<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Transparent mode implies the in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-quick-question/m-p/2475597#M238128</link>
    <description>&lt;P&gt;Transparent mode implies the ASA is a layer two "bump on the wire". My guess is yes, you can only use two interfaces since you're logically on the same VLAN upon entry and exit.&lt;/P&gt;</description>
    <pubDate>Wed, 28 May 2014 15:22:10 GMT</pubDate>
    <dc:creator>jason.loera</dc:creator>
    <dc:date>2014-05-28T15:22:10Z</dc:date>
    <item>
      <title>ASA Transparent Mode quick question</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-quick-question/m-p/2475596#M238126</link>
      <description>&lt;P&gt;Hello Community,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you please confirm if we still have the restriction of only being able to use two interfaces when the ASA is in transparent mode?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Even in 9.2 code?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:15:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-mode-quick-question/m-p/2475596#M238126</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2019-03-12T04:15:09Z</dc:date>
    </item>
    <item>
      <title>Transparent mode implies the</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-quick-question/m-p/2475597#M238128</link>
      <description>&lt;P&gt;Transparent mode implies the ASA is a layer two "bump on the wire". My guess is yes, you can only use two interfaces since you're logically on the same VLAN upon entry and exit.&lt;/P&gt;</description>
      <pubDate>Wed, 28 May 2014 15:22:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-mode-quick-question/m-p/2475597#M238128</guid>
      <dc:creator>jason.loera</dc:creator>
      <dc:date>2014-05-28T15:22:10Z</dc:date>
    </item>
    <item>
      <title>Thank you for your response.</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-quick-question/m-p/2475598#M238130</link>
      <description>&lt;P&gt;Thank you for your response.&amp;nbsp;&lt;/P&gt;&lt;P&gt;My understanding is that you're on the same Layer 3 subnet but on different VLANs upon entry and exit. And my confusion is that the documentation says you can have up to 8 bridge groups (each bridge group belonging to a separate subnet).&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I'm not sure if that means you can have up to 8 different DMZs directly connected to the ASA?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE border="1" bordercolor="#808080" cellpadding="3" cellspacing="0" style="color: rgb(0, 0, 0); font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: normal; background-color: rgb(255, 255, 255);" width="80%"&gt;&lt;TBODY&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;P class="pB1_Body1" style="font-size: 12px; margin: 1px 0em 6px; text-indent: 0em;"&gt;Bridge groups for transparent mode&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P class="pB1_Body1" style="font-size: 12px; margin: 1px 0em 6px; text-indent: 0em;"&gt;&lt;A name="pgfId-1322251"&gt;&lt;/A&gt;8.4(1)&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P class="pB1_Body1" style="font-size: 12px; margin: 1px 0em 6px; text-indent: 0em;"&gt;&lt;A name="pgfId-1322253"&gt;&lt;/A&gt;If you do not want the overhead of security contexts, or want to maximize your use of security contexts, you can group interfaces together in a bridge group, and then configure multiple bridge groups, one for each network. Bridge group traffic is isolated from other bridge groups. You can configure up to eight bridge groups of four interfaces each in single mode or per context.&lt;/P&gt;&lt;P class="pB1_Body1" style="font-size: 12px; margin: 1px 0em 6px; text-indent: 0em;"&gt;&lt;A name="pgfId-1692580"&gt;&lt;/A&gt;We introduced the following commands:&amp;nbsp;&lt;B class="cBold"&gt;interface bvi&lt;/B&gt;&amp;nbsp;,&amp;nbsp;&lt;B class="cBold"&gt;show bridge-group&lt;/B&gt;&amp;nbsp;.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Wed, 28 May 2014 15:25:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-mode-quick-question/m-p/2475598#M238130</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2014-05-28T15:25:38Z</dc:date>
    </item>
    <item>
      <title>You can have multiple</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-quick-question/m-p/2475599#M238133</link>
      <description>&lt;P&gt;You can have multiple networks connected to the back end. Cisco's documentation is confusing on this, however. In my experience, I was able to accomplish this by using a router on each end of the firewall. The internal router acted as the gateway for all of my internal networks whereas the external router was my WAN-facing router. It was more costly and not an ideal solution, but it worked.&lt;/P&gt;</description>
