<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: asa 5505 traffic between same security interfaces in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-traffic-between-same-security-interfaces/m-p/2256854#M349157</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you dont want NAT between the 2 LANs then leave out all NAT configuratins between them. You dont need NAT configurations as the traffic will go through without NAT by default. Its only when you have some other NAT configurations between 2 interfaces (Like Dynamic NAT/PAT) when you need another NAT configuration to tell that some traffic doesnt need to be NATed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even if you configure ACLs to the interface you will still require &lt;STRONG&gt;"same-security-traffic permit inter-interface"&lt;/STRONG&gt;. This is why &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; returns a ACL deny without specifying the exact ACL. The output is a bit cryptic sometimes and doesnt tell you the specific reason which I think is pretty bad from Ciscos part.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Either enter that command or change the &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; so they arent equal.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please remember to mark the reply as the correct answer if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ask more if needed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 27 May 2013 12:43:46 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-05-27T12:43:46Z</dc:date>
    <item>
      <title>asa 5505 traffic between same security interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-traffic-between-same-security-interfaces/m-p/2256853#M349152</link>
      <description>&lt;P&gt;i am trying to get the ASA have routing multiple LAN interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt;i've got these interfaces :&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt; color: #0000ff;"&gt;interface Vlan100&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt; nameif outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt; security-level 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt; ip address x.x.x.x y.y.y.y standby z.z.z.z&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; color: #0000ff;"&gt; interface Vlan2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt; nameif inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt; security-level 100&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt; ip address 10.100.2.1 255.255.255.0 standby 10.100.2.2 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; color: #0000ff;"&gt; interface Vlan48&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt; nameif LAN-1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt; security-level 50&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt; ip address 10.100.48.1 255.255.255.0 standby 10.100.48.2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; color: #0000ff;"&gt; interface Vlan49&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt; nameif LAN-2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt; security-level 50&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt; ip address 10.100.49.1 255.255.255.0 standby 10.100.49.2 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I want to use access-lists between LAN-1 and LAN-2 so i don't want to use same-security permit inter-interface.&lt;/P&gt;&lt;P&gt;So i created 2 access-lists : &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; color: #0000ff;"&gt;access-list LAN-1_in extended permit icmp any any &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;access-list LAN-1_in extended permit ip any any &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; color: #0000ff;"&gt;access-list LAN-2_in extended permit icmp any any &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;access-list LAN-2_in extended permit ip any any &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;and applied them to the interfaces&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;access-group LAN-1_in in interface LAN-1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;access-group LAN-2_in in interface LAN-2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt;As i don't want to use nat between those 2 segments i have them excempt from nat : &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; color: #0000ff;"&gt;nat (LAN-1,LAN-2) source static obj-10.100.48.0 obj-10.100.48.0 destination static obj-10.100.49.0 obj-10.100.49.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;nat (LAN-2,LAN-1) source static obj-10.100.49.0 obj-10.100.49.0 destination static obj-10.100.48.0 obj-10.100.48.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Now no traffic is possible between 2 hosts : 10.100.48.11 and 10.100.49.11.&lt;/P&gt;&lt;P&gt;Not ICMP no nothing.&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;When i use the packet tracer traffic gets dropped by an access-list but it does not specify which one.&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;What could be wrong here ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt;The strange thing is, when i set LAN-1 interface to security level 100 the ping from LAN-1 to LAN-2 and from LAN-2 to LAN-1 do work ?!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:49:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-traffic-between-same-security-interfaces/m-p/2256853#M349152</guid>
      <dc:creator>sebastianvandijk</dc:creator>
      <dc:date>2019-03-12T01:49:46Z</dc:date>
    </item>
    <item>
      <title>Re: asa 5505 traffic between same security interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-traffic-between-same-security-interfaces/m-p/2256854#M349157</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you dont want NAT between the 2 LANs then leave out all NAT configuratins between them. You dont need NAT configurations as the traffic will go through without NAT by default. Its only when you have some other NAT configurations between 2 interfaces (Like Dynamic NAT/PAT) when you need another NAT configuration to tell that some traffic doesnt need to be NATed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even if you configure ACLs to the interface you will still require &lt;STRONG&gt;"same-security-traffic permit inter-interface"&lt;/STRONG&gt;. This is why &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; returns a ACL deny without specifying the exact ACL. The output is a bit cryptic sometimes and doesnt tell you the specific reason which I think is pretty bad from Ciscos part.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Either enter that command or change the &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; so they arent equal.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please remember to mark the reply as the correct answer if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ask more if needed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 May 2013 12:43:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-traffic-between-same-security-interfaces/m-p/2256854#M349157</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-27T12:43:46Z</dc:date>
    </item>
  </channel>
</rss>

