<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA internal LAN connectivity in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-internal-lan-connectivity/m-p/3827995#M31504</link>
    <description>would i need to create an access list to allow ssh to the port1.88 interface from the port1.1100 interface? there is a ssh 0.0.0.0 0.0.0.0 MGMT configured, however SSH still fails from the port1.1100 interface</description>
    <pubDate>Thu, 28 Mar 2019 12:06:28 GMT</pubDate>
    <dc:creator>GrmOperations</dc:creator>
    <dc:date>2019-03-28T12:06:28Z</dc:date>
    <item>
      <title>ASA internal LAN connectivity</title>
      <link>https://community.cisco.com/t5/network-security/asa-internal-lan-connectivity/m-p/3827644#M31497</link>
      <description>&lt;P&gt;I am new to ASAs, but I am trying to ensure connectivity between my internal LANs which hang off a subinterface. Any reason I am unable to ssh/ping 192.168.255.129 from the GreenNET network if the same security traffic is enabled?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface Port-channel1.88&lt;BR /&gt;description MGMT&lt;BR /&gt;vlan 88&lt;BR /&gt;nameif MGMT&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.255.129 255.255.255.192&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.89&lt;BR /&gt;vlan 89&lt;BR /&gt;nameif VM-MGMT&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.255.220 255.255.255.224&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.1100&lt;BR /&gt;description GreenNET-Home Wi-Fi Network&lt;BR /&gt;vlan 1100&lt;BR /&gt;nameif GreenNET&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.0.254 255.255.255.252&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;show arp&lt;BR /&gt;outside 192.168.1.129 6038.e06e.6a67 12&lt;BR /&gt;outside 192.168.1.178 509e.a752.cf9e 80&lt;BR /&gt;outside 192.168.1.156 9801.a769.cb74 532&lt;BR /&gt;outside 192.168.1.132 f838.805f.2001 1001&lt;BR /&gt;outside 192.168.1.159 0004.4bb3.20d6 6124&lt;BR /&gt;outside 192.168.1.160 04e6.766e.1cce 12475&lt;BR /&gt;MGMT 192.168.255.131 f4a7.39c6.9181 727&lt;BR /&gt;MGMT 192.168.255.148 b07f.b947.d2fb 3508&lt;BR /&gt;GreenNET 192.168.0.253 9c3d.cf4d.2207 5606&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;C:\Users\J&amp;gt;ping 192.168.255.129&lt;/P&gt;&lt;P&gt;Pinging 192.168.255.129 with 32 bytes of data:&lt;BR /&gt;Control-C&lt;BR /&gt;^C&lt;BR /&gt;C:\Users\J&amp;gt;ping 192.168.255.131&lt;/P&gt;&lt;P&gt;Pinging 192.168.255.131 with 32 bytes of data:&lt;BR /&gt;Reply from 192.168.255.131: bytes=32 time=14ms TTL=63&lt;BR /&gt;Reply from 192.168.255.131: bytes=32 time=12ms TTL=63&lt;BR /&gt;Reply from 192.168.255.131: bytes=32 time=15ms TTL=63&lt;BR /&gt;Reply from 192.168.255.131: bytes=32 time=9ms TTL=63&lt;/P&gt;&lt;P&gt;Ping statistics for 192.168.255.131:&lt;BR /&gt;Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),&lt;BR /&gt;Approximate round trip times in milli-seconds:&lt;BR /&gt;Minimum = 9ms, Maximum = 15ms, Average = 12ms&lt;/P&gt;&lt;P&gt;C:\Users\J&amp;gt;ping 192.168.255.148&lt;/P&gt;&lt;P&gt;Pinging 192.168.255.148 with 32 bytes of data:&lt;BR /&gt;Reply from 192.168.255.148: bytes=32 time=13ms TTL=63&lt;BR /&gt;Reply from 192.168.255.148: bytes=32 time=12ms TTL=63&lt;BR /&gt;Reply from 192.168.255.148: bytes=32 time=8ms TTL=63&lt;BR /&gt;Reply from 192.168.255.148: bytes=32 time=57ms TTL=63&lt;/P&gt;&lt;P&gt;Ping statistics for 192.168.255.148:&lt;BR /&gt;Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),&lt;BR /&gt;Approximate round trip times in milli-seconds:&lt;BR /&gt;Minimum = 8ms, Maximum = 57ms, Average = 22ms&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2019 00:20:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-internal-lan-connectivity/m-p/3827644#M31497</guid>
      <dc:creator>GrmOperations</dc:creator>
      <dc:date>2019-03-28T00:20:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA internal LAN connectivity</title>
