<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic No access to an ASA's interface from behind the other one in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/no-access-to-an-asa-s-interface-from-behind-the-other-one/m-p/2392364#M271140</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That sounds like the same issue I have. I have a router on each of the ASA ports 0/0 LAN (inside) 0/1 WAN (Outside) 0/2 DMZ (Cisco-2821) 0/3 VOIP (Cisco-3745).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am I to understand that I cannot route traffic for clients behind the 2821 (DMZ) to clients behind the LAN (Inside) interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Wow, why would that not allow traffic between interfaces?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 22 Jan 2014 16:34:14 GMT</pubDate>
    <dc:creator>metuckness</dc:creator>
    <dc:date>2014-01-22T16:34:14Z</dc:date>
    <item>
      <title>No access to an ASA's interface from behind the other one</title>
      <link>https://community.cisco.com/t5/network-security/no-access-to-an-asa-s-interface-from-behind-the-other-one/m-p/2392359#M271120</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm facing the issue of not being able to access the "dmz" interface from behind the "internet" interface.&lt;/P&gt;&lt;P&gt;Here is a breif portray of the topology:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/1/1/8/177811-asa.jpg" alt="asa.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;Input access list on the "internet" allows required traffic to 1xx.xxx.172.1.&lt;/P&gt;&lt;P&gt;No nat is configured between these interfaces.&lt;/P&gt;&lt;P&gt;Routing is OK because hosts in the DMZ network are accessible from the Internet.&lt;/P&gt;&lt;P&gt;Software version is 9.1(3).&lt;/P&gt;&lt;P&gt;Security level of the interfaces is the same.&lt;/P&gt;&lt;P&gt;Same-security inter-interface traffic is permitted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what packet tracer says:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;# packet-tracer input internet udp 7x.xxx.224.140 30467 1xx.xxx.172.1 500 det&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;Phase: 1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;Type: ROUTE-LOOKUP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;Subtype: input&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;in&amp;nbsp;&amp;nbsp; 1xx.xxx.172.1&amp;nbsp;&amp;nbsp; 255.255.255.255 identity&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;Phase: 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;Type: ROUTE-LOOKUP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;Subtype: input&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;in&amp;nbsp;&amp;nbsp; 1xx.xxx.172.1&amp;nbsp;&amp;nbsp; 255.255.255.255 identity&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;Result:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;input-interface: internet&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;input-status: up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;input-line-status: up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;output-interface: NP Identity Ifc&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;output-status: up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;output-line-status: up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;Action: drop&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;Drop-reason: (no-route) No route to host&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;Please help me to find out the cause why asa cannot find the route to its own interface.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;Thank you in advance.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:33:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-access-to-an-asa-s-interface-from-behind-the-other-one/m-p/2392359#M271120</guid>
      <dc:creator>maxmogorean</dc:creator>
      <dc:date>2019-03-12T03:33:42Z</dc:date>
    </item>
    <item>
      <title>No access to an ASA's interface from behind the other one</title>
      <link>https://community.cisco.com/t5/network-security/no-access-to-an-asa-s-interface-from-behind-the-other-one/m-p/2392360#M271124</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will not be able to connect to an IP address of an ASA interface from behind another ASA interface. This is a limitation that has been there for Cisco firewalls from as long as I can remember.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only exception is when you have a VPN connection connected to one ASA interface then you can connect through that VPN connection to another interface of the ASA. In that case the ASA will also require that you have the following command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;management-access &lt;INTERFACE nameif=""&gt;&lt;/INTERFACE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where the &lt;STRONG&gt;&lt;INTERFACE nameif=""&gt;&lt;/INTERFACE&gt;&lt;/STRONG&gt; is the name of the interface to which you are connecting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jan 2014 16:11:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-access-to-an-asa-s-interface-from-behind-the-other-one/m-p/2392360#M271124</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-21T16:11:12Z</dc:date>
    </item>
    <item>
      <title>No access to an ASA's interface from behind the other one</title>
      <link>https://community.cisco.com/t5/network-security/no-access-to-an-asa-s-interface-from-behind-the-other-one/m-p/2392361#M271129</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your answer. Is there any official cisco article about this limitation? I didn't find any.&lt;/P&gt;&lt;P&gt;The problem is that the subnet connected to the "internet" interface is routable within a certain region, and not worldwide. The subnet connected to the "dmz" interface is routable worldwide and commuters leaving that region will be able to establish VPN connection only to the "dmz" interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jan 2014 19:04:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-access-to-an-asa-s-interface-from-behind-the-other-one/m-p/2392361#M271129</guid>
      <dc:creator>maxmogorean</dc:creator>
      <dc:date>2014-01-21T19:04:10Z</dc:date>
    </item>
    <item>
      <title>No access to an ASA's interface from behind the other one</title>