      <pubDate>Wed, 28 May 2014 15:41:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-mode-quick-question/m-p/2475599#M238133</guid>
      <dc:creator>jason.loera</dc:creator>
      <dc:date>2014-05-28T15:41:26Z</dc:date>
    </item>
    <item>
      <title>Thank you for your help. In</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-quick-question/m-p/2475600#M238134</link>
      <description>&lt;P&gt;Thank you for your help.&amp;nbsp;&lt;/P&gt;&lt;P&gt;In version 7.x this is what the documentation says:&amp;nbsp;&lt;/P&gt;&lt;P&gt;The transparent security appliance uses an inside interface and an outside interface only. If your platform includes a dedicated management interface, you can also configure the management interface or subinterface for management traffic only.&lt;BR /&gt;In single mode, you can only use two data interfaces (and the dedicated management interface, if available) even if your security appliance includes more than two interfaces.&lt;/P&gt;&lt;P&gt;But since release 8.4(1), you can now use Bridge Groups.&amp;nbsp;&lt;BR /&gt;That mean the above is no longer a restriction and you can have up to 8 directly-connected DMZs?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 May 2014 15:42:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-mode-quick-question/m-p/2475600#M238134</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2014-05-28T15:42:21Z</dc:date>
    </item>
    <item>
      <title>I guess the only thing I want</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-quick-question/m-p/2475601#M238136</link>
      <description>&lt;P style="margin-bottom: 0px; font-size: 12px; line-height: normal; font-family: Helvetica;"&gt;I guess the only thing I want to know is if you can have the following:&amp;nbsp;&lt;/P&gt;&lt;P style="margin-bottom: 0px; font-size: 12px; line-height: normal; font-family: Helvetica; min-height: 14px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-bottom: 0px; font-size: 12px; line-height: normal; font-family: Helvetica;"&gt;8 subnets: 192.168.0.0/24 - 192.168.7.0/24&amp;nbsp;&lt;/P&gt;&lt;P style="margin-bottom: 0px; font-size: 12px; line-height: normal; font-family: Helvetica;"&gt;Each segment directly connected to the ASA, and each one having the default GW the router (not the ASA).&amp;nbsp;&lt;/P&gt;&lt;P style="margin-bottom: 0px; font-size: 12px; line-height: normal; font-family: Helvetica; min-height: 14px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-bottom: 0px; font-size: 12px; line-height: normal; font-family: Helvetica;"&gt;And if so, this means the restriction of only being able to use a single inside/outside interface is no longer there?&lt;/P&gt;&lt;P style="margin-bottom: 0px; font-size: 12px; line-height: normal; font-family: Helvetica;"&gt;Basically the ASA can now handle traffic from 8 different subnets separately in transparent mode?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 May 2014 15:53:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-mode-quick-question/m-p/2475601#M238136</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2014-05-28T15:53:27Z</dc:date>
    </item>
    <item>
      <title>You're absolutely right the</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-quick-question/m-p/2475602#M238140</link>
      <description>&lt;P&gt;You're absolutely right the documentation is not clear!&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you please look at this and see if means I can use multiple physical interfaces on the ASA now in transparent mode.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H3 class="p_H_Head2" style="font-size: 13px; color: rgb(51, 102, 102); font-weight: bold; font-family: Arial, Helvetica, sans-serif; margin: 14px 0em 7px -0.1in; line-height: normal;"&gt;Interfaces in Transparent Mode&lt;/H3&gt;&lt;P class="pB1_Body1" style="color: rgb(0, 0, 0); font-family: Arial, Helvetica, sans-serif; font-size: 12px; margin: 1px 0em 6px; line-height: normal;"&gt;&lt;A name="pgfId-1324531"&gt;&lt;/A&gt;Interfaces in transparent mode belong to a “bridge group,” one bridge group for each network. You can have up to 8 bridge groups of 4 interfaces each per context or in single mode. For more information about bridge groups, see&amp;nbsp;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa92/configuration/general/asa-general-cli/interface-transparent.html#26418" style="color: rgb(51, 102, 204);"&gt;Bridge Groups in Transparent Mode&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa92/configuration/general/asa-general-cli/interface-basic.html#pgfId-1324530&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 May 2014 16:05:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-mode-quick-question/m-p/2475602#M238140</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2014-05-28T16:05:38Z</dc:date>
