<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic So, disabled port on core in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/routing-issues/m-p/2619662#M196210</link>
    <description>&lt;P&gt;So, disabled port on core that connects to Management port, image that I can now ping the 10.3.0.10 address. However I cannot manage the ASA. I enable both at 100 and check off that same level security can talk to each other.... But unless I make the port management only I am not sure how to allow management traffic on it?&lt;/P&gt;</description>
    <pubDate>Wed, 11 Mar 2015 21:59:19 GMT</pubDate>
    <dc:creator>Stacey Hummer</dc:creator>
    <dc:date>2015-03-11T21:59:19Z</dc:date>
    <item>
      <title>Routing issues</title>
      <link>https://community.cisco.com/t5/network-security/routing-issues/m-p/2619658#M196206</link>
      <description>&lt;P&gt;Good day,&lt;/P&gt;&lt;P&gt;I am having an issue with our new ASA. The issue has to do with routing. I had this post in the routing forum but someone said it would better suited for the firewall forum. I am going to put the link to my original question and answers to that question. Basically I need to know how to get the management interface out of my routing protocol but still be accessible by an address inside the "inside" range.&lt;/P&gt;&lt;P&gt;Currently I have a 3560 with 2 connection going to the ASA one is managment 10.2.0.246 and the other is Inside 10.3.0.10.&lt;/P&gt;&lt;P&gt;Unfortunately our IP addressing scheme on the network is of the 10.2.0.0/16 range, this includes switches and a router.&lt;/P&gt;&lt;P&gt;From the 3560 I am able to ping 10.3.0.10 when I do a simple ping. However when I go to another device including other switches I am not able to ping the 10.3.0.10 address. As well when I do an extended ping from the 3560 which has vlan 1 ip address of 10.2.0.2 and I use that ip for the extended ping it does not work. The port connect to the Inside port of the ASA is in no switchport and has 10.3.0.4 address attached to it.&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportforums.cisco.com/discussion/12449446/routing-issue-3560" target="_blank"&gt;https://supportforums.cisco.com/discussion/12449446/routing-issue-3560&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Any help would be greatly appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Stacey&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:37:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-issues/m-p/2619658#M196206</guid>
      <dc:creator>Stacey Hummer</dc:creator>
      <dc:date>2019-03-12T05:37:39Z</dc:date>
    </item>
    <item>
      <title>Hi Stacey. I posted a reply</title>
      <link>https://community.cisco.com/t5/network-security/routing-issues/m-p/2619659#M196207</link>
      <description>&lt;P&gt;Hi Stacey. I posted a reply to your other thread earlier. Just to clarify. Why do you need to manage the ASA from the management interface? If I can understand the requirement, then I can think about a work around for your scenario. I can see the issue. The ASA sees the 10.2.xx network as directly&amp;nbsp;connected via management, so it will prefer that route to the static route with a higher metric.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a specific reason why you can't manage your ASA via the inside interface?&lt;/P&gt;&lt;P&gt;What are the security-levels of your interfaces?&amp;nbsp;Can you post your ASA config to review?&lt;/P&gt;</description>
      <pubDate>Wed, 11 Mar 2015 21:06:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-issues/m-p/2619659#M196207</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-03-11T21:06:32Z</dc:date>
    </item>
    <item>
      <title>Andre,The only reason I'm</title>
      <link>https://community.cisco.com/t5/network-security/routing-issues/m-p/2619660#M196208</link>