      <link>https://community.cisco.com/t5/network-security/asa-internal-lan-connectivity/m-p/3827647#M31499</link>
      <description>&lt;P&gt;Do you have ICMP enabled (&lt;SPAN&gt;icmp permit any inside)&lt;/SPAN&gt;? can you&amp;nbsp; alsopost show run config from ASA.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2019 00:27:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-internal-lan-connectivity/m-p/3827647#M31499</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-03-28T00:27:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA internal LAN connectivity</title>
      <link>https://community.cisco.com/t5/network-security/asa-internal-lan-connectivity/m-p/3827706#M31500</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Mentioned that reverify the same security level communication&amp;nbsp;is enabled or not and ICMP is allowed or not?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ICMP permit inside any&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Deepak Kumar&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2019 02:54:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-internal-lan-connectivity/m-p/3827706#M31500</guid>
      <dc:creator>Deepak Kumar</dc:creator>
      <dc:date>2019-03-28T02:54:38Z</dc:date>
    </item>
    <item>
      <title>Re: ASA internal LAN connectivity</title>
      <link>https://community.cisco.com/t5/network-security/asa-internal-lan-connectivity/m-p/3827983#M31502</link>
      <description>&lt;P&gt;thanks i think that fixed it&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2019 11:52:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-internal-lan-connectivity/m-p/3827983#M31502</guid>
      <dc:creator>GrmOperations</dc:creator>
      <dc:date>2019-03-28T11:52:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASA internal LAN connectivity</title>
      <link>https://community.cisco.com/t5/network-security/asa-internal-lan-connectivity/m-p/3827995#M31504</link>
      <description>would i need to create an access list to allow ssh to the port1.88 interface from the port1.1100 interface? there is a ssh 0.0.0.0 0.0.0.0 MGMT configured, however SSH still fails from the port1.1100 interface</description>
      <pubDate>Thu, 28 Mar 2019 12:06:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-internal-lan-connectivity/m-p/3827995#M31504</guid>
      <dc:creator>GrmOperations</dc:creator>
      <dc:date>2019-03-28T12:06:28Z</dc:date>
    </item>
    <item>
      <title>Re: ASA internal LAN connectivity</title>
      <link>https://community.cisco.com/t5/network-security/asa-internal-lan-connectivity/m-p/3828224#M31506</link>
      <description>&lt;P&gt;Glad that it worked, if ti resolved marked as resolve so it will be usefull for other community members.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2019 16:20:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-internal-lan-connectivity/m-p/3828224#M31506</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-03-28T16:20:30Z</dc:date>
    </item>
    <item>
      <title>Re: ASA internal LAN connectivity</title>
      <link>https://community.cisco.com/t5/network-security/asa-internal-lan-connectivity/m-p/3828431#M31508</link>
      <description>&lt;P&gt;I am actually still experiencing the same issue. I was under the notion if same security was enabled I would not need an ACL to allow traffic between the subnets however I am still unable to ping/SSH between the networks.&amp;nbsp;I am getting hits on the ACL I created but still no connectivity.