<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5525-X Logical Interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5525-x-logical-interface/m-p/2731598#M192304</link>
    <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;Hope you can help me figure out an issue I am struggling to fix with my Firewalls. To give you and overview of what the current setup is like, I have ASAs between internet router and a Layer3 switch&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Internet ==ASA==Layer3Switch-LAN(multiple subnets)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Gigabit0/0 is the outside Interface&lt;/LI&gt;&lt;LI&gt;Gigabit0/1 is inside interface&amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I have two networks on 10.0.0.0/24 &amp;amp; 10.0.2.0/24 connected to the inside interface and there is a static route for the LAN network on the firewall pointing to the VIP address of the Layer3switch. This static route covers both networks and the interface I have chosen to route traffic is the inside interface. 10.0.0.0/22 via inside to 10.0.0.245. All works well for the 10.0.0.0 and 10.0.2.0 networks.&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I want to do now is create a few environments and protect access by using the firewall. The idea is to use firewall as the gateway address and have access lists to protect the networks. For that to work,&amp;nbsp;I have&amp;nbsp;create a new VLAN (10.10.1.0/24)&amp;nbsp;on my core switches&amp;nbsp;(VLAN100), the switch has an interface IP address 10.10.1.1,&amp;nbsp;firewall also has a subinterface E0/1.100, VLAN id is 100 &amp;amp; interface IP address is 10.10.1.254&lt;/P&gt;&lt;P&gt;A client with IP address 10.10.1.10, with a default gateway of 10.10.1.1, can communicate to every single subnet on my LAN as the Layer3 switch is doing the routing for me. &lt;SPAN style="color:#FF0000;"&gt;With this setup however, I am unable to access the internet.&lt;/SPAN&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Traceroute to 8.8.8.8 is below&lt;/P&gt;&lt;P&gt;Tracing route to google-public-dns-a.google.com [8.8.8.8]&lt;BR /&gt;over a maximum of 30 hops:&lt;/P&gt;&lt;P&gt;&amp;nbsp; 1 &amp;nbsp; &amp;nbsp; 4 ms &amp;nbsp; &amp;nbsp; 5 ms &amp;nbsp; &amp;nbsp; 2 ms &amp;nbsp;10.10.1.1 - The is the interface IP address of switch VIP on&amp;nbsp;new VLAN (100)&lt;BR /&gt;&amp;nbsp; 2 &amp;nbsp; &amp;nbsp;&amp;lt;1 ms &amp;nbsp; &amp;nbsp;&amp;lt;1 ms &amp;nbsp; &amp;nbsp;&amp;lt;1 ms &amp;nbsp;10.0.0.254 - This is the default route on the core switch (interface is on the inside VLAN)&lt;BR /&gt;&amp;nbsp; 3 &amp;nbsp; &amp;nbsp;&amp;lt;1 ms &amp;nbsp; &amp;nbsp;&amp;lt;1 ms &amp;nbsp; &amp;nbsp;&amp;lt;1 ms &amp;nbsp;xxx.xxx.xxx.xxx&lt;BR /&gt;&amp;nbsp; 4 &amp;nbsp; &amp;nbsp; 2 ms &amp;nbsp; &amp;nbsp; 2 ms &amp;nbsp; &amp;nbsp; 2 ms &amp;nbsp;port-40-199.xxxxxxx&lt;BR /&gt;&amp;nbsp; 5 &amp;nbsp; &amp;nbsp; 2 ms &amp;nbsp; &amp;nbsp; 2 ms &amp;nbsp; &amp;nbsp; 2 ms &amp;nbsp;port-98-199.xxxxxxx&lt;/P&gt;&lt;P&gt;Traceroute does go out but ping or browsing&amp;nbsp;does not work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I change the clients (10.10.1.10) default gateway to the firewall (10.10.1.254), internet access works, my external static natting works but I am unable to access internal network anymore or connect from the internal network to the client.&lt;/P&gt;&lt;P&gt;Traceroute to the core switch VIP on a different VLAN is below&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;C:\Users\syedr&amp;gt;tracert 10.0.0.245&lt;/P&gt;&lt;P&gt;Tracing route to 10.0.0.245 over a maximum of 30 hops&lt;/P&gt;&lt;P&gt;&amp;nbsp; 1 &amp;nbsp; &amp;nbsp;&amp;lt;1 ms &amp;nbsp; &amp;nbsp;&amp;lt;1 ms &amp;nbsp; &amp;nbsp;&amp;lt;1 ms &amp;nbsp;10.10.1.254 0 VLAN100 Interface IP address of the Firewall&lt;BR /&gt;&amp;nbsp; 2 &amp;nbsp; &amp;nbsp;&amp;lt;1 ms &amp;nbsp; &amp;nbsp;&amp;lt;1 ms &amp;nbsp; &amp;nbsp;&amp;lt;1 ms &amp;nbsp;xxx.xxx.xxx.xxx - Internet Gateway router ??