      <description>&lt;P&gt;Andre,&lt;/P&gt;&lt;P&gt;The only reason I'm managing the ASA from the management interface is that's what Cisco says to do. As well we have the sourcefire module with the defense center on a vm machine. I am unable to get it to setup management between the DC and the ASA. If I can use the "inside" interface for this then I will do that. Since I'm extremely new to the ASA I'm still trying to figure it all out.&lt;/P&gt;&lt;P&gt;Here is the config&lt;/P&gt;&lt;P&gt;XENA-ASA# show runn&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;: Serial Number: FCH18507A3W&lt;BR /&gt;: Hardware:&amp;nbsp;&amp;nbsp; ASA5525, 8192 MB RAM, CPU Lynnfield 2394 MHz, 1 CPU (4 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.2(2)4&lt;BR /&gt;!&lt;BR /&gt;hostname XENA-ASA&lt;BR /&gt;domain-name Name&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;names&lt;BR /&gt;dns-guard&lt;BR /&gt;ip local pool XENAVPN 10.200.0.1-10.200.10.254 mask 255.255.0.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;nameif Outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address x.x.x.118 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/6&lt;BR /&gt;&amp;nbsp;nameif Management&lt;BR /&gt;&amp;nbsp;security-level 90&lt;BR /&gt;&amp;nbsp;ip address 10.2.0.246 255.255.0.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/7&lt;BR /&gt;&amp;nbsp;nameif Inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.3.0.10 255.255.0.0&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone MST -7&lt;BR /&gt;clock summer-time MDT recurring&lt;BR /&gt;dns domain-lookup Inside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;name-server 10.2.0.101&lt;BR /&gt;&amp;nbsp;name-server 10.2.0.83&lt;BR /&gt;&amp;nbsp;domain-name name.ORG&lt;BR /&gt;object network Admin-PC&lt;BR /&gt;&amp;nbsp;range 10.2.30.0 10.2.30.254&lt;BR /&gt;object network XENA-2012-DS&lt;BR /&gt;&amp;nbsp;host 10.2.0.101&lt;BR /&gt;&amp;nbsp;description DS,DNS,DHCP&lt;BR /&gt;object network ZEUS&lt;BR /&gt;&amp;nbsp;host 10.2.0.83&lt;BR /&gt;&amp;nbsp;description DS,DNS&lt;BR /&gt;object network NTP-Server&lt;BR /&gt;&amp;nbsp;host 10.2.0.211&lt;BR /&gt;&amp;nbsp;description Linux NTP Server&lt;BR /&gt;object network Inside-Range-2&lt;BR /&gt;&amp;nbsp;subnet 10.2.0.0 255.255.0.0&lt;BR /&gt;object network Inside-Range-3&lt;BR /&gt;&amp;nbsp;subnet 10.3.0.0 255.255.0.0&lt;BR /&gt;object network Inside-Range-4&lt;BR /&gt;&amp;nbsp;subnet 10.4.0.0 255.255.0.0&lt;BR /&gt;object network Inside-Range-5&lt;BR /&gt;&amp;nbsp;subnet 10.5.0.0 255.255.0.0&lt;BR /&gt;object network Inside-Range-6&lt;BR /&gt;&amp;nbsp;subnet 10.6.0.0 255.255.0.0&lt;BR /&gt;object network Inside-Range-7&lt;BR /&gt;&amp;nbsp;subnet 10.7.0.0 255.255.0.0&lt;BR /&gt;object network Inside-Range-8&lt;BR /&gt;&amp;nbsp;subnet 10.8.0.0 255.255.0.0&lt;BR /&gt;object network Inside-Range-9&lt;BR /&gt;&amp;nbsp;subnet 10.9.0.0 255.255.0.0&lt;BR /&gt;object network Access-Outside&lt;BR /&gt;&amp;nbsp;subnet 10.0.0.0 255.0.0.0&lt;BR /&gt;object network Mail&lt;BR /&gt;&amp;nbsp;host 10.2.0.92&lt;BR /&gt;object service FromOutsideMail&lt;BR /&gt;&amp;nbsp;service tcp source range 1 65535 destination eq smtp&lt;BR /&gt;object network InternalMail&lt;BR /&gt;&amp;nbsp;host 10.2.0.92&lt;BR /&gt;&amp;nbsp;description Mail Server&lt;BR /&gt;object network 115-Address&lt;BR /&gt;&amp;nbsp;host x.x.x.115&lt;BR /&gt;&amp;nbsp;description Original Outside Address&lt;BR /&gt;object network NETWORK_OBJ_10.200.0.0_20&lt;BR /&gt;&amp;nbsp;subnet 10.200.0.0 255.255.240.0&lt;BR /&gt;object network Xena-Mail&lt;BR /&gt;&amp;nbsp;host 10.2.0.92&lt;BR /&gt;object-group service Admin-Services&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq ssh&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq telnet&lt;BR /&gt;object-group service Inside-Services&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq ftp&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq www&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq https&lt;BR /&gt;&amp;nbsp;service-object icmp&lt;BR /&gt;&amp;nbsp;service-object tcp-udp destination eq www&lt;BR /&gt;object-group service Outside-Services&lt;BR /&gt;&amp;nbsp;service-object icmp echo&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq ftp&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq www&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq https&lt;BR /&gt;object-group network Admin-Hosts&lt;BR /&gt;&amp;nbsp;network-object object Admin-PC&lt;BR /&gt;object-group service Mail-Services&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq smtp&lt;BR /&gt;object-group service NTP-Services&lt;BR /&gt;&amp;nbsp;service-object udp destination eq ntp&lt;BR /&gt;object-group network DNS-Servers&lt;BR /&gt;&amp;nbsp;network-object object XENA-2012-DS&lt;BR /&gt;&amp;nbsp;network-object object ZEUS&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt;&amp;nbsp;protocol-object udp&lt;BR /&gt;&amp;nbsp;protocol-object