<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA Transparent Mode For Multiple Subnets in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/2303207#M311758</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In&amp;nbsp; ASA transparent mode, Why it is necessary to keep management ip in the same subnet to that of connected network?&lt;/P&gt;&lt;P&gt;what if I keep management ip in diffrent subnet than that of connected network?&lt;/P&gt;&lt;P&gt;If I do so does the traffic move through the asa and why?&lt;/P&gt;&lt;P&gt;thanxs.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 13 Jan 2014 14:19:35 GMT</pubDate>
    <dc:creator>vijay1926</dc:creator>
    <dc:date>2014-01-13T14:19:35Z</dc:date>
    <item>
      <title>ASA Transparent Mode For Multiple Subnets</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/2303195#M311719</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;I am looking to replace a FortiGate firewall which is currently working in transparent mode handling mutiple subnets with ASA 5515.&amp;nbsp; Currently, I am testing &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;transparent mode &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;configuration on ASA 5505, and it will not forward any traffic that is not in the same subnet as IP address assigned to BV interface.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;For example, the following configuration works.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;10.0.0.3/24 (computer) ---&amp;gt; &lt;SPAN style="color: #ff0000;"&gt;10.&lt;STRONG&gt;0&lt;/STRONG&gt;.0.2/24 (firewall)&lt;/SPAN&gt; ---&amp;gt; 10.0.0.1/24 (computer)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;However, the following does not work&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.0.0.3/24 (computer) ---&amp;gt; &lt;SPAN style="color: #ff0000;"&gt;10.&lt;STRONG&gt;10&lt;/STRONG&gt;.0.2/24 (firewall)&lt;/SPAN&gt; ---&amp;gt; 10.0.0.1/24 (computer)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I thought that transparent mode is just a bump in the wire, so why does the IP address/subnet assigned to BV interface affects the traffic?&amp;nbsp; Is the ASA capable of handling other/multiple subnets in transparent mode other than the subnet assigned to BV interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By the way, I used to run PIX 515E 7.2(2) transparent mode filtering multiple subnets.&amp;nbsp; The current ASA 5505 is on&lt;SPAN style="font-size: 10pt;"&gt; 9.0(1)&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;.&amp;nbsp; Is it the limitation on the ASA 5505 model but not on the more powerful ASA model?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:45:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/2303195#M311719</guid>
      <dc:creator>thomaspow1978</dc:creator>
      <dc:date>2019-03-12T02:45:39Z</dc:date>
    </item>
    <item>
      <title>ASA Transparent Mode For Multiple Subnets</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/2303196#M311720</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;try multiple context&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Oct 2013 07:52:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/2303196#M311720</guid>
      <dc:creator>Tagir Temirgaliyev</dc:creator>
      <dc:date>2013-10-02T07:52:11Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Transparent Mode For Multiple Subnets</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/2303197#M311726</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Thank you &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;@ttemirgaliyev, I tried but multiple context is not supported by ASA 5505.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an example of PIX configuration in transparent mode filtering multiple subnets.&amp;nbsp; I was using this configuration in production environment in the past.&amp;nbsp; I am wondering if ASA 5510 or higher can handle this setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;: Written by enable_15 at 10:57:25.766 UTC Wed Jul 16 xxxx&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;PIX Version 7.2(2) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;firewall transparent&lt;/P&gt;&lt;P&gt;hostname pixfirewall&lt;/P&gt;&lt;P&gt;enable password xxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0.1&lt;/P&gt;&lt;P&gt; vlan 1&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1.1&lt;/P&gt;&lt;P&gt; no vlan&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd xxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;access-list outside extended permit udp any host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.210 &lt;/P&gt;&lt;P&gt;access-list outside extended permit udp any host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.3 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.110 eq smtp &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.110 eq www &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.57 eq smtp &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.57 eq www &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.75 eq www &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.75 eq ftp &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.75 eq 5003 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.75 eq 403 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.75 eq 407 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.76 eq ftp &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ccff;"&gt;&lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.