<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA with routing problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-with-routing-problem/m-p/2436379#M270321</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share the ASA configurations?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What does the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; say about ICMP from &lt;STRONG&gt;"dmz"&lt;/STRONG&gt; to &lt;STRONG&gt;"outside"&lt;/STRONG&gt;?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input dmz icmp 192.168.200.2 8 0 192.168.100.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 04 Feb 2014 13:19:00 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2014-02-04T13:19:00Z</dc:date>
    <item>
      <title>ASA with routing problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-routing-problem/m-p/2436378#M270316</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please advise that why I am unable to ping from R3 (DMZ) to R2 (Outside), but able to ping from R1 (Inside) to R2 (Outside) via ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I ahve attached the diagram for clarification.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below are the configurations from all devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R1#sh ip route&lt;/P&gt;&lt;P&gt;Gateway of last resort is 192.168.0.1 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.0.0.0/24 is subnetted, 3 subnets&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.10.10.0 is directly connected, Loopback1&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.10.11.0 is directly connected, Loopback2&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.10.12.0 is directly connected, Loopback3&lt;/P&gt;&lt;P&gt;C&amp;nbsp; 192.168.0.0/24 is directly connected, FastEthernet0/0&lt;/P&gt;&lt;P&gt;S*&amp;nbsp; 0.0.0.0/0 [1/0] via 192.168.0.1&lt;/P&gt;&lt;P&gt;R1#&lt;/P&gt;&lt;P&gt;##############################&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# sh ip add&lt;/P&gt;&lt;P&gt;System IP Addresses:&lt;/P&gt;&lt;P&gt;Interface&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP address&amp;nbsp;&amp;nbsp;&amp;nbsp; Subnet mask&amp;nbsp;&amp;nbsp;&amp;nbsp; Method&lt;/P&gt;&lt;P&gt;GigabitEthernet0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.100.1&amp;nbsp; 255.255.255.0&amp;nbsp; manual&lt;/P&gt;&lt;P&gt;GigabitEthernet1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dmz&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.200.1&amp;nbsp; 255.255.255.0&amp;nbsp; manual&lt;/P&gt;&lt;P&gt;GigabitEthernet2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.1&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp; manual&lt;/P&gt;&lt;P&gt;Current IP Addresses:&lt;/P&gt;&lt;P&gt;Interface&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP address&amp;nbsp;&amp;nbsp;&amp;nbsp; Subnet mask&amp;nbsp;&amp;nbsp;&amp;nbsp; Method&lt;/P&gt;&lt;P&gt;GigabitEthernet0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.100.1&amp;nbsp; 255.255.255.0&amp;nbsp; manual&lt;/P&gt;&lt;P&gt;GigabitEthernet1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dmz&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.200.1&amp;nbsp; 255.255.255.0&amp;nbsp; manual&lt;/P&gt;&lt;P&gt;GigabitEthernet2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.1&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp; manual&lt;/P&gt;&lt;P&gt;ciscoasa#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# sh run access-list&lt;/P&gt;&lt;P&gt;access-list ALOW-IN-&amp;gt;OUT extended permit tcp any any log&lt;/P&gt;&lt;P&gt;access-list ALOW-IN-&amp;gt;OUT extended permit icmp any any log&lt;/P&gt;&lt;P&gt;ciscoasa(config)#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# show run access-group&lt;/P&gt;&lt;P&gt;access-group ALOW-IN-&amp;gt;OUT in interface outside&lt;/P&gt;&lt;P&gt;ciscoasa#&lt;/P&gt;&lt;P&gt;###############################&lt;/P&gt;&lt;P&gt;R2#show ip route&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gateway of last resort is 192.168.100.1 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;C&amp;nbsp; 192.168.100.0/24 is directly connected, FastEthernet0/0&lt;/P&gt;&lt;P&gt;S*&amp;nbsp; 0.0.0.0/0 [1/0] via 192.168.100.1&lt;/P&gt;&lt;P&gt;R2#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R2#sh ip int br&lt;/P&gt;&lt;P&gt;Interface&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP-Address&amp;nbsp;&amp;nbsp;&amp;nbsp; OK? Method Status&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol&lt;/P&gt;&lt;P&gt;FastEthernet0/0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.100.2&amp;nbsp; YES manual up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; up&lt;/P&gt;&lt;P&gt;FastEthernet0/1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; unassigned&amp;nbsp;&amp;nbsp;&amp;nbsp; YES unset administratively down down&lt;/P&gt;&lt;P&gt;R2#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;##################################&lt;/P&gt;&lt;P&gt;R3#sh ip int br&lt;/P&gt;&lt;P&gt;Interface&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP-Address&amp;nbsp;&amp;nbsp;&amp;nbsp; OK? Method