<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Problem accessing another public ip in same subnet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462963#M269110</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I know that I'm not beeing clear, It's hard to explain. I have drawn a Visio sketch that I hope clarify my issue. I have nothing to do with the third party site only the Customer site.&lt;/P&gt;&lt;P&gt;Once again, thanks for your time.&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/7/8/2/181287-Problembeskrivning.png" alt="Problembeskrivning.png" class="jive-image-thumbnail jive-image" onclick="" width="450" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 24 Feb 2014 12:58:16 GMT</pubDate>
    <dc:creator>erik.gunstad</dc:creator>
    <dc:date>2014-02-24T12:58:16Z</dc:date>
    <item>
      <title>Problem accessing another public ip in same subnet</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462957#M269104</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have searched around for a previous post regarding this but can't find an issue similar to mine (or I'm just too stupid to understand that it is &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a Cisco 5505 at a small business that I help. The problem is that the ISP are providing public IPs to multiple customers in a /24 subnet. The ASA has a single public IP configured 8.8.8.8 (not really, just for the examples sake) with a subnet mask of 255.255.255.0. &lt;/P&gt;&lt;P&gt;The webserver I have to access is not managed by me and is located in a different location (same town though) has 8.8.8.115, it is located in the same subnet as the ASA.&lt;/P&gt;&lt;P&gt;How would I make this work? I have tried to configure a static arp entry for the web server but it just won't work. If i place a computer directly on the outside interface I have no problem accessing the web server.&lt;/P&gt;&lt;P&gt;I am running ASA version 8.2, but I could upgrade if it would help me solve the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help with this issue is much appreciated.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:49:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462957#M269104</guid>
      <dc:creator>erik.gunstad</dc:creator>
      <dc:date>2019-03-12T03:49:30Z</dc:date>
    </item>
    <item>
      <title>Problem accessing another public ip in same subnet</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462958#M269105</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Erik &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you clarify the topology in relation to the ASA and the web server ie. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) is the web server protected by the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) what interface has the 8.8.8.8 IP ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) what interface is the web server located off eg. inside, DMZ &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4) are you using the real public IP on the web server or are you using a private IP and NAT ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Feb 2014 11:56:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462958#M269105</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2014-02-24T11:56:20Z</dc:date>
    </item>
    <item>
      <title>Problem accessing another public ip in same subnet</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462959#M269106</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your time Jon.&lt;/P&gt;&lt;P&gt;1. The web server is protected by another firewall that I don't know the type of since I'm not responsible for that location. It is a third party web server.&lt;/P&gt;&lt;P&gt;2. It's not really 8.8.8.8 (I know it is a google dns server) but just to have something to referens in this issue. It is used on the wan interface on the customers ASA.&lt;/P&gt;&lt;P&gt;3. The web server will be accessed via the wan interface since it is not located on the same site but share the same public subnet with my customer since their ISP gives out ip addresses from the same /24 subnet. I guess it is to save a couple of public addresses.&lt;/P&gt;&lt;P&gt;4. To access the web server I must use a public address since I can't access it any other way. There is no other path but via the ISP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think this is a ASA specific issue since the third party haven't had this issue with other firewalls and I can access the web server if I remove the ASA and puts the public address on my laptop.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this clarify the issue Jon.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Feb 2014 12:23:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462959#M269106</guid>
      <dc:creator>erik.gunstad</dc:creator>
      <dc:date>2014-02-24T12:23:58Z</dc:date>
    </item>
    <item>
      <title>Problem accessing another public ip in same subnet</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462960#M269107</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Erik&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm still not getting this sorry. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have an ASA with an outside interface of 8.8.8.8 (i know these are dummy addresses). Is that correct ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If so the web server has an IP from the same subnet. But the real web server sits behind another firewall. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So this web server must have a different real IP ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How is the other firewall connected to the ASA ie. which interface on the ASA ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Feb 2014 12:32:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462960#M269107</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2014-02-24T12:32:01Z</dc:date>
    </item>
    <item>
      <title>Problem accessing another public ip in same subnet</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462961#M269108</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Erik,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have static NAT configured on the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to have the following configured on the ASA -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#static (inside,outside) 8.8.8.15 &lt;REAL&gt; inside and outside are the names of the two interrfaces. I have assumed that the server is connected to the interface named "inside" and the IP 8.8.8.8 is configured on the "outside" interface.&lt;/REAL&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You also need to allow this traffic in an access-list that should be applied on the "outside" interface -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#access-list inbound permit tcp any host 8.8.8.15 eq 80 --&amp;gt; this is assuming that "inbound" is the name of the ACL on the outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If there is no ACL applied to the outside interface, you may apply the following command as well -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#access-group inbound in interface outside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Feb 2014 12:32:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462961#M269108</guid>