&lt;SPAN style="color: #000000;"&gt;2&lt;/SPAN&gt;&lt;/SPAN&gt; eq pcanywhere-data &lt;/P&gt;&lt;P&gt;access-list outside extended permit udp any host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.2 eq pcanywhere-status &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.61 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.62 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.63 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.64 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #3366ff;"&gt;10.0.13&lt;/SPAN&gt;.225 eq ftp &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp host 192.168.4.30 host &lt;SPAN style="color: #339966;"&gt;10.0.17&lt;/SPAN&gt;.254 eq telnet &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #3366ff;"&gt;10.0.13&lt;/SPAN&gt;.225 eq telnet &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.61 eq 50 &lt;/P&gt;&lt;P&gt;access-list outside extended permit udp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.61 eq isakmp &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.62 eq 50 &lt;/P&gt;&lt;P&gt;access-list outside extended permit udp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.62 eq isakmp &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.63 eq 50 &lt;/P&gt;&lt;P&gt;access-list outside extended permit udp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.63 eq isakmp &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.64 eq 50 &lt;/P&gt;&lt;P&gt;access-list outside extended permit udp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.64 eq isakmp &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.219 &lt;/P&gt;&lt;P&gt;access-list outside extended permit udp any host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.219 &lt;/P&gt;&lt;P&gt;access-list outside extended permit udp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.61 &lt;/P&gt;&lt;P&gt;access-list outside extended permit udp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.62 &lt;/P&gt;&lt;P&gt;access-list outside extended permit udp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.63 &lt;/P&gt;&lt;P&gt;access-list outside extended permit udp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.64 &lt;/P&gt;&lt;P&gt;access-list outside extended permit icmp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.29 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.29 eq ftp &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any gt 1023 host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.29 eq ftp-data &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.110 eq pop3 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.57 eq pop3 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.27 eq pcanywhere-data &lt;/P&gt;&lt;P&gt;access-list outside extended permit udp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.27 eq pcanywhere-status &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.31 eq pcanywhere-data &lt;/P&gt;&lt;P&gt;access-list outside extended permit udp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.31 eq pcanywhere-status &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.222 eq pcanywhere-data &lt;/P&gt;&lt;P&gt;access-list outside extended permit udp any host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.222 eq pcanywhere-status &lt;/P&gt;&lt;P&gt;access-list outside extended permit icmp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.28 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.28 eq pptp &lt;/P&gt;&lt;P&gt;access-list outside extended permit gre any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.28 &lt;/P&gt;&lt;P&gt;access-list outside extended permit ip any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.28 &lt;/P&gt;&lt;P&gt;access-list outside extended permit ip any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.29 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.25 eq 8234 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #339966;"&gt;10.0.17&lt;/SPAN&gt;.217 eq 8234 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #339966;"&gt;10.0.17&lt;/SPAN&gt;.217 eq 8235 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #339966;"&gt;10.0.17&lt;/SPAN&gt;.217 eq www &lt;/P&gt;&lt;P&gt;access-list outside extended permit ip any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.36 &lt;/P&gt;&lt;P&gt;access-list outside extended permit ip any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.37 &lt;/P&gt;&lt;P&gt;access-list outside extended permit ip any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.38 &lt;/P&gt;&lt;P&gt;access-list outside extended permit ip any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.39 &lt;/P&gt;&lt;P&gt;access-list outside extended permit ip any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.40 &lt;/P&gt;&lt;P&gt;access-list outside extended permit ip any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.41 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.235 eq www &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.2 eq www &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.2 eq 3389 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp host 192.168.1.234 host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.211 eq 4899 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.211 eq www &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.35 eq www &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.36 eq www &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.37 eq www &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.38 eq www &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.39 eq www &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.40 eq www &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.41 eq www &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.110 eq https &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.57 eq https &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.75 eq https &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host 10.0.17.217 eq https &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.234 eq 220 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.235 eq https &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.2 eq https &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.211 eq https &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.35 eq https &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.36 eq https &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.37 eq https &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.38 eq https &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.39 eq https &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.40 eq https &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.41 eq https &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.35 eq 8234 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.36 eq 8234 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.37 eq 8234 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.38 eq 8234 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.39 eq 8234 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.40 eq 8234 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.41 eq 8234 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.35 eq 8235 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.36 eq 8235 