Status&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol&lt;/P&gt;&lt;P&gt;FastEthernet0/0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.200.2&amp;nbsp; YES manual up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; up&lt;/P&gt;&lt;P&gt;FastEthernet0/1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; unassigned&amp;nbsp;&amp;nbsp;&amp;nbsp; YES unset administratively down down&lt;/P&gt;&lt;P&gt;Loopback1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 11.11.11.1&amp;nbsp;&amp;nbsp;&amp;nbsp; YES manual up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; up&lt;/P&gt;&lt;P&gt;Loopback2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 11.11.12.1&amp;nbsp;&amp;nbsp;&amp;nbsp; YES manual up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; up&lt;/P&gt;&lt;P&gt;Loopback3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 11.11.13.1&amp;nbsp;&amp;nbsp;&amp;nbsp; YES manual up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; up&lt;/P&gt;&lt;P&gt;R3#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R3#sh ip route&lt;/P&gt;&lt;P&gt;Gateway of last resort is 192.168.200.1 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;C&amp;nbsp; 192.168.200.0/24 is directly connected, FastEthernet0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 11.0.0.0/24 is subnetted, 3 subnets&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 11.11.11.0 is directly connected, Loopback1&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 11.11.12.0 is directly connected, Loopback2&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 11.11.13.0 is directly connected, Loopback3&lt;/P&gt;&lt;P&gt;S*&amp;nbsp; 0.0.0.0/0 [1/0] via 192.168.200.1&lt;/P&gt;&lt;P&gt;R3#&lt;/P&gt;&lt;P&gt;##########################&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:40:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-routing-problem/m-p/2436378#M270316</guid>
      <dc:creator>raza555</dc:creator>
      <dc:date>2019-03-12T03:40:12Z</dc:date>
    </item>
    <item>
      <title>ASA with routing problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-routing-problem/m-p/2436379#M270321</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share the ASA configurations?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What does the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; say about ICMP from &lt;STRONG&gt;"dmz"&lt;/STRONG&gt; to &lt;STRONG&gt;"outside"&lt;/STRONG&gt;?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input dmz icmp 192.168.200.2 8 0 192.168.100.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 13:19:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-routing-problem/m-p/2436379#M270321</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-02-04T13:19:00Z</dc:date>
    </item>
    <item>
      <title>ASA with routing problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-routing-problem/m-p/2436380#M270326</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems by packet-tracer that packets are droped by implicit rule but I have configured ACL "&lt;/P&gt;&lt;P&gt;access-list ALOW-IN-&amp;gt;OUT extended permit icmp any any log&lt;/P&gt;&lt;P&gt;access-group ALOW-IN-&amp;gt;OUT in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not understanding that why packet is droping by implicit rule.&lt;/P&gt;&lt;P&gt;#############################&lt;/P&gt;&lt;P&gt;ciscoasa(config)# packet-tracer input dmz icmp 192.168.200.2 0 0 192.168.100.2&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 192.168.100.0&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: dmz&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;ciscoasa(config)#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;########################################&lt;BR /&gt;ASA CONFIGURATIONS&lt;/P&gt;&lt;P&gt;#########################################&lt;/P&gt;&lt;P&gt;ciscoasa(config)# sh run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.4(2)&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 192.168.100.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 192.168.200.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet2&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.0.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet4&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet5&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network Internal-10.10.10.0&lt;BR /&gt; subnet 10.10.10.0 255.255.255.0&lt;BR /&gt;object network Internal-10.10.11.0&lt;BR /&gt; subnet 10.10.11.0 255.255.255.0&lt;BR /&gt;object network Internal-0.0.0.0&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network DMZ-Source-11.11.11.0&lt;BR /&gt; subnet 11.11.11.0 255.255.255.0&lt;BR /&gt;object network DMZ-Destination-192.168.100.0&lt;BR /&gt; subnet 192.168.100.0 255.255.255.0&lt;BR /&gt;object network DMZ-NAT-192.168.100.202&lt;BR /&gt; host 192.168.100.202&lt;BR /&gt;object network Inside-192.168.0.0&lt;BR /&gt; subnet 192.168.0.0 255.255.255.0&lt;BR /&gt;object network Inside-NAT-192.168.0.202&lt;BR /&gt; host 192.168.0.202&lt;BR /&gt;object network Internal-10.10.12.0&lt;BR /&gt; subnet 10.10.12.0 