tcp&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt;&amp;nbsp;service-object icmp&lt;BR /&gt;&amp;nbsp;service-object tcp-udp destination eq domain&lt;BR /&gt;object-group network All-Inside-networks&lt;BR /&gt;&amp;nbsp;network-object object Inside-Range-2&lt;BR /&gt;&amp;nbsp;network-object object Inside-Range-3&lt;BR /&gt;&amp;nbsp;network-object object Inside-Range-4&lt;BR /&gt;&amp;nbsp;network-object object Inside-Range-5&lt;BR /&gt;&amp;nbsp;network-object object Inside-Range-6&lt;BR /&gt;&amp;nbsp;network-object object Inside-Range-7&lt;BR /&gt;&amp;nbsp;network-object object Inside-Range-8&lt;BR /&gt;&amp;nbsp;network-object object Inside-Range-9&lt;BR /&gt;access-list Inside_access_in extended permit object-group DM_INLINE_SERVICE_1 object-group DNS-Servers any&lt;BR /&gt;access-list Inside_access_in extended permit object-group Inside-Services object-group All-Inside-networks any&lt;BR /&gt;access-list Inside_access_in extended permit object-group Mail-Services object Mail any&lt;BR /&gt;access-list global_access extended permit object-group NTP-Services object NTP-Server any&lt;BR /&gt;access-list global_access extended permit icmp 10.2.0.0 255.255.0.0 10.3.0.0 255.255.0.0&lt;BR /&gt;access-list global_access extended permit object-group TCPUDP object-group DNS-Servers any eq domain&lt;BR /&gt;access-list global_access extended deny ip any any&lt;BR /&gt;access-list Outside_access_in extended permit object-group Mail-Services any object 115-Address&lt;BR /&gt;access-list Outside_access_in extended permit tcp any object InternalMail eq smtp&lt;BR /&gt;access-list OutsideToInside extended permit tcp any host 10.2.0.92 eq smtp&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging trap informational&lt;BR /&gt;logging asdm warnings&lt;BR /&gt;mtu Outside 1500&lt;BR /&gt;mtu Management 1500&lt;BR /&gt;mtu Inside 1500&lt;BR /&gt;ip verify reverse-path interface Outside&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;arp permit-nonconnected&lt;BR /&gt;nat (Inside,Outside) source static any any destination static NETWORK_OBJ_10.200.0.0_20 NETWORK_OBJ_10.200.0.0_20 no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network Access-Outside&lt;BR /&gt;&amp;nbsp;nat (Inside,Outside) dynamic interface&lt;BR /&gt;object network Xena-Mail&lt;BR /&gt;&amp;nbsp;nat (Inside,Outside) static x.x.x.115 service tcp smtp smtp&lt;BR /&gt;access-group OutsideToInside in interface Outside&lt;BR /&gt;access-group Inside_access_in in interface Inside&lt;BR /&gt;access-group global_access global&lt;BR /&gt;route Outside 0.0.0.0 0.0.0.0 x.x.x.113 1&lt;BR /&gt;route Inside 10.0.0.0 255.0.0.0 10.3.0.4 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;ldap attribute-map LDAP-Map&lt;BR /&gt;&amp;nbsp; map-name&amp;nbsp; memberOf IETF-Radius-Class&lt;BR /&gt;&amp;nbsp; map-value memberOf "CN=Admin Users,DomainGroups,DC=xena,DC=org" DomainAdmin-Policy&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa-server LDAP protocol ldap&lt;BR /&gt;aaa-server LDAP (Management) host 10.2.0.101&lt;BR /&gt;&amp;nbsp;ldap-base-dn DC=DOMAIN,DC=ORG&lt;BR /&gt;&amp;nbsp;ldap-scope subtree&lt;BR /&gt;&amp;nbsp;ldap-naming-attribute sAMAccountName&lt;BR /&gt;&amp;nbsp;ldap-login-password *****&lt;BR /&gt;&amp;nbsp;ldap-login-dn adminanmee@xena.org&lt;BR /&gt;&amp;nbsp;server-type microsoft&lt;BR /&gt;&amp;nbsp;ldap-attribute-map LDAP-Map&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 10.0.0.0 255.0.0.0 Management&lt;BR /&gt;http 0.0.0.0 0.0.0.0 Outside&lt;BR /&gt;http redirect Outside 80&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt;&amp;nbsp;protocol esp encryption des&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt;&amp;nbsp;protocol esp encryption 3des&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt;&amp;nbsp;protocol esp encryption aes&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt;&amp;nbsp;protocol esp encryption aes-192&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt;&amp;nbsp;protocol esp encryption aes-256&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;BR /&gt;crypto map Outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map Outside_map interface Outside&lt;BR /&gt;crypto ca trustpoint XENA-ASA&lt;BR /&gt;&amp;nbsp;enrollment self&lt;BR /&gt;&amp;nbsp;subject-name CN=XENA-ASA&lt;BR /&gt;&amp;nbsp;proxy-ldc-issuer&lt;BR /&gt;&amp;nbsp;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca certificate chain XENA-ASA&lt;BR /&gt;&amp;nbsp;certificate 8882f754&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30820539 30820321 a0030201 02020488 82f75430 0d06092a 864886f7 0d010105&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0500302c 3111300f 06035504 03130858 454e412d 41534131 17301506 092a8648&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 86f70d01 09021608 58454e41 2d415341 301e170d 31353033 30343232 31363434&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5a170d32 35303330 31323231 3634345a 302c3111 300f0603 55040313 0858454e&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 412d4153 41311730 1506092a 864886f7 0d010902 16085845 4e412d41 53413082&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0222300d 06092a86 4886f70d 01010105 00038202 0f003082 020a0282 020100c0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 25671dbb a64e8a9b 4f1807ed 190b8aab 455714c1 4758d581 051d6762 2f75c547&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; bdf202b0 d9d72199 db425da0 1f035cd3 a99f4457 120db43b cb050705 03bfb1ef&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5eee6ace d00d547c 59b5ce9a 1d3a0f2e cdc67230 2dcffb02 fa948550 b82a9c83&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 25264a63 c1a27244 28884f96 184f5db4 f33f25d2 84f54230 9f3f0286 11fae916&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; c925b084 7ea44fb8 bede54bb 67bfd38e 20899825 8e7be83c 87b750a5 c4a2d5cd&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1cccc818 a852f2cb 932395d8 5cada870 fc3fe7de 4cc2c704 3225e7b1 4d251c5a&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; c520ad26 610ff273 790748f5 0bb37823 bbf9f601 e84aff4d 6180c23d 045f9202&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3b18ed4a a76c6307 0e83a003 f9aa4124 742a3dff 65a80cd6 be972d6a 47f21ca3&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 42cb8a78 8ce2fca7 e1ab5bac 019d516d dd09933f f9b9c211 b2bf2f95 1dd60be6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; d4ef5763 5efd0ad4 dfb31c57 0a4cbad4 da9b6205 442abe16 8d3361ef bbdd60f1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dbe95163 a8f3ff41 e2ed0595 0a0f5ab4 6f03d9ed 1c5734da f33ef697 b1668340&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 597c6b78 d51ee90e eed80b71 70fb4960 2e2c95aa 683a983c ff7765c7 64153e32&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; b6b9ea33 d7833c66 222252b8 b66924c9 db040783 dde023a5 ac55d923 3c0982d9&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; edb8b01b 2cf1c14e 35248bc0 e0545da4 fb5c53f5 394c5d3a 1a3d7347 22417874&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30eb6306 072f961f 79a84db1 4b1f436d 914966ef 32dc5c08 df1d7912 1d0535de&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cbb8c496 387b5552 2cb2d630 d11446e1 20669f1f 21d13179 d5f14782 23360d02&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 03010001 a3633061 300f0603 551d1301 01ff0405 30030101 ff300e06 03551d0f&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0101ff04 04030201 86301f06 03551d23 04183016 8014f353 f7d1a0af 592858aa&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 55d0867b 7aa19e1b 7a9c301d 0603551d 0e041604 14f353f7 d1a0af59 2858aa55&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; d0867b7a a19e1b7a 9c300d06 092a8648 86f70d01 01050500 03820201 008cc869&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 06aca621 beafa23d d902f7d9 0f1ce6a2 349c836b 89449c38 d4bc7ccc 8085145d&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5c0466e4 f8561522 dbee5cd5 e9e0f364 c262ddf8 cacae3c0 3aa64d90 a595ea88&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 81827e98 2bade67f ba9654f9 d987ef5e 9239decf e97165f7 3f27431b 930b5dae&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7717177e af0b9a0c 44c5bc8a f479cd2a 1c838034 c156f568 eb8bfafa 1e3f2de0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ab57bc7d adb31bd1 4dafcc4a 20dd57ee eb001816 cedb07e8 3ae664f6 96b8b353&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 311a28d0 ae8024a1 5306ff39 d5bf1cea a55ecad0 4f0670f1 57b48614 4cea902f&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 78cf314f d6a26dec f2b53b7d 75c8735e f7127010 3039e288 8c925622 d45232db&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 679d023c 8507c0be bf9116bc 44191f3e eebea228 bbd28f18 005bc4ee 5070be13&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ef75df16 98ed0064 61f7ffca beb39a56 358c8658 33f6a6e1 0b51370c 