&lt;BR /&gt;&amp;nbsp; 3 &amp;nbsp; 250 ms &amp;nbsp; &amp;nbsp; 2 ms &amp;nbsp; &amp;nbsp; 2 ms&lt;/P&gt;&lt;P&gt;For some reason traffic to all my internal networks is being forced out of the firewall using the &amp;nbsp;gateway of last resort 0.0.0.0/0.0.0.0 -&amp;gt; Internet gateway router. There are static routes on the firewall, albeit&amp;nbsp;all of the routes defined are using interface inside to route traffic into the core network but that shouldn't stop traffic traversing the firewall should it ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For the remote VLANs, traffic gets to the new network via the coreswitch VIP. So all switches internally have static routes pointing to 10.10.1.0/2 gateway address 10.0.0.245 (VIP for core switch). For the Firewall to talk to these remote networks, they all have gateway address as 10.0.0.245.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can anyone advise what the issue is really ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 06:30:42 GMT</pubDate>
    <dc:creator>itops</dc:creator>
    <dc:date>2019-03-12T06:30:42Z</dc:date>
    <item>
      <title>ASA 5525-X Logical Interface</title>
      <link>https://community.cisco.com/t5/network-security/asa-5525-x-logical-interface/m-p/2731598#M192304</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;Hope you can help me figure out an issue I am struggling to fix with my Firewalls. To give you and overview of what the current setup is like, I have ASAs between internet router and a Layer3 switch&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Internet ==ASA==Layer3Switch-LAN(multiple subnets)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Gigabit0/0 is the outside Interface&lt;/LI&gt;&lt;LI&gt;Gigabit0/1 is inside interface&amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I have two networks on 10.0.0.0/24 &amp;amp; 10.0.2.0/24 connected to the inside interface and there is a static route for the LAN network on the firewall pointing to the VIP address of the Layer3switch. This static route covers both networks and the interface I have chosen to route traffic is the inside interface. 10.0.0.0/22 via inside to 10.0.0.245. All works well for the 10.0.0.0 and 10.0.2.0 networks.&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I want to do now is create a few environments and protect access by using the firewall. The idea is to use firewall as the gateway address and have access lists to protect the networks. For that to work,&amp;nbsp;I have&amp;nbsp;create a new VLAN (10.10.1.0/24)&amp;nbsp;on my core switches&amp;nbsp;(VLAN100), the switch has an interface IP address 10.10.1.1,&amp;nbsp;firewall also has a subinterface E0/1.100, VLAN id is 100 &amp;amp; interface IP address is 10.10.1.254&lt;/P&gt;&lt;P&gt;A client with IP address 10.10.1.10, with a default gateway of 10.10.1.1, can communicate to every single subnet on my LAN as the Layer3 switch is doing the routing for me. &lt;SPAN style="color:#FF0000;"&gt;With this setup however, I am unable to access the internet.&lt;/SPAN&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Traceroute to 8.8.8.8 is below&lt;/P&gt;&lt;P&gt;Tracing route to google-public-dns-a.google.com [8.8.8.8]&lt;BR /&gt;over a maximum of 30 hops:&lt;/P&gt;&lt;P&gt;&amp;nbsp; 1 &amp;nbsp; &amp;nbsp; 4 ms &amp;nbsp; &amp;nbsp; 5 ms &amp;nbsp; &amp;nbsp; 2 ms &amp;nbsp;10.10.1.1 - The is the interface IP address of switch VIP on&amp;nbsp;new VLAN (100)&lt;BR /&gt;&amp;nbsp; 2 &amp;nbsp; &amp;nbsp;&amp;lt;1 ms &amp;nbsp; &amp;nbsp;&amp;lt;1 ms &amp;nbsp; &amp;nbsp;&amp;lt;1 ms &amp;nbsp;10.0.0.254 - This is the default