255.255.255.0&lt;BR /&gt;object network DMZ-0.0.0.0&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network DMZ-NAT-192.168.100.205-210&lt;BR /&gt; range 192.168.100.205 192.168.100.210&lt;BR /&gt;access-list ALOW-IN-&amp;gt;OUT extended permit tcp any any log&lt;BR /&gt;access-list ALOW-IN-&amp;gt;OUT extended permit icmp any any log&lt;BR /&gt;pager lines 24&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (dmz,outside) source dynamic DMZ-Source-11.11.11.0 DMZ-NAT-192.168.100.202 destination static DMZ-Destination-192.168.100.0 DMZ-Destination-192.168.100.0&lt;BR /&gt;nat (dmz,inside) source dynamic DMZ-Source-11.11.11.0 Inside-NAT-192.168.0.202 destination static Inside-192.168.0.0 Inside-192.168.0.0&lt;BR /&gt;nat (dmz,outside) source dynamic DMZ-NAT-192.168.100.205-210 interface&lt;BR /&gt;!&lt;BR /&gt;object network Internal-10.10.10.0&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt;object network Internal-10.10.11.0&lt;BR /&gt; nat (inside,outside) dynamic 192.168.100.200&lt;BR /&gt;object network Internal-0.0.0.0&lt;BR /&gt; nat (inside,outside) dynamic 192.168.100.201&lt;BR /&gt;object network Internal-10.10.12.0&lt;BR /&gt; nat (inside,dmz) dynamic 30.30.30.1&lt;BR /&gt;access-group ALOW-IN-&amp;gt;OUT in interface dmz&lt;BR /&gt;access-group ALOW-IN-&amp;gt;OUT in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 192.168.100.1 1&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 192.168.100.2 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.0.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt; crl configure&lt;BR /&gt;crypto ca certificate chain _SmartCallHome_ServerCA&lt;BR /&gt; &lt;BR /&gt;I HAVE DELETED THE CERTIFICATE, SO THAT ITS EASY TO READ THE CONFIG&lt;/P&gt;&lt;P&gt;&amp;nbsp; quit&lt;BR /&gt;telnet 192.168.0.0 255.255.255.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;prompt hostname context&lt;BR /&gt;call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt; profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email &lt;A href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;crashinfo save disable&lt;BR /&gt;Cryptochecksum:9973f66e8707194e89f9704a8299bfde&lt;BR /&gt;: end&lt;BR /&gt;ciscoasa(config)#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 13:55:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-routing-problem/m-p/2436380#M270326</guid>
      <dc:creator>raza555</dc:creator>
      <dc:date>2014-02-04T13:55:08Z</dc:date>
    </item>
    <item>
      <title>ASA with routing problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-routing-problem/m-p/2436381#M270329</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Rizwan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please try to use the following command and then check, since DMZ and outside interface are both on same security level:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-permit traffic inter-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Prateek Verma&lt;/P&gt;&lt;DIV id="__tbSetup"&gt; &lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 13:59:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-routing-problem/m-p/2436381#M270329</guid>
      <dc:creator>prateeve</dc:creator>
      <dc:date>2014-02-04T13:59:18Z</dc:date>
    </item>
    <item>
      <title>ASA with routing problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-routing-problem/m-p/2436382#M270331</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As soon I have configured the "same-security-permit traffic inter-interface", issue resolved. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for clarifying it. Now I ping from DMZ(security 0) to Outside subnet (Security 0)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 14:04:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-routing-problem/m-p/2436382#M270331</guid>
      <dc:creator>raza555</dc:creator>
      <dc:date>2014-02-04T14:04:04Z</dc:date>
    </item>
    <item>
      <title>ASA with routing problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-routing-problem/m-p/2436383#M270334</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Prateek&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just for my own learning if instead of using the "same-security-permit traffic inter-interface" command you added an acl to the DMZ interface allowing the traffic would that have solved the issue as well ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 14:55:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-routing-problem/m-p/2436383#M270334</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2014-02-04T14:55:45Z</dc:date>
    </item>
    <item>
      <title>ASA with routing problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-routing-problem/m-p/2436384#M270339</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV id="__tbSetup"&gt; &lt;/DIV&gt;&lt;P&gt;Hi Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No that would not allow the traffic , it would still show drop in packet-tracer under ACL drop. If 2&amp;nbsp; dfferent interfaces are at same security level then you need inter-interface command and if you need to access anything behind same interface and traffic is going through firewall then you would required same-security-traffic permit intra-interface command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Prateek Verma&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 15:00:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-routing-problem/m-p/2436384#M270339</guid>