70831b09&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6534d635 92f27b75 0cc95ef3 3164e4fe a1ede657 28dd05d1 ba5cf9a9 1b352178&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0b95469d ef20e6ce 367ff30a 09317516 a76a337d 2d8dade8 486bdb13 03d2bdaf&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6e57b830 41702ab8 37a37fbb 23bb5df9 6f32c6ca 9b66340b 8af4a491 f3ec7af3&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 363c936a 031e447e e35af21a ca090f08 f2a21026 e1d81e7c ead49ab6 f4bca486&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6bd9e125 79e9f231 fef76dab 801863a4 91012595 b1a0e9fe 453619c4 9d217c34&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 83b4c749 d716a621 b31fff16 63df255c da61ba22 88ebe19c 7cf4a2ab def107ab&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8b04ef0e 8c9e14c1 561638fc 750b2e7a 047cd801 59a49299 e0a7af39 82&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt;&amp;nbsp;encryption aes-192&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 20&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 30&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 40&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 remote-access trustpoint XENA-ASA&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt;&amp;nbsp;authentication crack&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 20&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 30&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 40&lt;BR /&gt;&amp;nbsp;authentication crack&lt;BR /&gt;&amp;nbsp;encryption aes-192&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 50&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption aes-192&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 60&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes-192&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 70&lt;BR /&gt;&amp;nbsp;authentication crack&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 80&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 90&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 100&lt;BR /&gt;&amp;nbsp;authentication crack&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 110&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 120&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 130&lt;BR /&gt;&amp;nbsp;authentication crack&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 140&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 150&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 10.0.0.0 255.0.0.0 Management&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;ntp server 10.2.0.211 source Inside prefer&lt;BR /&gt;ssl encryption aes128-sha1 aes256-sha1 3des-sha1 dhe-aes128-sha1 dhe-aes256-sha1&lt;BR /&gt;ssl trust-point XENA-ASA Outside&lt;BR /&gt;webvpn&lt;BR /&gt;&amp;nbsp;enable Outside&lt;BR /&gt;&amp;nbsp;anyconnect-essentials&lt;BR /&gt;&amp;nbsp;anyconnect image disk0:/anyconnect-win-3.1.07021-k9.pkg 1&lt;BR /&gt;&amp;nbsp;anyconnect profiles Xena disk0:/xena.xml&lt;BR /&gt;&amp;nbsp;anyconnect enable&lt;BR /&gt;&amp;nbsp;tunnel-group-list enable&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;&amp;nbsp;dns-server value 10.2.0.101 10.2.0.83&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt;&amp;nbsp;default-domain value NAME.ORG&lt;BR /&gt;&amp;nbsp;address-pools value XENAVPN&lt;BR /&gt;&amp;nbsp;webvpn&lt;BR /&gt;&amp;nbsp; anyconnect ask none default anyconnect&lt;BR /&gt;group-policy GroupPolicy_XENA-VPN-Anyconnect internal&lt;BR /&gt;group-policy GroupPolicy_XENA-VPN-Anyconnect attributes&lt;BR /&gt;&amp;nbsp;wins-server none&lt;BR /&gt;&amp;nbsp;dns-server value 10.2.0.101 10.2.0.83&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ikev2 ssl-client&lt;BR /&gt;&amp;nbsp;address-pools value XENAVPN&lt;BR /&gt;&amp;nbsp;webvpn&lt;BR /&gt;&amp;nbsp; anyconnect ask none default anyconnect&lt;BR /&gt;group-policy XENA-VPN internal&lt;BR /&gt;group-policy XENA-VPN attributes&lt;BR /&gt;&amp;nbsp;wins-server none&lt;BR /&gt;&amp;nbsp;dns-server value 10.2.0.101 10.2.0.83&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ssl-client&lt;BR /&gt;&amp;nbsp;default-domain none&lt;BR /&gt;&amp;nbsp;webvpn&lt;BR /&gt;&amp;nbsp; anyconnect profiles value Xena type user&lt;BR /&gt;&amp;nbsp; anyconnect ask none default anyconnect&lt;BR /&gt;username stacey password 5jbdwdD9YC.EMGvn encrypted privilege 15&lt;BR /&gt;tunnel-group DefaultWEBVPNGroup general-attributes&lt;BR /&gt;&amp;nbsp;authentication-server-group LDAP&lt;BR /&gt;tunnel-group XENA-VPN-Anyconnect type remote-access&lt;BR /&gt;tunnel-group XENA-VPN-Anyconnect general-attributes&lt;BR /&gt;&amp;nbsp;address-pool XENAVPN&lt;BR /&gt;&amp;nbsp;default-group-policy XENA-VPN&lt;BR /&gt;tunnel-group XENA-VPN-Anyconnect webvpn-attributes&lt;BR /&gt;&amp;nbsp;group-alias XENA-VPN-Anyconnect enable&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect http&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; user-statistics accounting&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;&amp;nbsp;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email callhome@cisco.com&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly 2&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly 2&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:8fc09599beb71fb9bfacadb706a82d2a&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Mar 2015 21:16:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-issues/m-p/2619660#M196208</guid>
      <dc:creator>Stacey Hummer</dc:creator>
      <dc:date>2015-03-11T21:16:20Z</dc:date>
    </item>
    <item>
      <title>Ok. So what you have</title>
      <link>https://community.cisco.com/t5/network-security/routing-issues/m-p/2619661#M196209</link>
      <description>&lt;P&gt;Ok. So what you have inadvertently created is an asymmetric routing scenario. Try this............ make the security level of the management interface 100. Then permit same-security traffic between interfaces in the global config. I don't know if the State Table will be happy with that.........&lt;/P&gt;&lt;P&gt;You can try to send the management traffic via the inside interface. That's always an option.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just to test........ Try to unplug the cable between the management interface and see what happens &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Mar 2015 21:39:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-issues/m-p/2619661#M196209</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-03-11T21:39:39Z</dc:date>
    </item>
    <item>
      <title>So, disabled port on core</title>
      <link>https://community.cisco.com/t5/network-security/routing-issues/m-p/2619662#M196210</link>
      <description>&lt;P&gt;So, disabled port on core that connects to Management port, image that I can now ping the 10.3.0.10 address. However I cannot manage the ASA. I enable both at 100 and check off that same level security can talk to each other.... But unless I make the port management only I am not sure how to allow management traffic on it?&lt;/P&gt;</description>
      <pubDate>Wed, 11 Mar 2015 21:59:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-issues/m-p/2619662#M196210</guid>
      <dc:creator>Stacey Hummer</dc:creator>
      <dc:date>2015-03-11T21:59:19Z</dc:date>
    </item>
    <item>
      <title>To manage the ASA from the</title>
      <link>https://community.cisco.com/t5/network-security/routing-issues/m-p/2619663#M196211</link>
      <description>&lt;P&gt;To manage the ASA from the inside interface enter the below commands&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;ssh 10.0.0.0 255.0.0.0 inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;http 10.0.0.0 255.0.0.0 inside&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Mar 2015 22:49:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-issues/m-p/2619663#M196211</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-03-11T22:49:52Z</dc:date>
    </item>
    <item>
      <title>So, I've shutdown the</title>
      <link>https://community.cisco.com/t5/network-security/routing-issues/m-p/2619664#M196212</link>
      <description>&lt;P&gt;So, I've shutdown the management interface (shutdown port on core). It now lets me connect briefly to both SSH and ASDM then resets the connection. It does after a brief 5-10 seconds connects back up again but then does about the same amount of time being connected.... Got any idea what I should be looking for?&lt;/P&gt;&lt;P&gt;Once again you guys have been great.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Stacey&lt;/P&gt;</description>
      <pubDate>Thu, 12 Mar 2015 01:30:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-issues/m-p/2619664#M196212</guid>
      <dc:creator>Stacey Hummer</dc:creator>
      <dc:date>2015-03-12T01:30:57Z</dc:date>
    </item>
    <item>