route on the core switch (interface is on the inside VLAN)&lt;BR /&gt;&amp;nbsp; 3 &amp;nbsp; &amp;nbsp;&amp;lt;1 ms &amp;nbsp; &amp;nbsp;&amp;lt;1 ms &amp;nbsp; &amp;nbsp;&amp;lt;1 ms &amp;nbsp;xxx.xxx.xxx.xxx&lt;BR /&gt;&amp;nbsp; 4 &amp;nbsp; &amp;nbsp; 2 ms &amp;nbsp; &amp;nbsp; 2 ms &amp;nbsp; &amp;nbsp; 2 ms &amp;nbsp;port-40-199.xxxxxxx&lt;BR /&gt;&amp;nbsp; 5 &amp;nbsp; &amp;nbsp; 2 ms &amp;nbsp; &amp;nbsp; 2 ms &amp;nbsp; &amp;nbsp; 2 ms &amp;nbsp;port-98-199.xxxxxxx&lt;/P&gt;&lt;P&gt;Traceroute does go out but ping or browsing&amp;nbsp;does not work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I change the clients (10.10.1.10) default gateway to the firewall (10.10.1.254), internet access works, my external static natting works but I am unable to access internal network anymore or connect from the internal network to the client.&lt;/P&gt;&lt;P&gt;Traceroute to the core switch VIP on a different VLAN is below&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;C:\Users\syedr&amp;gt;tracert 10.0.0.245&lt;/P&gt;&lt;P&gt;Tracing route to 10.0.0.245 over a maximum of 30 hops&lt;/P&gt;&lt;P&gt;&amp;nbsp; 1 &amp;nbsp; &amp;nbsp;&amp;lt;1 ms &amp;nbsp; &amp;nbsp;&amp;lt;1 ms &amp;nbsp; &amp;nbsp;&amp;lt;1 ms &amp;nbsp;10.10.1.254 0 VLAN100 Interface IP address of the Firewall&lt;BR /&gt;&amp;nbsp; 2 &amp;nbsp; &amp;nbsp;&amp;lt;1 ms &amp;nbsp; &amp;nbsp;&amp;lt;1 ms &amp;nbsp; &amp;nbsp;&amp;lt;1 ms &amp;nbsp;xxx.xxx.xxx.xxx - Internet Gateway router ??&lt;BR /&gt;&amp;nbsp; 3 &amp;nbsp; 250 ms &amp;nbsp; &amp;nbsp; 2 ms &amp;nbsp; &amp;nbsp; 2 ms&lt;/P&gt;&lt;P&gt;For some reason traffic to all my internal networks is being forced out of the firewall using the &amp;nbsp;gateway of last resort 0.0.0.0/0.0.0.0 -&amp;gt; Internet gateway router. There are static routes on the firewall, albeit&amp;nbsp;all of the routes defined are using interface inside to route traffic into the core network but that shouldn't stop traffic traversing the firewall should it ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For the remote VLANs, traffic gets to the new network via the coreswitch VIP. So all switches internally have static routes pointing to 10.10.1.0/2 gateway address 10.0.0.245 (VIP for core switch). For the Firewall to talk to these remote networks, they all have gateway address as 10.0.0.245.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can anyone advise what the issue is really ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:30:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5525-x-logical-interface/m-p/2731598#M192304</guid>
      <dc:creator>itops</dc:creator>
      <dc:date>2019-03-12T06:30:42Z</dc:date>
    </item>
    <item>
      <title>to me it looks like you need</title>
      <link>https://community.cisco.com/t5/network-security/asa-5525-x-logical-interface/m-p/2731599#M192305</link>
      <description>&lt;P&gt;to me it looks like you need a static route to the Internet&lt;/P&gt;&lt;P&gt;the gateway for the 10.10.1.0/24 subnet will be 10.10.1.1 but on the 10.10.1.1 switch/router &amp;nbsp;need to add&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;IP route 0.0.0.0 0.0.0.0 10.10.1.254&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 29 Aug 2015 06:40:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5525-x-logical-interface/m-p/2731599#M192305</guid>
      <dc:creator>Richard Bradfield</dc:creator>
      <dc:date>2015-08-29T06:40:22Z</dc:date>
    </item>
    <item>
      <title>Hi,It seems to be Asymmetric</title>
