<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic For your 1st clarification, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-exempt-and-intervlan-routing-scenario-in-cisco-asa/m-p/2713122#M193886</link>
    <description>&lt;P&gt;For your 1st clarification, yes you are right. However, rather than applying it per interface using the service-policy, you can just apply it on the default global policy that is configured on Cisco ASAs. You can find that default &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa72/configuration/guide/conf_gd/mpc.html#wp1114851"&gt;here&lt;/A&gt;. So if you want to add ICMP inspection to the default global policy, the following command will work:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp; class inspection_default&lt;BR /&gt;&amp;nbsp; &amp;nbsp;inspect icmp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;For the 2nd question, the "&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;icmp [permit|deny]&lt;/SPAN&gt;" applies to ICMP&amp;nbsp;traffic terminating on the ASA itself e.g. pinging the ASA interface. For ICMP traffic &lt;EM&gt;&lt;STRONG&gt;through&lt;/STRONG&gt;&lt;/EM&gt; the ASA, we use normal ACLs. More information &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/command/reference/cmd_ref/i1.html#wp1697623"&gt;here&lt;/A&gt;.&lt;/P&gt;</description>
    <pubDate>Tue, 14 Jul 2015 09:31:54 GMT</pubDate>
    <dc:creator>Adeolu Owokade</dc:creator>
    <dc:date>2015-07-14T09:31:54Z</dc:date>
    <item>
      <title>nat exempt and intervlan routing scenario in cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-exempt-and-intervlan-routing-scenario-in-cisco-asa/m-p/2713119#M193879</link>
      <description>&lt;P&gt;Hi, I am new to Cisco ASA. I have done some study on Cisco ASA recently and try to understand how it works.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The network diagram above shows the network architecture in my company (attachment). Both FW (5520, version 8.0) are configured with &lt;EM&gt;nat control&lt;/EM&gt; and &lt;EM&gt;same-security-traffic permit inter-interface&lt;/EM&gt;. I would like to ping from Device A to Device B (10.10.105.244 &amp;gt; 10.10.70.70/24).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;At FW 02, i added an inbound ACL (10.10.105.0/24 &amp;gt; 10.10.70.0/24) due to the difference of security level between ingress and egress interface (SL 50 &amp;lt; SL 100). For the return traffic (10.10.70.0/24 &amp;gt; 10.10.105.0/24), I only need to add a &lt;EM&gt;nat exempt&lt;/EM&gt; rules as I have configured with &lt;EM&gt;same-security-traffic permit inter-interface&lt;/EM&gt;. Is my understanding correct?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;At FW 01, I need to add an inbound ACL (10.10.70.0/24 &amp;gt; 10.10.105.244). Without the rule, my ping will be unsuccessful. Can I know why I need to add this inbound rule since &lt;EM&gt;same-security-traffic permit inter-interface&lt;/EM&gt; is configured at FW 01? Can I know why I do not need to &lt;EM&gt;nat exempt&lt;/EM&gt; the traffic (10.10.105.0/24 &amp;gt; 10.10.70.0/24)? &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry for lengthy explanation. I hope to get clarification and to ensure my understanding is correct.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks all for the comment. Have a great day &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:15:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-exempt-and-intervlan-routing-scenario-in-cisco-asa/m-p/2713119#M193879</guid>
      <dc:creator>sinyong.you</dc:creator>
      <dc:date>2019-03-12T06:15:25Z</dc:date>
    </item>
    <item>
      <title>Hi,For your first question:</title>
      <link>https://community.cisco.com/t5/network-security/nat-exempt-and-intervlan-routing-scenario-in-cisco-asa/m-p/2713120#M193881</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;For your first question: "&lt;EM&gt;Can I know why I need to add this inbound rule since same-security-traffic permit inter-interface is configured at FW 01?&lt;/EM&gt;"&lt;/P&gt;&lt;P&gt;It probably has to do with ICMP inspection. By default, ICMP traffic is not inspected by the ASA so the return traffic from Device B to Device A will be dropped at FW 01. One way is to&amp;nbsp;enable ICMP inspection by adding it to the default MPF configuration on the ASA.&lt;/P&gt;&lt;P&gt;For your second question: "&lt;EM&gt;Can I know why I do not need to nat exempt the traffic (10.10.105.0/24 &amp;gt; 10.10.70.0/24)?&lt;/EM&gt;"&lt;/P&gt;&lt;P&gt;NAT-control does not affect same security interfaces i.e. same security interfaces can communicate without NAT even if NAT-control is turned on (with some exceptions). Refer to this &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/nat_control.html#wp1081400"&gt;link&lt;/A&gt; for further information.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jul 2015 14:49:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-exempt-and-intervlan-routing-scenario-in-cisco-asa/m-p/2713120#M193881</guid>
