LTE</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506x-traffic-flow-between-interfaces/m-p/2902957#M157086</link>
      <description>&lt;P&gt;set up a capture on the LTE interface.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;cap CAPLTE interface LTE match ip host 192.168.1.1 host 192.168.5.10&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If you see the the packet exit the LTE inter face i.e you see an entry for 192.168.1.1 towards 192.168.5.10 but nothing coming back then the issue is on 192.168.5.10 or the network between this PC/server and the ASA.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jul 2016 20:16:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506x-traffic-flow-between-interfaces/m-p/2902957#M157086</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-07-12T20:16:02Z</dc:date>
    </item>
    <item>
      <title>Here goes:</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506x-traffic-flow-between-interfaces/m-p/2902958#M157087</link>
      <description>&lt;P&gt;Here goes:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;4 packets captured&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 22:27:29.674907&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.1 &amp;gt; 192.168.5.10: icmp: echo request&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 22:27:34.244814&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.1 &amp;gt; 192.168.5.10: icmp: echo request&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 22:27:39.252809&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.1 &amp;gt; 192.168.5.10: icmp: echo request&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 4: 22:27:44.244387&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.1 &amp;gt; 192.168.5.10: icmp: echo request&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Makes me go bonkers, Marius. Never observed anything similar before.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jul 2016 20:31:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506x-traffic-flow-between-interfaces/m-p/2902958#M157087</guid>
      <dc:creator>OldSchoolTechie</dc:creator>
      <dc:date>2016-07-12T20:31:36Z</dc:date>
    </item>
    <item>
      <title>And there I fixed it.</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506x-traffic-flow-between-interfaces/m-p/2902959#M157088</link>
      <description>&lt;P&gt;And there I fixed it.&lt;/P&gt;
&lt;P&gt;The culprit was:&lt;/P&gt;
&lt;P&gt;recursive next hop statement on policy&lt;/P&gt;
&lt;P&gt;missing dynamic NAT entry from inside_net object to LTE.&lt;/P&gt;
&lt;P&gt;Complete IP Stack works, 80/443 nicely separated and delivering a fair 120 MBit downstream as opposed to 3 before.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jul 2016 23:00:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506x-traffic-flow-between-interfaces/m-p/2902959#M157088</guid>
      <dc:creator>OldSchoolTechie</dc:creator>
      <dc:date>2016-07-12T23:00:34Z</dc:date>
    </item>
  </channel>
</rss>