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list GreenNet_C; 4 elements; name hash: 0xe5bb7708&lt;BR /&gt;access-list GreenNet_C line 1 extended permit tcp 192.168.0.252 255.255.255.252 object DeviceManagement (hitcnt=16) 0x4814b061&lt;BR /&gt;access-list GreenNet_C line 1 extended permit tcp 192.168.0.252 255.255.255.252 192.168.255.128 255.255.255.192 (hitcnt=16) 0x4814b061&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;MacBook:~ m $ ssh 192.168.255.129&lt;BR /&gt;^C&lt;BR /&gt;MacBook:~m $ ping 192.168.255.129&lt;BR /&gt;PING 192.168.255.129 (192.168.255.129): 56 data bytes&lt;BR /&gt;Request timeout for icmp_seq 0&lt;BR /&gt;Request timeout for icmp_seq 1&lt;BR /&gt;Request timeout for icmp_seq 2&lt;BR /&gt;Request timeout for icmp_seq 3&lt;BR /&gt;^C&lt;BR /&gt;--- 192.168.255.129 ping statistics ---&lt;BR /&gt;5 packets transmitted, 0 packets received, 100.0% packet loss&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2019 19:06:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-internal-lan-connectivity/m-p/3828431#M31508</guid>
      <dc:creator>GrmOperations</dc:creator>
      <dc:date>2019-03-28T19:06:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA internal LAN connectivity</title>
      <link>https://community.cisco.com/t5/network-security/asa-internal-lan-connectivity/m-p/3828457#M31510</link>
      <description>&lt;P&gt;No need for ACL .It should ssh and ping.&lt;/P&gt;&lt;P&gt;another icmp solution is to&amp;nbsp; add icmp to default policy-map or you can use this command&lt;/P&gt;&lt;P&gt;fixup protocol icmp&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2019 19:42:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-internal-lan-connectivity/m-p/3828457#M31510</guid>
      <dc:creator>Zamilnewbie</dc:creator>
      <dc:date>2019-03-28T19:42:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA internal LAN connectivity</title>
      <link>https://community.cisco.com/t5/network-security/asa-internal-lan-connectivity/m-p/3828489#M31512</link>
      <description>&lt;P&gt;unfortunately i still have no SSH/ICMP connectivity&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2019 20:27:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-internal-lan-connectivity/m-p/3828489#M31512</guid>
      <dc:creator>GrmOperations</dc:creator>
      <dc:date>2019-03-28T20:27:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA internal LAN connectivity</title>
      <link>https://community.cisco.com/t5/network-security/asa-internal-lan-connectivity/m-p/3828502#M31514</link>
      <description>&lt;P&gt;Can you post full show run and logs to understand what is dropping.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2019 20:43:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-internal-lan-connectivity/m-p/3828502#M31514</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-03-28T20:43:50Z</dc:date>
    </item>
    <item>
      <title>Re: ASA internal LAN connectivity</title>
      <link>https://community.cisco.com/t5/network-security/asa-internal-lan-connectivity/m-p/3828842#M31515</link>
      <description>&lt;P&gt;ASA Version 9.8(2)&lt;BR /&gt;!&lt;BR /&gt;hostname ASAPR1ME&lt;BR /&gt;enable password $sha512$5000&lt;BR /&gt;names&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;description uplink to ISP&lt;BR /&gt;speed 1000&lt;BR /&gt;duplex full&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address X.X.X.X 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;description physical link to EX2200 via ge-0/1/0&lt;BR /&gt;speed 1000&lt;BR /&gt;duplex full&lt;BR /&gt;channel-group 1 mode active&lt;BR /&gt;lacp port-priority 1&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;description physical link to EX2200 via ge-0/1/1&lt;BR /&gt;speed 1000&lt;BR /&gt;duplex full&lt;BR /&gt;channel-group 1 mode active&lt;BR /&gt;lacp port-priority 1&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;description router-id&lt;BR /&gt;nameif router-id&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address X.X.X.X 255.255.255.254&lt;BR /&gt;ospf message-digest-key 1 md5 *****&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1&lt;BR /&gt;description physical link to SW via ae0&lt;BR /&gt;speed 1000&lt;BR /&gt;duplex full&lt;BR /&gt;lacp max-bundle 3&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.88&lt;BR /&gt;description -MGMT&lt;BR /&gt;vlan 88&lt;BR /&gt;nameif -MGMT&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.255.129 255.255.255.192&lt;BR /&gt;ospf message-digest-key 1 md5 *****&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.89&lt;BR /&gt;vlan 89&lt;BR /&gt;nameif -VM-MGMT&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.255.220 255.255.255.224&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.1100&lt;BR /&gt;description GreenNET&lt;BR /&gt;vlan 1100&lt;BR /&gt;nameif GreenNET&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.0.254 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;banner login $(hostname)&lt;BR /&gt;banner login&lt;BR /&gt;banner login *****************************************************************************&lt;BR /&gt;banner login * C *&lt;BR /&gt;banner login * *&lt;BR /&gt;banner login * By accessing and using this system you are consenting to system *&lt;BR /&gt;banner login * monitoring for law enforcement and other purposes. Use of this *&lt;BR /&gt;banner login * system, unless authorized by Administrator, may subject you to criminal *&lt;BR /&gt;banner login * prosecution and penalties. *&lt;BR /&gt;banner login * *&lt;BR /&gt;banner login *****************************************************************************&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 8.8.8.8&lt;BR /&gt;name-server 8.8.4.4&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network NetgearR8000P&lt;BR /&gt;host 192.168.0.253&lt;BR /&gt;object network EX2200&lt;BR /&gt;host 192.168.255.131&lt;BR /&gt;object network Cisco_2911&lt;BR /&gt;host 192.168.255.130&lt;BR /&gt;object network DeviceManagement&lt;BR /&gt;subnet 192.168.255.128 255.255.255.192&lt;BR /&gt;object network Netgear-ReadyNAS&lt;BR /&gt;host 192.168.255.148&lt;BR /&gt;object-group service LANBASICs&lt;BR /&gt;service-object tcp-udp destination eq domain&lt;BR /&gt;service-object icmp&lt;BR /&gt;service-object tcp destination eq www&lt;BR /&gt;service-object tcp destination eq https&lt;BR /&gt;service-object udp destination eq www&lt;BR /&gt;service-object tcp destination eq ftp&lt;BR /&gt;service-object tcp destination eq ftp-data&lt;BR /&gt;service-object tcp destination eq imap4&lt;BR /&gt;service-object tcp destination eq pop3&lt;BR /&gt;service-object tcp destination eq rtsp&lt;BR /&gt;service-object tcp destination eq smtp&lt;BR /&gt;service-object tcp destination eq telnet&lt;BR /&gt;service-object udp destination eq ntp&lt;BR /&gt;service-object tcp destination eq ssh&lt;BR /&gt;service-object tcp destination eq 993&lt;BR /&gt;service-object tcp destination eq 995&lt;BR /&gt;service-object tcp destination eq 465&lt;BR /&gt;service-object tcp destination eq 587&lt;BR /&gt;service-object udp destination eq isakmp&lt;BR /&gt;service-object udp destination eq 4500&lt;BR /&gt;object-group service OPENVPN_TCP_UDP_9009&lt;BR /&gt;service-object tcp-udp destination eq 9009&lt;BR /&gt;object-group service INSIDE_SERVICE_GROUPS&lt;BR /&gt;group-object LANBASICs&lt;BR /&gt;group-object OPENVPN_TCP_UDP_9009&lt;BR /&gt;object-group network _slash24&lt;BR /&gt;network-object 192.168.0.0 255.255.255.0&lt;BR /&gt;object-group network SSH_CLIENTS&lt;BR /&gt;network-object object EX2200&lt;BR /&gt;network-object object Cisco_2911&lt;BR /&gt;access-list OUT_C extended permit tcp any object-group SSH_CLIENTS eq ssh&lt;BR /&gt;access-list OUT_C extended permit tcp any object DeviceManagement&lt;BR /&gt;access-list OUT_C extended permit tcp any4 192.168.0.252 255.255.255.252 eq 9009&lt;BR /&gt;access-list GreenNet_C extended permit tcp 192.168.0.252 255.255.255.252 object DeviceManagement&lt;BR /&gt;&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging buffer-size 8000&lt;BR /&gt;logging console alerts&lt;BR /&gt;logging monitor debugging&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging asdm errors&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu -MGMT 1500&lt;BR /&gt;mtu GreenNET 1500&lt;BR /&gt;mtu -VM-MGMT 1500&lt;BR /&gt;mtu router-id 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any -MGMT&lt;BR /&gt;icmp permit any GreenNET&lt;BR /&gt;icmp permit any -VM-MGMT&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;!