      <link>https://community.cisco.com/t5/network-security/asa-5525-x-logical-interface/m-p/2731600#M192306</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;It seems to be Asymmetric routing causing this issue when you are using the Switch as the default Gateway.&lt;/P&gt;&lt;P&gt;Can you provide the outputs from the ASA device:-&lt;/P&gt;&lt;P&gt;show route&lt;/P&gt;&lt;P&gt;show int ip b&lt;/P&gt;&lt;P&gt;show nameif&lt;/P&gt;&lt;P&gt;show run nat&lt;/P&gt;&lt;P&gt;Client Ip that does not work with the ASA device interface as Default Gateway:-&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 30 Aug 2015 14:28:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5525-x-logical-interface/m-p/2731600#M192306</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-08-30T14:28:01Z</dc:date>
    </item>
    <item>
      <title>Hi Vibhour,I suspect it to be</title>
      <link>https://community.cisco.com/t5/network-security/asa-5525-x-logical-interface/m-p/2731601#M192307</link>
      <description>&lt;P&gt;Hi Vibhour,&lt;/P&gt;&lt;P&gt;I suspect it to be an asymetric routing issue as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Show route:&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN style="font-size:9px;"&gt;S* &amp;nbsp; &amp;nbsp; &amp;nbsp; 0.0.0.0 0.0.0.0 [1/0] via 154.59.***.***, INTERNET-WAN&lt;BR /&gt;S &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.0.0 255.255.252.0 [1/0] via 10.0.0.245, DEFAULT&lt;BR /&gt;C &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.0.0 255.255.255.0 is directly connected, DEFAULT&lt;BR /&gt;L &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.0.254 255.255.255.255 is directly connected, DEFAULT&lt;BR /&gt;C &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.2.0 255.255.255.0 is directly connected, HARDWARE&lt;BR /&gt;L &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.2.254 255.255.255.255 is directly connected, HARDWARE&lt;BR /&gt;S &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.4.0 255.255.255.0 [1/0] via 10.0.0.245, DEFAULT&lt;BR /&gt;S &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.5.0 255.255.255.0 [1/0] via 10.0.0.245, DEFAULT&lt;BR /&gt;S &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.8.0 255.255.255.0 [1/0] via 10.0.0.245, DEFAULT&lt;BR /&gt;S &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.9.0 255.255.255.0 [1/0] via 10.0.0.245, DEFAULT&lt;BR /&gt;S &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.10.0 255.255.255.0 [1/0] via 10.0.0.245, DEFAULT&lt;BR /&gt;S &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.11.0 255.255.255.0 [1/0] via 10.0.0.245, DEFAULT&lt;BR /&gt;S &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.12.0 255.255.255.0 [1/0] via 10.0.0.245, DEFAULT&lt;BR /&gt;S &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.13.0 255.255.255.0 [1/0] via 10.0.0.245, DEFAULT&lt;BR /&gt;S &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.14.0 255.255.255.0 [1/0] via 10.0.0.245, DEFAULT&lt;BR /&gt;S &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.15.0 255.255.255.0 [1/0] via 10.0.0.245, DEFAULT&lt;BR /&gt;S &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.17.0 255.255.255.0 [1/0] via 10.0.0.245, DEFAULT&lt;BR /&gt;S &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.18.0 255.255.255.0 [1/0] via 10.0.0.245, DEFAULT&lt;BR /&gt;S &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.20.0 255.255.255.0 [1/0] via 10.0.0.245, DEFAULT&lt;BR /&gt;S &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.30.0 255.255.255.0 [1/0] via 10.0.0.245, DEFAULT&lt;BR /&gt;S &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.40.0 255.255.255.0 [1/0] via 10.0.0.245, DEFAULT&lt;BR /&gt;S &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.50.0 255.255.254.0 [1/0] via 10.0.0.245, DEFAULT&lt;BR /&gt;S &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.60.0 255.255.254.0 [1/0] via 10.0.0.245, DEFAULT&lt;BR /&gt;S &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.100.0 255.255.255.0 [1/0] via 10.0.0.245, DEFAULT&lt;BR /&gt;S &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.101.0 255.255.255.0 [1/0] via 10.0.0.245, DEFAULT&lt;BR /&gt;S &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.111.0 255.255.255.0 [1/0] via 10.0.0.245, DEFAULT&lt;BR /&gt;S &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.150.0 255.255.255.0 [1/0] via 10.0.0.245, DEFAULT&lt;BR /&gt;S &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.155.0 255.255.255.0 [1/0] via 10.0.0.245, DEFAULT&lt;BR /&gt;S &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.200.0 255.255.248.0 [1/0] via 10.0.0.245, DEFAULT&lt;BR /&gt;S &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.208.0 255.255.255.0 [1/0] via 10.0.0.245, DEFAULT&lt;BR /&gt;C &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.254.0 255.255.255.0 is directly connected, MGMT&lt;BR /&gt;L &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.254.254 255.255.255.255 is directly connected, MGMT&lt;BR /&gt;C &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.255.16 255.255.255.248 is directly connected, FAILOVER-LAN&lt;BR /&gt;L &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.255.17 255.255.255.255 is directly connected, FAILOVER-LAN&lt;BR /&gt;C &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.255.24 255.255.255.248 is directly connected, STATEFULL-FAILOVER&lt;BR /&gt;L &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0.255.25 255.255.255.255 is directly connected, STATEFULL-FAILOVER&lt;BR /&gt;S &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.2.0.0 255.255.0.0 [1/0] via 10.0.0.245, DEFAULT&lt;BR /&gt;S &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.3.0.0 255.255.0.0 [1/0] via 10.0.0.245, DEFAULT&lt;BR /&gt;S &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.4.0.0 255.255.0.0 [1/0] via 10.0.0.245, DEFAULT&lt;BR /&gt;C &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.10.1.0 255.255.255.0 is directly connected, PROD-INF-SRVRS&lt;BR /&gt;L &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.10.1.254 255.255.255.255 is directly connected, PROD-INF-SRVRS&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;U&gt;Show IP Int Br:&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN style="font-size:9px;"&gt;Interface &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;IP-Address &amp;nbsp; &amp;nbsp; &amp;nbsp;OK? Method Status &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Protocol&lt;BR /&gt;GigabitEthernet0/0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 154.59.137.108 &amp;nbsp;YES CONFIG up &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;up&lt;BR /&gt;GigabitEthernet0/1 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; unassigned &amp;nbsp; &amp;nbsp; &amp;nbsp;YES unset &amp;nbsp;up &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;up&lt;BR /&gt;GigabitEthernet0/1.1 &amp;nbsp; &amp;nbsp; &amp;nbsp; 10.0.0.254 &amp;nbsp; &amp;nbsp; &amp;nbsp;YES manual up &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;up&lt;BR /&gt;GigabitEthernet0/1.2 &amp;nbsp; &amp;nbsp; &amp;nbsp; 10.0.2.254 &amp;nbsp; &amp;nbsp; &amp;nbsp;YES manual up &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;up&lt;BR /&gt;GigabitEthernet0/1.100 &amp;nbsp; &amp;nbsp; 10.10.1.254 &amp;nbsp; &amp;nbsp; YES manual up &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;up&lt;BR /&gt;GigabitEthernet0/1.254 &amp;nbsp; &amp;nbsp; 10.0.254.254 &amp;nbsp; &amp;nbsp;YES manual up &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;up&lt;BR /&gt;GigabitEthernet0/2 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 192.168.200.10 &amp;nbsp;YES manual up &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;up&lt;BR /&gt;GigabitEthernet0/3 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; unassigned &amp;nbsp; &amp;nbsp; &amp;nbsp;YES unset &amp;nbsp;administratively down down&lt;BR /&gt;GigabitEthernet0/4 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; unassigned &amp;nbsp; &amp;nbsp; &amp;nbsp;YES unset &amp;nbsp;administratively down down&lt;BR /&gt;GigabitEthernet0/5 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; unassigned &amp;nbsp; &amp;nbsp; &amp;nbsp;YES unset &amp;nbsp;administratively down down&lt;BR /&gt;GigabitEthernet0/6 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 10.0.255.17 &amp;nbsp; &amp;nbsp; YES unset &amp;nbsp;up &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;up&lt;BR /&gt;GigabitEthernet0/7 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 10.0.255.25 &amp;nbsp; &amp;nbsp; YES unset &amp;nbsp;up &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;up&lt;BR /&gt;Internal-Control0/0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;127.0.1.1 &amp;nbsp; &amp;nbsp; &amp;nbsp; YES unset &amp;nbsp;up &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;up&lt;BR /&gt;Internal-Data0/0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; unassigned &amp;nbsp; &amp;nbsp; &amp;nbsp;YES unset &amp;nbsp;down &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;down&lt;BR /&gt;Internal-Data0/1 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; unassigned &amp;nbsp; &amp;nbsp; &amp;nbsp;YES unset &amp;nbsp;down &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;down&lt;BR /&gt;Internal-Data0/2 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; unassigned &amp;nbsp; &amp;nbsp; &amp;nbsp;YES unset &amp;nbsp;up &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;up&lt;BR /&gt;Management0/0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;unassigned &amp;nbsp; &amp;nbsp; &amp;nbsp;YES unset &amp;nbsp;administratively down down&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;B&gt;&lt;U&gt;Show NameIf:&lt;/U&gt;&lt;/B&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN style="font-size:9px;"&gt;Interface &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Name &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Security&lt;BR /&gt;GigabitEthernet0/0 &amp;nbsp; &amp;nbsp; &amp;nbsp; INTERNET-WAN &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0&lt;BR /&gt;GigabitEthernet0/1 &amp;nbsp; &amp;nbsp; &amp;nbsp; LAN-WAN &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;0&lt;BR /&gt;GigabitEthernet0/1.1 &amp;nbsp; &amp;nbsp; DEFAULT &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;100&lt;BR /&gt;GigabitEthernet0/1.2 &amp;nbsp; &amp;nbsp; HARDWARE &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 100&lt;BR /&gt;GigabitEthernet0/1.100 &amp;nbsp; PROD-INF-SRVRS &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 100&lt;BR /&gt;GigabitEthernet0/2 &amp;nbsp; &amp;nbsp; &amp;nbsp; P2P-COLODC &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 100&lt;BR /&gt;Management0/0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;management &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 100&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;U&gt;Show Run Nat:&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN style="font-size:9px;"&gt;nat (INTERNET-WAN,DEFAULT) source static any any destination static repo-1-PUBLIC repo-1-PRIVATE no-proxy-arp&lt;BR /&gt;nat (INTERNET-WAN,DEFAULT) source static any any destination static perc-01-PUBLIC perc-01-PRIVATE no-proxy-arp&lt;BR /&gt;nat (INTERNET-WAN,DEFAULT) source static any any destination static OWL-PUBLIC OWL-PRIVATE no-proxy-arp&lt;BR /&gt;nat (INTERNET-WAN,DEFAULT) source static any any destination static stg-PUBLIC stg-PRIVATE no-proxy-arp&lt;BR /&gt;nat (INTERNET-WAN,DEFAULT) source static any any destination static mon-01-PUBLIC mon-01-PRIVATE no-proxy-arp&lt;BR /&gt;nat (INTERNET-WAN,DEFAULT) source static any any destination static test-PUBLIC test-PRIVATE no-proxy-arp&lt;BR /&gt;nat (INTERNET-WAN,DEFAULT) source static any any destination static uat-PUBLIC