<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Problem config on FWSM in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/problem-config-on-fwsm/m-p/2254055#M349172</link>
    <description>&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;configuration on ASA 5580 Version 8.2(1)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;static (inside,outside) 112.111.112.10 10.52.12.10 netmask 255.255.255.255 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 112.111.112.11 10.52.12.11 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-group acl_inside in interface inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;access-list acl_inside extended permit ip any any &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;interface TenGigabitEthernet5/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.52.12.1 255.255.255.248 &lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configuration on FWSM Firewall Version 4.0(15)&lt;/P&gt;&lt;P&gt;static (inside,outside) 112.111.112.10 10.52.12.10 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 112.111.112.11 10.52.12.11 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-group acl_inside in interface inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;access-list acl_inside extended permit ip any any &lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;interface inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; description Link to ServerFarm&lt;/P&gt;&lt;P&gt; nameif pal&lt;/P&gt;&lt;P&gt; security-level 40&lt;/P&gt;&lt;P&gt; ip address 10.52.12.1 255.255.255.248 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;i want to compare configuration on two devices, currently i have scenario IP 10.52.12.11 as Webserver (http), Configuration on ASA 5580 when to connect from inside(10.52.12.10) to 112.111.112.11 port 80 succesfull, but if used configuration on FWSM unsuccessful. any ideas??&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 01:49:36 GMT</pubDate>
    <dc:creator>Rohmat Tri Indra</dc:creator>
    <dc:date>2019-03-12T01:49:36Z</dc:date>
    <item>
      <title>Problem config on FWSM</title>
      <link>https://community.cisco.com/t5/network-security/problem-config-on-fwsm/m-p/2254055#M349172</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;configuration on ASA 5580 Version 8.2(1)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;static (inside,outside) 112.111.112.10 10.52.12.10 netmask 255.255.255.255 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 112.111.112.11 10.52.12.11 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-group acl_inside in interface inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;access-list acl_inside extended permit ip any any &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;interface TenGigabitEthernet5/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.52.12.1 255.255.255.248 &lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configuration on FWSM Firewall Version 4.0(15)&lt;/P&gt;&lt;P&gt;static (inside,outside) 112.111.112.10 10.52.12.10 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 112.111.112.11 10.52.12.11 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-group acl_inside in interface inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;access-list acl_inside extended permit ip any any &lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;interface inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; description Link to ServerFarm&lt;/P&gt;&lt;P&gt; nameif pal&lt;/P&gt;&lt;P&gt; security-level 40&lt;/P&gt;&lt;P&gt; ip address 10.52.12.1 255.255.255.248 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;i want to compare configuration on two devices, currently i have scenario IP 10.52.12.11 as Webserver (http), Configuration on ASA 5580 when to connect from inside(10.52.12.10) to 112.111.112.11 port 80 succesfull, but if used configuration on FWSM unsuccessful. any ideas??&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:49:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-config-on-fwsm/m-p/2254055#M349172</guid>
      <dc:creator>Rohmat Tri Indra</dc:creator>
      <dc:date>2019-03-12T01:49:36Z</dc:date>
    </item>
    <item>
      <title>Re: Problem config on FWSM</title>
      <link>https://community.cisco.com/t5/network-security/problem-config-on-fwsm/m-p/2254056#M349173</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you are saying that you have 2 hosts on the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; and you are trying to connect from the other &lt;STRONG&gt;"inside"&lt;/STRONG&gt; host to the other &lt;STRONG&gt;"inside"&lt;/STRONG&gt; host with its NAT IP address?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By default this is not possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I would imagine you have additional NAT configurations and certain global configurations that make this possible as I cant see a &lt;STRONG&gt;"dns"&lt;/STRONG&gt; parameter in the &lt;STRONG&gt;"static"&lt;/STRONG&gt; command that would enable this in cases where the NAT IP address has a public DNS configuration. With the &lt;STRONG&gt;"dns"&lt;/STRONG&gt; parameter at the end of the &lt;STRONG&gt;"static"&lt;/STRONG&gt; configuration would essentially make the ASA rewrite the DNS reply from a DNS server to reply with the private IP address rather than the NAT IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The global configuration I am referring to is &lt;STRONG&gt;"same-security-traffic permit intra-interface"&lt;/STRONG&gt; which would allow traffic to enter and leave the same interface which in this case would apply to "inside". This has to be enabled to have any hope of the traffic being allowed to enter and then leave the same interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While the source and destination host are both in the same network you should use the local IP address to connect OR use the &lt;STRONG&gt;"dns"&lt;/STRONG&gt; parameter (provided the servers have DNS names configured on DNS server and the firewall can see the DNS query) OR you can configure NAT to make it possible to connect to the server using public IP address even from the LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest using &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command on the ASA (where the connection works according to you) to confirm which NAT rules it hits&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside tcp 10.52.12.10 12345 112.111.112.11 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;EDIT: Your interface "nameif" also dont match on the 2 devices? Do you have interface "inside" also on FWSM? I guess you must have if it accepts the "static" configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 May 2013 06:50:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-config-on-fwsm/m-p/2254056#M349173</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-27T06:50:45Z</dc:date>
    </item>
    <item>
      <title>Problem config on FWSM</title>
      <link>https://community.cisco.com/t5/network-security/problem-config-on-fwsm/m-p/2254057#M349174</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Rohmat,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They are the same except for the fact that the security level on the ASA is higher (100) than the one on the FWSM(40)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you sure the problem is not related to a security-level issue&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My recommendation do captures on the outside interface of the FWSM and also on the inside matching the HTTP packets,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 May 2013 06:51:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-config-on-fwsm/m-p/2254057#M349174</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-05-27T06:51:38Z</dc:date>
    </item>
  </channel>
</rss>