&lt;BR /&gt;object network NetgearR8000P&lt;BR /&gt;nat (GreenNET,outside) static interface service tcp 9009 9009&lt;BR /&gt;object network EX2200&lt;BR /&gt;nat (-MGMT,outside) static interface service tcp ssh 22001&lt;BR /&gt;object network Cisco_2911&lt;BR /&gt;nat (-MGMT,outside) static interface service tcp ssh 22002&lt;BR /&gt;object network DeviceManagement&lt;BR /&gt;nat (-MGMT,outside) dynamic interface&lt;BR /&gt;!&lt;BR /&gt;nat (GreenNET,outside) after-auto source dynamic any interface&lt;BR /&gt;access-group OUT_C in interface outside&lt;BR /&gt;&lt;BR /&gt;router ospf 7&lt;BR /&gt;router-id 9.175.50.6&lt;BR /&gt;network 9.175.50.6 255.255.255.255 area 0&lt;BR /&gt;network 9.175.50.6 255.255.255.254 area 0&lt;BR /&gt;network 192.168.0.252 255.255.255.252 area 1&lt;BR /&gt;network 192.168.255.128 255.255.255.192 area 0&lt;BR /&gt;area 0 authentication message-digest&lt;BR /&gt;log-adj-changes&lt;BR /&gt;!&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 X.X.X.X&lt;BR /&gt;route GreenNET 192.168.0.0 255.255.255.128 192.168.0.253 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;aaa-server WinServer16 protocol radius&lt;BR /&gt;aaa-server WinServer16 (-MGMT) host 192.168.0.55&lt;BR /&gt;key *****&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console WinServer16 LOCAL&lt;BR /&gt;aaa authentication http console WinServer16 LOCAL&lt;BR /&gt;aaa authentication enable console WinServer16 LOCAL&lt;BR /&gt;aaa accounting ssh console WinServer16&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 GreenNET&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh X.X.X.X 255.255.255.248 outside&lt;BR /&gt;sshX.X.X.X 255.255.255.0 outside&lt;BR /&gt;sshX.X.X.X 255.255.255.0 outside&lt;BR /&gt;sshX.X.X.X 255.255.248.0 outside&lt;BR /&gt;ssh 192.168.255.128 255.255.255.224 -MGMT&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 CCNPLAB-MGMT&lt;BR /&gt;ssh 192.168.0.252 255.255.255.252 -MGMT&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 GreenNET&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 -VM-MGMT&lt;BR /&gt;ssh timeout 30&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group14-sha1&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username merit316 password $sha512$5000$lFCkF86Rbsi+8+Dwsk6c3w==$6k5V65L4GNG2VvsyzqXGSw== pbkdf2 privilege 15&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:c12fce6001855c5d06ef5dc8823cbe0a&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2019 12:32:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-internal-lan-connectivity/m-p/3828842#M31515</guid>
      <dc:creator>GrmOperations</dc:creator>
      <dc:date>2019-03-29T12:32:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA internal LAN connectivity</title>
      <link>https://community.cisco.com/t5/network-security/asa-internal-lan-connectivity/m-p/3829365#M31517</link>
      <description>&lt;P&gt;what logs should i provide?&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2019 18:14:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-internal-lan-connectivity/m-p/3829365#M31517</guid>
      <dc:creator>GrmOperations</dc:creator>
      <dc:date>2019-03-30T18:14:44Z</dc:date>
    </item>
    <item>
      <title>Re: ASA internal LAN connectivity</title>
      <link>https://community.cisco.com/t5/network-security/asa-internal-lan-connectivity/m-p/3830577#M31519</link>
      <description>&lt;P&gt;any feedback?&lt;/P&gt;</description>
      <pubDate>Tue, 02 Apr 2019 11:41:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-internal-lan-connectivity/m-p/3830577#M31519</guid>
      <dc:creator>GrmOperations</dc:creator>
      <dc:date>2019-04-02T11:41:18Z</dc:date>
    </item>
  </channel>
</rss>