      <dc:creator>Adeolu Owokade</dc:creator>
      <dc:date>2015-07-13T14:49:22Z</dc:date>
    </item>
    <item>
      <title>Hi Adeolu,Thank you for</title>
      <link>https://community.cisco.com/t5/network-security/nat-exempt-and-intervlan-routing-scenario-in-cisco-asa/m-p/2713121#M193883</link>
      <description>&lt;P&gt;Hi Adeolu,&lt;/P&gt;&lt;P&gt;Thank you for helping to clarify. It helps a lot &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; .&lt;/P&gt;&lt;P&gt;Anyway, for the 1st question, you mentioned the icmp inspection. If i am not mistaken, the icmp inspection is enabled in the form of policy-map and applied to the nameif interface using service-policy, am i correct ? Without the icmp inspection, we need to apply the inbound ACL to allow the icmp traffic. Is this what you suggest?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I re-checked the configuration. I wonder does this config has anything to do with the 1st question. The inbound ACL is applied at the nameif UCS interface.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif;"&gt;&lt;EM&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit 10.10.105.0 255.255.255.0 VPN&lt;BR /&gt;icmp deny any VPN&lt;BR /&gt;icmp permit any UCS&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;## nameif VPN&amp;nbsp;interface = 10.10.105.254&lt;BR /&gt;## nameif UCS&amp;nbsp;interface = 10.10.69.1&lt;/P&gt;&lt;P&gt;Thank you and have a great day.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jul 2015 02:49:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-exempt-and-intervlan-routing-scenario-in-cisco-asa/m-p/2713121#M193883</guid>
      <dc:creator>sinyong.you</dc:creator>
      <dc:date>2015-07-14T02:49:51Z</dc:date>
    </item>
    <item>
      <title>For your 1st clarification,</title>
      <link>https://community.cisco.com/t5/network-security/nat-exempt-and-intervlan-routing-scenario-in-cisco-asa/m-p/2713122#M193886</link>
      <description>&lt;P&gt;For your 1st clarification, yes you are right. However, rather than applying it per interface using the service-policy, you can just apply it on the default global policy that is configured on Cisco ASAs. You can find that default &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa72/configuration/guide/conf_gd/mpc.html#wp1114851"&gt;here&lt;/A&gt;. So if you want to add ICMP inspection to the default global policy, the following command will work:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp; class inspection_default&lt;BR /&gt;&amp;nbsp; &amp;nbsp;inspect icmp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;For the 2nd question, the "&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;icmp [permit|deny]&lt;/SPAN&gt;" applies to ICMP&amp;nbsp;traffic terminating on the ASA itself e.g. pinging the ASA interface. For ICMP traffic &lt;EM&gt;&lt;STRONG&gt;through&lt;/STRONG&gt;&lt;/EM&gt; the ASA, we use normal ACLs. More information &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/command/reference/cmd_ref/i1.html#wp1697623"&gt;here&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jul 2015 09:31:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-exempt-and-intervlan-routing-scenario-in-cisco-asa/m-p/2713122#M193886</guid>
      <dc:creator>Adeolu Owokade</dc:creator>
      <dc:date>2015-07-14T09:31:54Z</dc:date>
    </item>
    <item>
      <title>Hi Adeolu,Thanks a lot for</title>
      <link>https://community.cisco.com/t5/network-security/nat-exempt-and-intervlan-routing-scenario-in-cisco-asa/m-p/2713123#M193888</link>
      <description>&lt;P&gt;Hi Adeolu,&lt;/P&gt;&lt;P&gt;Thanks a lot for helping to answer my question.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have a great day.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jul 2015 09:45:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-exempt-and-intervlan-routing-scenario-in-cisco-asa/m-p/2713123#M193888</guid>
      <dc:creator>sinyong.you</dc:creator>
      <dc:date>2015-07-14T09:45:16Z</dc:date>
    </item>
  </channel>
</rss>