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.37 eq 8235 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.38 eq 8235 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.39 eq 8235 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.40 eq 8235 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.41 eq 8235 &lt;/P&gt;&lt;P&gt;access-list outside extended permit udp any host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.222 &lt;/P&gt;&lt;P&gt;access-list outside extended permit gre any any &lt;/P&gt;&lt;P&gt;access-list outside extended permit ip host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.28 any &lt;/P&gt;&lt;P&gt;access-list outside extended permit ip host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.211 any &lt;/P&gt;&lt;P&gt;access-list outside extended permit ip host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.35 any &lt;/P&gt;&lt;P&gt;access-list outside extended permit ip host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.36 any &lt;/P&gt;&lt;P&gt;access-list outside extended permit ip host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.37 any &lt;/P&gt;&lt;P&gt;access-list outside extended permit ip host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.38 any &lt;/P&gt;&lt;P&gt;access-list outside extended permit ip host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.39 any &lt;/P&gt;&lt;P&gt;access-list outside extended permit ip host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.40 any &lt;/P&gt;&lt;P&gt;access-list outside extended permit ip host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.41 any &lt;/P&gt;&lt;P&gt;access-list outside extended permit ip host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.222 any &lt;/P&gt;&lt;P&gt;access-list outside extended permit ip host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.234 any &lt;/P&gt;&lt;P&gt;access-list outside extended permit icmp host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.234 any &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.235 eq 3389 &lt;/P&gt;&lt;P&gt;access-list outside extended permit ip host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.254 any &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.2 eq 3389 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #3366ff;"&gt;10.0.13&lt;/SPAN&gt;.240 eq 5900 &lt;/P&gt;&lt;P&gt;access-list outside extended permit udp any host &lt;SPAN style="color: #3366ff;"&gt;10.0.13&lt;/SPAN&gt;.240 eq 5900 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #3366ff;"&gt;10.0.13&lt;/SPAN&gt;.240 eq 3283 &lt;/P&gt;&lt;P&gt;access-list outside extended permit udp any host &lt;SPAN style="color: #3366ff;"&gt;10.0.13&lt;/SPAN&gt;.240 eq 3283 &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #3366ff;"&gt;10.0.13&lt;/SPAN&gt;.240 eq ssh &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #00ff00;"&gt;10.0.10&lt;/SPAN&gt;.12 eq www &lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.212 eq www&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.230 255.255.255.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;access-group outside in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.254 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;snmp-server host inside &lt;SPAN style="color: #ff0000;"&gt;10.0.0&lt;/SPAN&gt;.234 community xxxx&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community xxxx&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;snmp-server enable traps syslog&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 60&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:c887f562a196123a335c5ebeba0ad482&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Oct 2013 17:12:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/2303197#M311726</guid>
      <dc:creator>thomaspow1978</dc:creator>
      <dc:date>2013-10-02T17:12:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Transparent Mode For Multiple Subnets</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/2303198#M311734</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Thomas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;I thought that transparent mode is just a bump in the wire, so why does the IP address/subnet assigned to BV interface affects the traffic?&amp;nbsp; Is the ASA capable of handling other/multiple subnets in transparent mode other than the subnet assigned to BV interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Each directly connected network must be on the same subnet.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's one of the transparent firewall limitations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also no need to run Multiple-context for this, You can now use more than one BVI &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt; and that will fix the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For more information about Core and Security Networking follow my website at &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com" rel="nofollow"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Any question contact me at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Oct 2013 17:34:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/2303198#M311734</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-10-02T17:34:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Transparent Mode For Multiple Subnets</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/2303199#M311736</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your reply, I continue to test this in many different ways but getting same result.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.0.0.3 (computer) -(inside interface)-&amp;gt; 10.0.0.10 (firewall) -(outside interface)-&amp;gt; 10.0.0.2 (computer) = success&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.0.0.3 (computer) -&lt;SPAN style="font-size: 10pt;"&gt;(&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;inside interface&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;)&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;-&amp;gt; 10.&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; color: #ff0000;"&gt;10&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;.0.10 (firewall) -(outside interface)-&amp;gt; 10.0.0.2 (computer) = fail&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Below is the log message I receive when I change BVI ip address to 10.10.0.10.