      <dc:creator>prateeve</dc:creator>
      <dc:date>2014-02-04T15:00:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA with routing problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-routing-problem/m-p/2436385#M270341</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Prateek &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Okay, i think i understand it but just to be sure. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If two interfaces are the same security level then no matter what you do in terms of acls traffic will still not flow until you enable the "same-security-permit traffic inter-interface".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you have added that command if you do have acls applied to the intefaces they are still checked and traffic could still be dropped. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the above correct ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 15:06:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-routing-problem/m-p/2436385#M270341</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2014-02-04T15:06:51Z</dc:date>
    </item>
    <item>
      <title>ASA with routing problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-routing-problem/m-p/2436386#M270342</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV id="__tbSetup"&gt; &lt;/DIV&gt;&lt;P&gt;Hi Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It will not check even the access-rule , the packet would get dropped before checking the access-rule as you could see in the packet-tracer output above, but the drop you would see in packet-tracer would be under ACL drop.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Prateek Verma&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 15:10:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-routing-problem/m-p/2436386#M270342</guid>
      <dc:creator>prateeve</dc:creator>
      <dc:date>2014-02-04T15:10:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASA with routing problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-routing-problem/m-p/2436387#M270343</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Prateek&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry, i didn't explain myself very well. What i meant was that assuming two interfaces have the same security level and the "same-security-traffic permit inter-interface" command was not configured then - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) it doesn't matter what else you configure in terms of acls etc. traffic still will not flow between those interface. From your responses i am pretty certain this is what you are saying &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) if you then enable "same-security-traffic permit inter-interface" which allows traffic between those interfaces can you still control exactly which traffic by using acls on the interfaces ie. are acls still checked with this command enabled. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just want to make sure i understand it fully as it does not work the way i thought it did.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 15:18:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-routing-problem/m-p/2436387#M270343</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2014-02-04T15:18:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA with routing problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-routing-problem/m-p/2436388#M270344</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV id="__tbSetup"&gt; &lt;/DIV&gt;&lt;P&gt;Hi Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Yes, you need to configure that command , it doesn't matter if the traffic is allowed in ACL as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Yes, you could still use ACL to control the traffic flow even if that command is present.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Prateek Verma&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 15:21:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-routing-problem/m-p/2436388#M270344</guid>
      <dc:creator>prateeve</dc:creator>
      <dc:date>2014-02-04T15:21:41Z</dc:date>
    </item>
    <item>
      <title>ASA with routing problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-with-routing-problem/m-p/2436389#M270345</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Prateek &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks for clearing that up. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 15:23:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-with-routing-problem/m-p/2436389#M270345</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2014-02-04T15:23:51Z</dc:date>
    </item>
  </channel>
</rss>