uat-PRIVATE no-proxy-arp&lt;BR /&gt;nat (INTERNET-WAN,PROD-INF-SRVRS) source static any any destination static HO-Loadtest01-PUBLIC HO-Loadtest01-PRIVATE no-proxy-arp&lt;BR /&gt;nat (INTERNET-WAN,DEFAULT) source static any any destination static HO-1-PUBLIC HO-1-PRIVATE no-proxy-arp&lt;BR /&gt;nat (INTERNET-WAN,DEFAULT) source static any any destination static HO-3-PUBLIC HO-3-PRIVATE no-proxy-arp&lt;BR /&gt;nat (INTERNET-WAN,DEFAULT) source static any any destination static test2-PUBLIC test2-PRIVATE unidirectional no-proxy-arp&lt;BR /&gt;nat (DEFAULT,INTERNET-WAN) source static DM_INLINE_NETWORK_16 DM_INLINE_NETWORK_16 destination static NETWORK_OBJ_10.0.16.0_24 NETWORK_OBJ_10.0.16.0_24 no-proxy-arp route-lookup&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT color="#ff0000"&gt;&lt;B&gt;The IP address of the client is 10.10.1.10, gateway address 10.10.1.254.&lt;/B&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT color="#ff0000"&gt;&lt;B&gt;Internet access works ok&lt;/B&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT color="#ff0000"&gt;&lt;B&gt;External Natting works ok&lt;/B&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;FONT color="#ff0000"&gt;&lt;B&gt;Access from internal networks does not work !&lt;/B&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Sep 2015 09:12:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5525-x-logical-interface/m-p/2731601#M192307</guid>
      <dc:creator>itops</dc:creator>
      <dc:date>2015-09-01T09:12:43Z</dc:date>
    </item>
    <item>
      <title>It seems you haven't read the</title>
      <link>https://community.cisco.com/t5/network-security/asa-5525-x-logical-interface/m-p/2731602#M192308</link>
      <description>&lt;P&gt;Apparently you haven't read the design principles in my article (-:&lt;/P&gt;&lt;P&gt;&lt;A href="https://ltlnetworker.wordpress.com/2015/08/16/management-network-topology-and-asymmetric-routing/" rel="bookmark"&gt;Management network topology and asymmetric&amp;nbsp;routing&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Sep 2015 11:14:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5525-x-logical-interface/m-p/2731602#M192308</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2015-09-04T11:14:31Z</dc:date>
    </item>
    <item>
      <title>Thanks Peter. So the obvious</title>
      <link>https://community.cisco.com/t5/network-security/asa-5525-x-logical-interface/m-p/2731603#M192309</link>
      <description>&lt;P&gt;Thanks Peter. So the obvious question here is if there is anything that can be done to address the problem I am having without doing a redesign of the environment ?&lt;/P&gt;&lt;P&gt;I would like to ensure that new clients on the 10.10.1.0/24 use Firewall as the gateway but the existing clients on 10.0.0/24, 10.0.2/24 etc all have their gateway as the core switch.&lt;/P&gt;</description>
      <pubDate>Fri, 04 Sep 2015 11:14:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5525-x-logical-interface/m-p/2731603#M192309</guid>
      <dc:creator>itops</dc:creator>
      <dc:date>2015-09-04T11:14:32Z</dc:date>
    </item>
    <item>
      <title>the later you fix the</title>
      <link>https://community.cisco.com/t5/network-security/asa-5525-x-logical-interface/m-p/2731604#M192310</link>
      <description>&lt;P&gt;the later you fix the topology the more it hurts&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the quick and dirty fix is to add static routes to all hosts&lt;/P&gt;&lt;P&gt;route 10.0.0.0/8 via 10.10.1.1&lt;/P&gt;&lt;P&gt;default gateway: 10.10.1.254&lt;/P&gt;</description>
      <pubDate>Sun, 06 Sep 2015 19:54:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5525-x-logical-interface/m-p/2731604#M192310</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2015-09-06T19:54:49Z</dc:date>
    </item>
  </channel>
</rss>