      <dc:creator>Swaraj Nambiar</dc:creator>
      <dc:date>2014-02-24T12:32:14Z</dc:date>
    </item>
    <item>
      <title>Problem accessing another public ip in same subnet</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462962#M269109</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Erik &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think Swaraj is correct. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was just trying to clarify the topology to make sure this is how you have it setup. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Feb 2014 12:34:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462962#M269109</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2014-02-24T12:34:17Z</dc:date>
    </item>
    <item>
      <title>Problem accessing another public ip in same subnet</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462963#M269110</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I know that I'm not beeing clear, It's hard to explain. I have drawn a Visio sketch that I hope clarify my issue. I have nothing to do with the third party site only the Customer site.&lt;/P&gt;&lt;P&gt;Once again, thanks for your time.&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/7/8/2/181287-Problembeskrivning.png" alt="Problembeskrivning.png" class="jive-image-thumbnail jive-image" onclick="" width="450" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Feb 2014 12:58:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462963#M269110</guid>
      <dc:creator>erik.gunstad</dc:creator>
      <dc:date>2014-02-24T12:58:16Z</dc:date>
    </item>
    <item>
      <title>Problem accessing another public ip in same subnet</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462964#M269111</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for taking the time to answer but this has nothing to do with my issue. I have tried to clarify further in an earlier post answering Jons post.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Feb 2014 13:01:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462964#M269111</guid>
      <dc:creator>erik.gunstad</dc:creator>
      <dc:date>2014-02-24T13:01:20Z</dc:date>
    </item>
    <item>
      <title>Problem accessing another public ip in same subnet</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462965#M269113</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Erik &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Okay, so if you replace the ASA with a laptop using the 8.8.8.8 IP it all works ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So are you doing NAT for the internal clients on the ASA eg. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 &lt;/P&gt;&lt;P&gt;global (outside) 1 interface &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;assuming the clients are connected to the inside interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Feb 2014 13:05:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462965#M269113</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2014-02-24T13:05:29Z</dc:date>
    </item>
    <item>
      <title>Problem accessing another public ip in same subnet</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462966#M269114</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is correct. If i connect a laptop with the public address instead it works. Also, it works from pretty much any other place as long as you are not behind an asa on the same subnet. I can for example connect from my office.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am doing nat &lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_VPNClients&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;The clients are connected to the inside interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Feb 2014 13:14:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462966#M269114</guid>
      <dc:creator>erik.gunstad</dc:creator>
      <dc:date>2014-02-24T13:14:51Z</dc:date>
    </item>
    <item>
      <title>Re: Problem accessing another public ip in same subnet</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462967#M269116</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Erik &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What does the arp table show when you try to connect through the ASA ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the ASA can you ping the other firewall IP ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Feb 2014 13:17:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462967#M269116</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2014-02-24T13:17:16Z</dc:date>
    </item>
    <item>
      <title>Problem accessing another public ip in same subnet</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462968#M269118</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The ASA has a correct ARP entry for the host. &lt;/P&gt;&lt;P&gt;The other firewall does not respond to pings but other host in the public subnet responds to ping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't know if i matters but I do get an entry in the log viewer.&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;4&lt;/TD&gt;&lt;TD&gt;Feb 24 2014&lt;/TD&gt;&lt;TD&gt;13:38:05&lt;/TD&gt;&lt;TD&gt;405001&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Received ARP request collision from 8.8.8.115/0003.fc04.ccbf on interface outside&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Feb 2014 14:01:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462968#M269118</guid>
      <dc:creator>erik.gunstad</dc:creator>
      <dc:date>2014-02-24T14:01:13Z</dc:date>
    </item>
    <item>
      <title>Problem accessing another public ip in same subnet</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462969#M269120</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Erik &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The mac address reported in the ARP colliision message, is that the same mac address shown in the arp cache on the ASA ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Feb 2014 20:13:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462969#M269120</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2014-02-24T20:13:03Z</dc:date>
    </item>
    <item>
      <title>Problem accessing another public ip in same subnet</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462970#M269121</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, marked your anwer as correct by mistake but can't see anywhere to change it. Yes it is correct that that the mac address is the same as in my arp cache on the ASA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Feb 2014 12:48:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462970#M269121</guid>
      <dc:creator>erik.gunstad</dc:creator>
      <dc:date>2014-02-25T12:48:55Z</dc:date>
    </item>
    <item>