    </item>
    <item>
      <title>Yes. You can separate each</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-quick-question/m-p/2475603#M238144</link>
      <description>&lt;P&gt;Yes. You can separate each network into a different bridge group. However, at this point, you may be better off using your ASA in routed mode. You'll have more control over internal traffic (i.e. traffic between networks) and your network is more scalable for future growth.&lt;/P&gt;</description>
      <pubDate>Wed, 28 May 2014 18:20:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-mode-quick-question/m-p/2475603#M238144</guid>
      <dc:creator>jason.loera</dc:creator>
      <dc:date>2014-05-28T18:20:01Z</dc:date>
    </item>
    <item>
      <title>As for physical interfaces,</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-quick-question/m-p/2475604#M238148</link>
      <description>&lt;P&gt;As for physical interfaces, yes. You can assign a different VLAN to each interface.&lt;/P&gt;</description>
      <pubDate>Wed, 28 May 2014 18:21:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-mode-quick-question/m-p/2475604#M238148</guid>
      <dc:creator>jason.loera</dc:creator>
      <dc:date>2014-05-28T18:21:15Z</dc:date>
    </item>
    <item>
      <title>Jason, if I want to do this:</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-quick-question/m-p/2475605#M238153</link>
      <description>&lt;P&gt;Jason, if I want to do this:&amp;nbsp;&lt;/P&gt;&lt;P style="color: rgb(34, 34, 34); line-height: normal; margin-bottom: 0px; font-size: 12px; font-family: Helvetica;"&gt;I have 6 different inside Layer 3 subnets that I need to pass through the ASA in transparent mode to the outside interface.&amp;nbsp;&lt;/P&gt;&lt;P style="color: rgb(34, 34, 34); line-height: normal; margin-bottom: 0px; font-size: 12px; font-family: Helvetica; min-height: 14px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="color: rgb(34, 34, 34); line-height: normal; margin-bottom: 0px; font-size: 12px; font-family: Helvetica;"&gt;&lt;A href="http://192.168.15.0/24" style="color: rgb(17, 85, 204);" target="_blank"&gt;192.168.15.0/24&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="color: rgb(34, 34, 34); line-height: normal; margin-bottom: 0px; font-size: 12px; font-family: Helvetica;"&gt;&lt;A href="http://192.168.200.0/24" style="color: rgb(17, 85, 204);" target="_blank"&gt;192.168.200.0/24&lt;/A&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; ——&amp;gt; &amp;nbsp; &amp;nbsp; ASA&amp;nbsp; ——&amp;gt; &amp;nbsp; External Network&amp;nbsp;&lt;/P&gt;&lt;P style="color: rgb(34, 34, 34); line-height: normal; margin-bottom: 0px; font-size: 12px; font-family: Helvetica;"&gt;&lt;A href="http://172.16.104.0/22" style="color: rgb(17, 85, 204);" target="_blank"&gt;172.16.104.0/22&lt;/A&gt;, etc. &amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P style="color: rgb(34, 34, 34); line-height: normal; margin-bottom: 0px; font-size: 12px; font-family: Helvetica;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="color: rgb(34, 34, 34); line-height: normal; margin-bottom: 0px; font-size: 12px; font-family: Helvetica;"&gt;I need a router on the inside of the ASA. Cannot do it directly (without the inside router). That's what you're saying?&amp;nbsp;&lt;/P&gt;&lt;P style="color: rgb(34, 34, 34); line-height: normal; margin-bottom: 0px; font-size: 12px; font-family: Helvetica;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="color: rgb(34, 34, 34); line-height: normal; margin-bottom: 0px; font-size: 12px; font-family: Helvetica;"&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 28 May 2014 20:13:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-mode-quick-question/m-p/2475605#M238153</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2014-05-28T20:13:41Z</dc:date>
    </item>
    <item>
      <title>According to Cisco's</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-quick-question/m-p/2475606#M238157</link>
      <description>&lt;P&gt;According to Cisco's documentation, it's possible. However, I've never been able to get it to work. Using the ASA as the router in routed mode would accomplish this, too.&lt;/P&gt;</description>
      <pubDate>Wed, 28 May 2014 22:53:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-mode-quick-question/m-p/2475606#M238157</guid>
      <dc:creator>jason.loera</dc:creator>
      <dc:date>2014-05-28T22:53:42Z</dc:date>
    </item>
  </channel>
</rss>

