<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I figured it out.  I was in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allowing-traffic-between-different-security-level-interfaces/m-p/2625152#M197492</link>
    <description>&lt;P&gt;I figured it out. &amp;nbsp;I was applying the ACL to the wrong interface. &amp;nbsp;I thought it needed the permission as it entered into the higher level interface (Inside) but turns out that it needed it to leave it's own (Wireless). &amp;nbsp;A simple change to the access-group and it is now working:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From:&lt;/P&gt;&lt;P&gt;access-group wireless in interface INSIDE&lt;/P&gt;&lt;P&gt;To:&lt;/P&gt;&lt;P&gt;access-group wireless in interface WIRELESS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps someone else someday&lt;/P&gt;</description>
    <pubDate>Thu, 29 Jan 2015 17:20:32 GMT</pubDate>
    <dc:creator>Dustin Peet</dc:creator>
    <dc:date>2015-01-29T17:20:32Z</dc:date>
    <item>
      <title>Allowing traffic between different security-level interfaces</title>
      <link>https://community.cisco.com/t5/network-security/allowing-traffic-between-different-security-level-interfaces/m-p/2625151#M197491</link>
      <description>&lt;P&gt;Hello All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm new to the ASA (or firewalls in general) and I'm getting a little stuck with allowing traffic between interfaces. &amp;nbsp;I have two interfaces currently setup and they are used for my inside traffic (connects to a cisco 2611 router) and my wireless traffic (cisco SOHO AP in bridged mode). &amp;nbsp;I'm doing dhcp off the ASA and things are fine until I try to hit a resource in the inside network. &amp;nbsp;They are set at different levels with inside at 100 and wireless at 50 and I know that I'm going to need acls to allow the traffic. &amp;nbsp;I've researched and put things in place that seem right but to no avail. &amp;nbsp;I feel like I'm really close but not quite there. &amp;nbsp;Running code is 8.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Some output of current config:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PeetASA# sh run interface&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;switchport access vlan 200&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;&amp;nbsp;switchport access vlan 18&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;&amp;nbsp;switchport access vlan 100&lt;BR /&gt;&amp;nbsp;switchport trunk allowed vlan 100-101,200&lt;BR /&gt;&amp;nbsp;speed 10&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Vlan18&lt;BR /&gt;&amp;nbsp;nameif WIRELESS&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 10.200.200.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan100&lt;BR /&gt;&amp;nbsp;nameif INSIDE&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.100.100.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan200&lt;BR /&gt;&amp;nbsp;nameif OUTSIDE&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address dhcp setroute&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PeetASA(config)# sh run access-list&lt;BR /&gt;access-list wireless extended permit ip any any&lt;BR /&gt;access-list wireless extended permit icmp any any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PeetASA(config)# sh run access-group&lt;BR /&gt;access-group wireless in interface INSIDE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;on one forum I read that you will need to nat between the interfaces with static statements, so I added these also:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PeetASA(config)# sh run static&lt;BR /&gt;static (INSIDE,WIRELESS) 10.100.100.0 10.100.100.0 netmask 255.255.255.0&lt;BR /&gt;static (WIRELESS,INSIDE) 10.200.200.0 10.200.200.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know that an ASA should not be used as a router, but to find it's way to other subnets in my network I have a couple routes in play also:&lt;/P&gt;&lt;P&gt;PeetASA(config)# sh route&lt;/P&gt;&lt;P&gt;Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;* - candidate default, U - per-user static route, o - ODR&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;P - periodic downloaded static route&lt;/P&gt;&lt;P&gt;Gateway of last resort is XXX.XXX.XXX.XXX&amp;nbsp;to network 0.0.0.0&lt;/P&gt;&lt;P&gt;S &amp;nbsp; &amp;nbsp;172.19.0.0 255.255.0.0 [1/0] via 10.100.100.2, INSIDE&lt;BR /&gt;S &amp;nbsp; &amp;nbsp;10.0.0.0 255.0.0.0 [1/0] via 10.100.100.2, INSIDE&lt;BR /&gt;C &amp;nbsp; &amp;nbsp;10.200.200.0 255.255.255.0 is directly connected, WIRELESS&lt;BR /&gt;C &amp;nbsp; &amp;nbsp;10.100.100.0 255.255.255.0 is directly connected, INSIDE&lt;BR /&gt;d* &amp;nbsp; 0.0.0.0 0.0.0.0 [1/0] via XXX.XXX.XXX.XXX, OUTSIDE&lt;BR /&gt;S &amp;nbsp; &amp;nbsp;192.168.0.0 255.255.0.0 [1/0] via 10.100.100.2, INSIDE&lt;BR /&gt;C &amp;nbsp; &amp;nbsp;XXX.XXX.XXX.XXX&amp;nbsp;255.255.248.0 is directly connected, OUTSIDE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not sure what I'm missing, seems like it should work.&amp;nbsp;I'm starting very general, but eventually what I want is to be able to allow certain devices to cross the networks (aka I can hit internal resources from my machine while on wireless but nobody else can) but for now any-any will work.&lt;/P&gt;&lt;P&gt;Thanks for reading!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:25:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-traffic-between-different-security-level-interfaces/m-p/2625151#M197491</guid>
      <dc:creator>Dustin Peet</dc:creator>
      <dc:date>2019-03-12T05:25:03Z</dc:date>
    </item>
    <item>
      <title>I figured it out.  I was</title>
      <link>https://community.cisco.com/t5/network-security/allowing-traffic-between-different-security-level-interfaces/m-p/2625152#M197492</link>
      <description>&lt;P&gt;I figured it out. &amp;nbsp;I was applying the ACL to the wrong interface. &amp;nbsp;I thought it needed the permission as it entered into the higher level interface (Inside) but turns out that it needed it to leave it's own (Wireless). &amp;nbsp;A simple change to the access-group and it is now working:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From:&lt;/P&gt;&lt;P&gt;access-group wireless in interface INSIDE&lt;/P&gt;&lt;P&gt;To:&lt;/P&gt;&lt;P&gt;access-group wireless in interface WIRELESS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps someone else someday&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2015 17:20:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-traffic-between-different-security-level-interfaces/m-p/2625152#M197492</guid>
      <dc:creator>Dustin Peet</dc:creator>
      <dc:date>2015-01-29T17:20:32Z</dc:date>
    </item>
  </channel>
</rss>