      <link>https://community.cisco.com/t5/network-security/no-access-to-an-asa-s-interface-from-behind-the-other-one/m-p/2392362#M271132</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It might be just my head working slow at the moment but I am not sure I got the actual scenario/setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I understood you correctly you have users that are currently connecting to the interface &lt;STRONG&gt;"internet"&lt;/STRONG&gt; for VPN connections. When they leave a certain region they will only be able to reach the ASA through the &lt;STRONG&gt;"dmz"&lt;/STRONG&gt; interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the case of SSL or IPsec VPN Client you do have the possibility to enable the VPN connections on both interfaces at the same time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though I still get the picture that the user would still be connecting through the interface &lt;STRONG&gt;"internet"&lt;/STRONG&gt; but is not able to route the packets to the connected network of interface &lt;STRONG&gt;"internet"&lt;/STRONG&gt; for some reason (I am not quite sure what that would be)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is link to a document explaining the limitation I mentioned. I could not find it referenced in newer version of the same document but to my understanding this still applies&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;IMG src="http://www.cisco.com/en/US/i/templates/note.gif" /&gt;&lt;/P&gt;&lt;HR /&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1062739"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;Note &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="1" /&gt;For&amp;nbsp; security purposes the security appliance does not support far-end&amp;nbsp; interface ping, that is pinging the IP address of the outside interface&amp;nbsp; from the inside network. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Source:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa71/configuration/guide/trouble.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa71/configuration/guide/trouble.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jan 2014 21:08:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-access-to-an-asa-s-interface-from-behind-the-other-one/m-p/2392362#M271132</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-21T21:08:57Z</dc:date>
    </item>
    <item>
      <title>No access to an ASA's interface from behind the other one</title>
      <link>https://community.cisco.com/t5/network-security/no-access-to-an-asa-s-interface-from-behind-the-other-one/m-p/2392363#M271135</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes Jouni, you understood me correctly, that users will be able to connect only to the &lt;STRONG&gt;"dmz"&lt;/STRONG&gt; through &lt;STRONG&gt;"internet"&lt;/STRONG&gt;. I enabled the VPN connections on both interfaces and got the limitation, which I created the discussion about.&lt;/P&gt;&lt;P&gt;Thank you for the reference. "Far-end interface" is a good term. It helped me to extend my search results in the subject, and it seems, that indeed it is impossible to make any connection to a far-end interface on ASAs. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jan 2014 21:47:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-access-to-an-asa-s-interface-from-behind-the-other-one/m-p/2392363#M271135</guid>
      <dc:creator>maxmogorean</dc:creator>
      <dc:date>2014-01-21T21:47:07Z</dc:date>
    </item>
    <item>
      <title>No access to an ASA's interface from behind the other one</title>
      <link>https://community.cisco.com/t5/network-security/no-access-to-an-asa-s-interface-from-behind-the-other-one/m-p/2392364#M271140</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That sounds like the same issue I have. I have a router on each of the ASA ports 0/0 LAN (inside) 0/1 WAN (Outside) 0/2 DMZ (Cisco-2821) 0/3 VOIP (Cisco-3745).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am I to understand that I cannot route traffic for clients behind the 2821 (DMZ) to clients behind the LAN (Inside) interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Wow, why would that not allow traffic between interfaces?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Jan 2014 16:34:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-access-to-an-asa-s-interface-from-behind-the-other-one/m-p/2392364#M271140</guid>
      <dc:creator>metuckness</dc:creator>
      <dc:date>2014-01-22T16:34:14Z</dc:date>
    </item>
    <item>
      <title>No access to an ASA's interface from behind the other one</title>
      <link>https://community.cisco.com/t5/network-security/no-access-to-an-asa-s-interface-from-behind-the-other-one/m-p/2392365#M271142</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above limitation we are talking about simply prevents a host from behind an interface from connecting directly to another interface on the ASA. It doesnt block any traffic between the actual networks behind different interfaces. Only traffic to the ASA itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So consider your LAN and WAN ports. Users behind LAN will not be able to connect to the ASA by using its WAN port IP address. This however does not mean that users behind LAN could not access networks behind the WAN interface. They just cant connect to the ASA interface itself. They would have to be located behind WAN to connect to WAN interface. Now they can connect to the LAN interface as they are behind that interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So having traffic go through the ASA between different networks is no problem as long as Routing, NAT and ACLs are fine on all the devices. (NAT and ACL might not be present on each device naturally)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Jan 2014 16:43:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-access-to-an-asa-s-interface-from-behind-the-other-one/m-p/2392365#M271142</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-22T16:43:06Z</dc:date>
    </item>
    <item>
      <title>No access to an ASA's interface from behind the other one</title>
      <link>https://community.cisco.com/t5/network-security/no-access-to-an-asa-s-interface-from-behind-the-other-one/m-p/2392366#M271146</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I hate to hijack someone elses post, but could you take a look at my post and tell me what I am doing wrong. I have followed the suggestions of the person trying to help, but I still cannot get from my networks behind my 2821 or 3745 to the 2811.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the link. I even have a diagram up and all the configs are zipped up in the first post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://community.cisco.com/message/4143926#4143926"&gt;https://supportforums.cisco.com/message/4143926#4143926&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just don't see what I am missing. I added this statement:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;same-security-traffic permit inter-interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;I also added his access-lists he suggested. No go &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;JouniForss wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above limitation we are talking about simply prevents a host from behind an interface from connecting directly to another interface on the ASA. It doesnt block any traffic between the actual networks behind different interfaces. Only traffic to the ASA itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So consider your LAN and WAN ports. Users behind LAN will not be able to connect to the ASA by using its WAN port IP address. This however does not mean that users behind LAN could not access networks behind the WAN interface. They just cant connect to the ASA interface itself. They would have to be located behind WAN to connect to WAN interface. Now they can connect to the LAN interface as they are behind that interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So having traffic go through the ASA between different networks is no problem as long as Routing, NAT and ACLs are fine on all the devices. (NAT and ACL might not be present on each device naturally)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Jan 2014 16:49:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-access-to-an-asa-s-interface-from-behind-the-other-one/m-p/2392366#M271146</guid>
      <dc:creator>metuckness</dc:creator>
      <dc:date>2014-01-22T16:49:09Z</dc:date>
    </item>
  </channel>
</rss>