      <title>Re: Problem accessing another public ip in same subnet</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462971#M269123</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Erik &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately you can't retract a correct answer mark. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway, can you post the ASA config. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also when you use the laptop with the public IP what is it's default gateway set to ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Feb 2014 13:24:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462971#M269123</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2014-02-25T13:24:15Z</dc:date>
    </item>
    <item>
      <title>Problem accessing another public ip in same subnet</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462972#M269124</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The ISP only specify one gateway in that range and that is 8.8.8.1 so any other would not let me access internet.&lt;/P&gt;&lt;P&gt;Once again thank you for your time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.2(1) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;domain-name XXXXXXX&lt;/P&gt;&lt;P&gt;enable password XXXXXXX encrypted&lt;/P&gt;&lt;P&gt;passwd XXXXXXX encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 8.8.8.8 Outside_IP&lt;/P&gt;&lt;P&gt;name 192.168.20.2 Server&lt;/P&gt;&lt;P&gt;name 192.168.20.11 rav-dc01&lt;/P&gt;&lt;P&gt;name 192.168.20.12 rav-ms01&lt;/P&gt;&lt;P&gt;name 192.168.20.13 rav-rds01&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.20.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address Outside_IP 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa821-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name XXXXXXX&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group protocol TCPUDP&lt;/P&gt;&lt;P&gt; protocol-object udp&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any 192.168.25.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list RemoteVPNSplittunnel standard permit 192.168.20.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp host 100.100.100.228 interface outside eq 3389 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside eq smtp &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit udp any interface outside eq 4125 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside eq 4125 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside eq https &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside eq pptp &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside eq 444 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit gre any interface outside &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit udp any interface outside eq 444 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside eq www &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp host rav-ms01 any eq smtp &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended deny tcp any any eq smtp &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;ip local pool RemoteVPNPool 192.168.25.100-192.168.25.200 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-621.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) udp interface 4125 Server 4125 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 4125 Server 4125 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface https rav-ms01 https netmask 255.255.255.255&amp;nbsp; dns &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface pptp Server pptp netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 3389 rav-rds01 3389 netmask 255.255.255.255&amp;nbsp; dns &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface smtp rav-ms01 smtp netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) udp interface 444 Server 444 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 444 Server 444 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface www Server www netmask 255.255.255.255&amp;nbsp; dns &lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 8.8.8.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa-server rav_Intern protocol radius&lt;/P&gt;&lt;P&gt;aaa-server rav_Intern (inside) host rav-dc01&lt;/P&gt;&lt;P&gt; key CiscoAsa5505RAV2012&lt;/P&gt;&lt;P&gt; radius-common-pw CiscoAsa5505RAV2012&lt;/P&gt;&lt;P&gt;http server enable 8080&lt;/P&gt;&lt;P&gt;http 192.168.20.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.25.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 100.100.101.128 255.255.255.192 outside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;sysopt connection timewait&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption aes-256&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;telnet 192.168.20.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.20.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.20.190-192.168.20.200 inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ntp server rav-dc01 source inside&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;group-policy RemoteVPN internal&lt;/P&gt;&lt;P&gt;group-policy RemoteVPN attributes&lt;/P&gt;&lt;P&gt; wins-server value 192.168.20.11&lt;/P&gt;&lt;P&gt; dns-server value 192.168.20.11&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value RemoteVPNSplittunnel&lt;/P&gt;&lt;P&gt; default-domain value rav.nu&lt;/P&gt;&lt;P&gt; split-dns value rav.nu &lt;/P&gt;&lt;P&gt;username SupportVPN password XXXXXXX encrypted privilege 0&lt;/P&gt;&lt;P&gt;username SupportVPN attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy RemoteVPN&lt;/P&gt;&lt;P&gt;tunnel-group RemoteVPN type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group RemoteVPN general-attributes&lt;/P&gt;&lt;P&gt; address-pool RemoteVPNPool&lt;/P&gt;&lt;P&gt; authentication-server-group rav_Intern&lt;/P&gt;&lt;P&gt; accounting-server-group rav_Intern&lt;/P&gt;&lt;P&gt; default-group-policy RemoteVPN&lt;/P&gt;&lt;P&gt;tunnel-group RemoteVPN ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect pptp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp error &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:8481ab3aa01b23bad17bacb2aca7197a&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-621.bin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Feb 2014 12:20:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462972#M269124</guid>
      <dc:creator>erik.gunstad</dc:creator>
      <dc:date>2014-02-26T12:20:05Z</dc:date>
    </item>
    <item>
      <title>Problem accessing another public ip in same subnet</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462973#M269126</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Erik &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't see anything obviously wrong with your config. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That ARP colliision request message does suggest an issue. It basically means the ASA is seeing the same mac address for two different IP addresses. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could try a "debug arp" (or "debug ip arp") to see if that reveals anything. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Feb 2014 18:45:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-another-public-ip-in-same-subnet/m-p/2462973#M269126</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2014-02-26T18:45:17Z</dc:date>
    </item>
  </channel>
</rss>