      <title>HI Stacey. Can you post the</title>
      <link>https://community.cisco.com/t5/network-security/routing-issues/m-p/2619665#M196213</link>
      <description>&lt;P&gt;HI Stacey. Can you post the results of "show log" from both the ASA and switch?&lt;/P&gt;&lt;P&gt;As noted before, in this thread and the other one. I think you have a subnet mask mismatch on your ASA inside interface. The ASA thinks (due to the interface config)&amp;nbsp;that 10.3.0.0/16 is directly connected to the inside interface. But it is not. Some of those networks are behind your core switch. Try to change your ip address on your inside interface on the ASA to "&lt;STRONG&gt;ip address 10.3.0.0 255.255.255.0"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Mar 2015 06:53:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-issues/m-p/2619665#M196213</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-03-12T06:53:37Z</dc:date>
    </item>
    <item>
      <title>Hi StaceyDid a bit more</title>
      <link>https://community.cisco.com/t5/network-security/routing-issues/m-p/2619666#M196214</link>
      <description>&lt;P&gt;Hi Stacey&lt;/P&gt;&lt;P&gt;Did a bit more reading on this and basically it still appears to be the same.&lt;/P&gt;&lt;P&gt;As Andre has suggested it would be better to use the inside interface for managing the ASA if you want to be able to access the ASA from any internal subnet.&lt;/P&gt;&lt;P&gt;Where the management interface would be useful is if you have a truly separate network for managing your devices ie. separate switches etc.&lt;/P&gt;&lt;P&gt;I checked the 9.1 configuration guide and it still says you cannot access the management interface via another interface unless you use a VPN which I don't think is what you want to do.&lt;/P&gt;&lt;P&gt;The main issue is the management interface doesn't support through traffic.&lt;/P&gt;&lt;P&gt;So when you tried to ping originally in your other post the ping arrived on the inside interface but then the ASA tried to send it back via the management interface which it couldn't do. And if you try to connect to the management port the ASA tries to route it back via the inside interface which again doesn't work.&lt;/P&gt;&lt;P&gt;The only way you could use the management interface was as I said either connect from an IP in the management subnet or a subnet that you can add a route to the ASA pointing back out of the management interface.&lt;/P&gt;&lt;P&gt;But obviously this couldn't be any of your user vlans because you need those routed via the inside.&lt;/P&gt;&lt;P&gt;I wouldn't worry about it too much, I have always managed the firewalls using the inside interface because of this very routing issue.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 12 Mar 2015 11:31:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-issues/m-p/2619666#M196214</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-03-12T11:31:31Z</dc:date>
    </item>
    <item>
      <title>I did change that yesterday</title>
      <link>https://community.cisco.com/t5/network-security/routing-issues/m-p/2619667#M196215</link>
      <description>&lt;P&gt;I did change that yesterday before shutting down the management interface. However that didn't fix the issue. I did a ping for 1000 times this morning from the ASA to the 10.2.0.2 ip address min/avg/max = 1/94/860 ms. considering they are directly connected I would think this is an issue. There is nothing in the ASA log, but here is the core log.&lt;/P&gt;&lt;P&gt;nt, src 10.2.0.2, dst 10.3.0.10, topology BASE, dscp 0 topoid 0&lt;BR /&gt;Mar 12 06:33:45.185 MNT: ICMP: echo reply sent, src 10.2.0.2, dst 10.3.0.10, topology BASE, dscp 0 topoid 0&lt;BR /&gt;Mar 12 06:33:45.185 MNT: ICMP: echo reply sent, src 10.2.0.2, dst 10.3.0.10, topology BASE, dscp 0 topoid 0&lt;BR /&gt;Mar 12 06:33:45.764 MNT: ICMP: echo reply sent, src 10.2.0.2, dst 10.3.0.10, topology BASE, dscp 0 topoid 0&lt;BR /&gt;Mar 12 06:33:45.806 MNT: ICMP: echo reply sent, src 10.2.0.2, dst 10.3.0.10, topology BASE, dscp 0 topoid 0&lt;BR /&gt;Mar 12 06:33:45.814 MNT: ICMP: echo reply sent, src 10.2.0.2, dst 10.3.0.10, topology BASE, dscp 0 topoid 0&lt;BR /&gt;Mar 12 06:33:45.823 MNT: ICMP: echo reply sent, src 10.2.0.2, dst 10.3.0.10, topology BASE, dscp 0 topoid 0&lt;BR /&gt;Mar 12 06:33:45.823 MNT: ICMP: echo reply sent, src 10.2.0.2, dst 10.3.0.10, topology BASE, dscp 0 topoid 0&lt;BR /&gt;Mar 12 06:33:45.831 MNT: ICMP: echo reply sent, src 10.2.0.2, dst 10.3.0.10, topology BASE, dscp 0 topoid 0&lt;BR /&gt;Mar 12 06:33:46.662 MNT: ICMP: echo reply sent, src 10.2.0.2, dst 10.3.0.10, topology BASE, dscp 0 topoid 0&lt;BR /&gt;Mar 12 06:33:46.704 MNT: ICMP: echo reply sent, src 10.2.0.2, dst 10.3.0.10, topology BASE, dscp 0 topoid 0&lt;BR /&gt;Mar 12 06:33:46.712 MNT: ICMP: echo reply sent, src 10.2.0.2, dst 10.3.0.10, topology BASE, dscp 0 topoid 0&lt;BR /&gt;Mar 12 06:33:46.721 MNT: ICMP: echo reply sent, src 10.2.0.2, dst 10.3.0.10, topology BASE, dscp 0 topoid 0&lt;BR /&gt;Mar 12 06:33:46.729 MNT: ICMP: echo reply sent, src 10.2.0.2, dst 10.3.0.10, topology BASE, dscp 0 topoid 0&lt;BR /&gt;Mar 12 06:33:46.729 MNT: ICMP: echo reply sent, src 10.2.0.2, dst 10.3.0.10, topology BASE, dscp 0 topoid 0&lt;BR /&gt;Mar 12 06:33:46.737 MNT: ICMP: echo reply sent, src 10.2.0.2, dst 10.3.0.10, topology BASE, dscp 0 topoid 0&lt;BR /&gt;Mar 12 06:33:47.367 MNT: ICMP: echo reply sent, src 10.2.0.2, dst 10.3.0.10, topology BASE, dscp 0 topoid 0&lt;BR /&gt;Mar 12 06:33:47.409 MNT: ICMP: echo reply sent, src 10.2.0.2, dst 10.3.0.10, topology BASE, dscp 0 topoid 0&lt;BR /&gt;Mar 12 06:33:47.417 MNT: ICMP: echo reply sent, src 10.2.0.2, dst 10.3.0.10, topology BASE, dscp 0 topoid 0&lt;BR /&gt;Mar 12 06:33:52.470 MNT: ICMP: redirect sent to 10.2.0.101 for dest 10.8.2.11, use gw 10.2.0.3&lt;BR /&gt;Mar 12 06:33:54.156 MNT: ICMP: redirect sent to 10.2.0.83 for dest 10.8.2.11, use gw 10.2.0.3&lt;BR /&gt;Mar 12 06:33:56.674 MNT: ICMP: redirect sent to 10.2.0.162 for dest 10.3.2.2, use gw 10.2.0.3&lt;BR /&gt;Mar 12 06:34:04.035 MNT: ICMP: redirect sent to 10.2.0.162 for dest 10.8.0.13, use gw 10.2.0.27&lt;BR /&gt;Mar 12 06:34:06.687 MNT: ICMP: redirect sent to 10.2.0.162 for dest 10.3.2.2, use gw 10.2.0.3&lt;BR /&gt;Mar 12 06:34:21.702 MNT: ICMP: redirect sent to 10.2.0.162 for dest 10.3.2.2, use gw 10.2.0.3&lt;BR /&gt;Mar 12 06:34:37.790 MNT: ICMP: redirect sent to 10.2.0.101 for dest 10.8.0.12, use gw 10.2.0.27&lt;BR /&gt;Mar 12 06:34:41.978 MNT: ICMP: redirect sent to 10.2.0.96 for dest 10.8.5.14, use gw 10.2.0.26&lt;BR /&gt;Mar 12 06:34:42.708 MNT: ICMP: redirect sent to 10.2.0.162 for dest 10.8.5.14, use gw 10.2.0.26&lt;BR /&gt;Mar 12 06:34:44.236 MNT: ICMP: redirect sent to 10.2.0.162 for dest 10.3.2.2, use gw 10.2.0.3&lt;BR /&gt;Mar 12 06:34:54.248 MNT: ICMP: redirect sent to 10.2.0.162 for dest 10.3.2.2, use gw 10.2.0.3&lt;BR /&gt;Mar 12 06:35:09.263 MNT: ICMP: redirect sent to 10.2.0.162 for dest 10.3.2.2, use gw 10.2.0.3&lt;BR /&gt;Mar 12 06:35:14.894 MNT: ICMP: redirect sent to 10.2.0.101 for dest 10.3.6.22, use gw 10.2.0.3&lt;BR /&gt;Mar 12 06:35:16.136 MNT: ICMP: redirect sent to 10.2.0.101 for dest 10.8.0.14, use gw 10.2.0.27&lt;BR /&gt;Mar 12 06:35:31.906 MNT: ICMP: redirect sent to 10.2.0.101 for dest 10.8.0.11, use gw 10.2.0.27&lt;BR /&gt;Mar 12 06:35:44.160 MNT: ICMP: redirect sent to 10.2.0.101 for dest 10.8.0.15, use gw 10.2.0.27&lt;BR /&gt;Mar 12 06:35:46.787 MNT: ICMP: redirect sent to 10.2.0.101 for dest 10.3.4.11, use gw 10.2.0.3&lt;BR /&gt;Mar 12 06:35:54.063 MNT: ICMP: redirect sent to 10.2.0.101 for dest 10.8.2.11, use gw 10.2.0.3&lt;BR /&gt;Mar 12 06:36:04.126 MNT: ICMP: redirect sent to 10.2.0.162 for dest 10.8.0.13, use gw 10.2.0.27&lt;BR /&gt;Mar 12 06:36:05.964 MNT: ICMP: redirect sent to 10.2.0.83 for dest 10.8.0.12, use gw 10.2.0.27&lt;BR /&gt;Mar 12 06:36:06.468 MNT: ICMP: redirect sent to 10.2.0.83 for dest 10.8.0.12, use gw 10.2.0.27&lt;BR /&gt;Mar 12 06:36:17.974 MNT: ICMP: redirect sent to 10.2.0.83 for dest 10.8.2.11, use gw 10.2.0.3&lt;/P&gt;&lt;P&gt;I obviously have debug on for icmp.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*** Update, I've been logged into the ASDM for 20 minutes without and reset connections. It seems it needed a little time to settle down. Hopefully the problem is solved. Now I have to connect the SFR defense center to the ASA which isn't work as well. It's a good thing I really like the ASA or I would just stick with the Juniper we have now &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; . Just kidding...&lt;/P&gt;&lt;P&gt;Stacey&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Mar 2015 13:51:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-issues/m-p/2619667#M196215</guid>
      <dc:creator>Stacey Hummer</dc:creator>
      <dc:date>2015-03-12T13:51:36Z</dc:date>
    </item>
  </channel>
</rss>