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;%ASA-2-106006: Deny inbound UDP from 10.0.0.2/50871 to 239.255.255.250/1900 on interface outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;%ASA-2-106006: Deny inbound UDP from 10.0.0.2/50871 to 239.255.255.250/1900 on interface outside&lt;/P&gt;&lt;P&gt;%ASA-2-106006: Deny inbound UDP from 10.0.0.2/50871 to 239.255.255.250/1900 on interface outside&lt;/P&gt;&lt;P&gt;%ASA-2-106006: Deny inbound UDP from 10.0.0.2/50871 to 239.255.255.250/1900 on interface outside&lt;/P&gt;&lt;P&gt;%ASA-2-106006: Deny inbound UDP from 10.0.0.2/138 to 10.0.0.255/138 on interface outside&lt;/P&gt;&lt;P&gt;%ASA-2-106006: Deny inbound UDP from 10.0.0.2/50871 to 239.255.255.250/1900 on interface outside&lt;/P&gt;&lt;P&gt;%ASA-2-106006: Deny inbound UDP from 10.0.0.2/50871 to 239.255.255.250/1900 on interface outside&lt;/P&gt;&lt;P&gt;%ASA-2-106006: Deny inbound UDP from 10.0.0.2/50871 to 239.255.255.250/1900 on interface outside&lt;/P&gt;&lt;P&gt;%ASA-2-106006: Deny inbound UDP from 10.0.0.2/50871 to 239.255.255.250/1900 on interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I looked up 106006 and below is the definition.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; color: #339966;"&gt;"Error Message&amp;nbsp;&amp;nbsp;&amp;nbsp; %PIX|ASA-2-106006: Deny inbound UDP from outside_address/outside_port &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;to inside_address/inside_port on interface interface_name.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;Explanation&amp;nbsp;&amp;nbsp;&amp;nbsp; This is a connection-related message. This message is displayed if an inbound UDP packet is denied by the security policy that is defined for the specified traffic type.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; color: #339966;"&gt;Recommended Action&amp;nbsp;&amp;nbsp;&amp;nbsp; None required."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;I tried assigning more than one IP address to one BV interface, but it didn't take it.&amp;nbsp; Is there command "ip address x.x.x.x x.x.x.x secondary" like on the router for BV interface?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you again, this has been the main obstacle for me in Fortigate-to-ASA migration project.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Oct 2013 19:07:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/2303199#M311736</guid>
      <dc:creator>thomaspow1978</dc:creator>
      <dc:date>2013-10-02T19:07:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Transparent Mode For Multiple Subnets</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/2303200#M311738</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Thomas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My pleasure to help,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you check my latest post?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean the thing is that for the ASA on transparent mode the IP address must belong to the same subnet where is being set on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So in this case you could use to BVIs :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One with an IP on the 10.10.10.x subnet the 10.10.10x subnet &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And other with the IP address of 10.0.0.x but to connect the 10.0.0.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if you still have any questions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For more information about Core and Security Networking follow my website at &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Any question contact me at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Oct 2013 19:17:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/2303200#M311738</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-10-02T19:17:42Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Transparent Mode For Multiple Subnets</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/2303201#M311740</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for your help, I will give it a try next week.&amp;nbsp; I have to leave town soon.&amp;nbsp; I will post my progress once I am back.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thomas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Oct 2013 20:05:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/2303201#M311740</guid>
      <dc:creator>thomaspow1978</dc:creator>
      <dc:date>2013-10-02T20:05:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Transparent Mode For Multiple Subnets</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/2303202#M311741</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Thomas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My pleasure to help,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For more information about Core and Security Networking follow my website at &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Any question contact me at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Oct 2013 20:29:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/2303202#M311741</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-10-02T20:29:31Z</dc:date>
    </item>
    <item>
      <title>ASA Transparent Mode For Multiple Subnets</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/2303203#M311744</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;try this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;10.0.0.3/24 (computer) ---&amp;gt; 10.&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;10&lt;/STRONG&gt;.0.2/&lt;STRONG&gt;8&lt;/STRONG&gt; (firewall) ---&amp;gt; 10.0.0.1/24 (computer)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Oct 2013 07:22:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/2303203#M311744</guid>
      <dc:creator>Tagir Temirgaliyev</dc:creator>
      <dc:date>2013-10-03T07:22:58Z</dc:date>
    </item>
    <item>
