<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic You don't actually mention in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/transparent-firewall-issue/m-p/2890387#M172293</link>
    <description>&lt;P&gt;You don't actually mention anything that didn't work.&lt;/P&gt;</description>
    <pubDate>Tue, 23 Feb 2016 09:13:23 GMT</pubDate>
    <dc:creator>Philip D'Ath</dc:creator>
    <dc:date>2016-02-23T09:13:23Z</dc:date>
    <item>
      <title>Transparent Firewall Issue</title>
      <link>https://community.cisco.com/t5/network-security/transparent-firewall-issue/m-p/2890385#M172286</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I recently attempted placing an ASA in my environment in transparent mode to replace a Juniper transparent firewall and ran into some issues. The way my network is designed is I have a router with the default gateway for all the networks behind the firewall, my transparent firewall, and then a switch with 3 vlans on it all on the same /24 network.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;When I tried cutting over to the ASA we were unable to test any rules. I tried checking the log viewer in ASDM but didnt see any traffic hitting the firewall. Is this normal behavior for the ASA in transparent mode?&amp;nbsp;Also, not all devices appeared to be in my arp table which had me a bit concerned.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Guess I am just trying to figure out what isn't working and why. Since ASDM wasnt showing any traffic in the log viewer I couldnt do much.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I can post example configs if anyone would feel it would be helpful.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:22:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-firewall-issue/m-p/2890385#M172286</guid>
      <dc:creator>Kyle Smith</dc:creator>
      <dc:date>2019-03-12T07:22:46Z</dc:date>
    </item>
    <item>
      <title>You just need to turn the</title>
      <link>https://community.cisco.com/t5/network-security/transparent-firewall-issue/m-p/2890386#M172290</link>
      <description>&lt;P&gt;You just need to turn the logging up if you want to see it in the ASDM. &amp;nbsp;Try:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;logging asdm informational&lt;/PRE&gt;</description>
      <pubDate>Tue, 23 Feb 2016 09:12:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-firewall-issue/m-p/2890386#M172290</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-02-23T09:12:49Z</dc:date>
    </item>
    <item>
      <title>You don't actually mention</title>
      <link>https://community.cisco.com/t5/network-security/transparent-firewall-issue/m-p/2890387#M172293</link>
      <description>&lt;P&gt;You don't actually mention anything that didn't work.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Feb 2016 09:13:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-firewall-issue/m-p/2890387#M172293</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-02-23T09:13:23Z</dc:date>
    </item>
    <item>
      <title>Philip,</title>
      <link>https://community.cisco.com/t5/network-security/transparent-firewall-issue/m-p/2890388#M172295</link>
      <description>&lt;P&gt;Philip,&lt;/P&gt;
&lt;P&gt;Thank you for your reply. My apologies, so what we had the testing team do is try and test the ACL logic based on what they previously were able to do with the Juniper firewall in place. I have 4 named interfaces; Outside, InsideA, InsideB, and InsideC. They tried to SSH to a few machines from the Outside to InsideA and weren't able to. From there, they tried other tests but nothing seemed to work.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I jumped on ASDM to check the logging and I set the level to debugging to see everything. When I did, I didnt see any traffic hit the firewall which had me concerned.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My interfaces are set up as such:&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;interface Gig0/0&lt;BR /&gt; nameif Outside&lt;BR /&gt; bridge-group 10&lt;BR /&gt; security-level 80&lt;BR /&gt;!&lt;BR /&gt;interface Gig0/1&lt;BR /&gt; nameif&amp;nbsp;InsideA&lt;BR /&gt; bridge-group 10&lt;BR /&gt; security-level 80&lt;BR /&gt;!&lt;BR /&gt;interface Gig0/2&lt;BR /&gt; nameif&amp;nbsp;InsideB&lt;BR /&gt; bridge-group 10&lt;BR /&gt; security-level 80&lt;BR /&gt;!&lt;BR /&gt;interface Gig0/3&lt;BR /&gt; nameif&amp;nbsp;InsideC&lt;/P&gt;
&lt;P&gt;bridge-group 10&lt;BR /&gt; security-level 80&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;interface BVI10&lt;BR /&gt;ip address 192.168.1.10&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;From my guess, traffic should flow to my ASA without me needing to add much more. At this point I should see traffic being allowed/denied.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Feb 2016 11:40:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-firewall-issue/m-p/2890388#M172295</guid>
      <dc:creator>Kyle Smith</dc:creator>
      <dc:date>2016-02-23T11:40:52Z</dc:date>
    </item>
    <item>
      <title>Try adding the below as well.</title>
      <link>https://community.cisco.com/t5/network-security/transparent-firewall-issue/m-p/2890389#M172297</link>
      <description>&lt;P&gt;Try adding the below as well. &amp;nbsp;It should definitely be showing up.&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;logging trap informational&lt;/PRE&gt;</description>
      <pubDate>Tue, 23 Feb 2016 19:06:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/transparent-firewall-issue/m-p/2890389#M172297</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-02-23T19:06:00Z</dc:date>
    </item>
  </channel>
</rss>