      <title>ASA Transparent Mode For Multiple Subnets</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/2303204#M311747</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you all, a&lt;SPAN style="font-size: 10pt;"&gt;fter spending a bit of time researching, I believe that ASA cannot be the direct replacement of the current Fortigate firewall we have due to its limitation.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;SPAN style="font-size: 10pt;"&gt;Bridge group traffic is isolated from other bridge groups; traffic is not routed to another bridge group within the ASA, and traffic must exit the ASA before it is routed by an external router back to another bridge group in the ASA."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;"&lt;/SPAN&gt;&lt;STRONG style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; text-indent: -28.799999237060547px; background-color: #ffffff;"&gt;Note &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; text-indent: -28.799999237060547px; background-color: #ffffff;" width="1" /&gt;&lt;SPAN style="font-size: 10pt;"&gt;The ASA does not support traffic on secondary networks; only traffic on the same network as the management IP address is supported."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thomas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Oct 2013 17:38:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/2303204#M311747</guid>
      <dc:creator>thomaspow1978</dc:creator>
      <dc:date>2013-10-10T17:38:22Z</dc:date>
    </item>
    <item>
      <title>ASA Transparent Mode For Multiple Subnets</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/2303205#M311752</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Thomas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Glad to know that I could help with the answer to your questions,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please mark it as answered so future users can learn from this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For more information about Core and Security Networking follow my website at &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Any question contact me at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Oct 2013 19:09:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/2303205#M311752</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-10-10T19:09:36Z</dc:date>
    </item>
    <item>
      <title>ASA Transparent Mode For Multiple Subnets</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/2303206#M311755</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Oct 2013 19:11:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/2303206#M311755</guid>
      <dc:creator>thomaspow1978</dc:creator>
      <dc:date>2013-10-10T19:11:44Z</dc:date>
    </item>
    <item>
      <title>ASA Transparent Mode For Multiple Subnets</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/2303207#M311758</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In&amp;nbsp; ASA transparent mode, Why it is necessary to keep management ip in the same subnet to that of connected network?&lt;/P&gt;&lt;P&gt;what if I keep management ip in diffrent subnet than that of connected network?&lt;/P&gt;&lt;P&gt;If I do so does the traffic move through the asa and why?&lt;/P&gt;&lt;P&gt;thanxs.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Jan 2014 14:19:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/2303207#M311758</guid>
      <dc:creator>vijay1926</dc:creator>
      <dc:date>2014-01-13T14:19:35Z</dc:date>
    </item>
    <item>
      <title>ASA Transparent Mode For Multiple Subnets</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/2303208#M311760</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Vijay,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you say you can use another one, That's correct but the thing is that the management IP is not only used for management purporses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's were you are missing the point.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That IP address assigned to the ASA as a whole will also be used for ARP requests when the ASA does not know where the destination hosts lies and it's not on the same subnet than the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It will also be used as a source for packets going to a syslog server, AAA server, Netflow server, SNMP server and any packet that the ASA will need to create so with that in mind the routing of the network will need to be changed to work with this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you get to accomplish that the routing of the network works with a different Management IP address on the transparent address then you can do it. I can ensure you I have seen this scenario before working with no issues at all bud.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just to remember &lt;STRONG&gt;rate all of the helpful posts&lt;/STRONG&gt; like this one &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking for some Networking Assistance?&amp;nbsp; &lt;BR /&gt;&lt;SPAN&gt;Contact me directly at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;I will fix your problem ASAP. &lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Jan 2014 17:43:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/2303208#M311760</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2014-01-13T17:43:26Z</dc:date>
    </item>
    <item>
      <title>ASA Transparent Mode For Multiple Subnets</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/2303209#M311762</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanx a lot Jcarvaja... &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Jan 2014 18:28:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/2303209#M311762</guid>
      <dc:creator>vijay1926</dc:creator>
      <dc:date>2014-01-13T18:28:55Z</dc:date>
    </item>
    <item>
      <title>Dear Thomas,</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/2303210#M311763</link>
      <description>&lt;P&gt;Dear Thomas,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I had faced the same problem in higher version above 9.0. But it works perfectly fine in versions like 8.2 &amp;amp; 8.4 and&amp;nbsp; same applies for routed mode as well.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Sep 2016 08:30:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/2303210#M311763</guid>
      <dc:creator>darshan shetty</dc:creator>
      <dc:date>2016-09-20T08:30:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Transparent Mode For Multiple Subnets</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/4708894#M1094446</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;Try placing the command in the system "arp permit-nonconnected"&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 24 Oct 2022 20:07:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-mode-for-multiple-subnets/m-p/4708894#M1094446</guid>
      <dc:creator>LuisCastaneda4796</dc:creator>
      <dc:date>2022-10-24T20:07:25Z</dc:date>
    </item>
  </channel>
</rss>

