<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA5520 transparent firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5520-transparent-firewall/m-p/2248019#M350331</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA configuration guide says the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt; The ASA learns and builds a MAC address table in a similar way as a&amp;nbsp; normal bridge or switch: when a device sends a packet through the ASA,&amp;nbsp; the ASA adds the MAC address to its table. The table associates the MAC&amp;nbsp; address with the source interface so that the ASA knows to send any&amp;nbsp; packets addressed to the device out the correct interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SOME asa5505="" related="" output="" removed=""&gt;&lt;/SOME&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1231406"&gt;&lt;/A&gt;&lt;A name="wpmkr1231407"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1231411"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; Because the ASA is a firewall, if the destination MAC address of a&amp;nbsp; packet is not in the table, the ASA does not flood the original packet&amp;nbsp; on all interfaces as a normal bridge does. Instead, it generates the&amp;nbsp; following packets for directly connected devices or for remote devices: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1231418"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;Packets&amp;nbsp; for directly connected devices—The ASA generates an ARP request for the&amp;nbsp; destination IP address, so that the ASA can learn which interface&amp;nbsp; receives the ARP response. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1231425"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;Packets&amp;nbsp; for remote devices—The ASA generates a ping to the destination IP&amp;nbsp; address so that the ASA can learn which interface receives the ping&amp;nbsp; reply. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 07 May 2013 20:19:15 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-05-07T20:19:15Z</dc:date>
    <item>
      <title>ASA5520 transparent firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-transparent-firewall/m-p/2248009#M350318</link>
      <description>&lt;P&gt;I'm trying to configure a transparent firewall.&amp;nbsp; I have been loosely following:&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a008089f467.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a008089f467.shtml&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;my management network is 10.10.0.0 while the connection I want to firewall (g0/0 - g0/1) is 10.11.0.0/24 &lt;/P&gt;&lt;P&gt;However, there is no way to add that 'ip address' statement to the root of the config.&amp;nbsp; I have tried version 8.4 and 9.0 of the ASA software.&amp;nbsp; &lt;/P&gt;&lt;P&gt;Below is my config, it will not pass traffic:&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# sr&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.4(6) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;command-alias exec sr show run &lt;/P&gt;&lt;P&gt;firewall transparent&lt;/P&gt;&lt;P&gt;hostname guestfw&lt;/P&gt;&lt;P&gt;enable password 2AUevpoV6wPBdTtM encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt; shutdown&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.10.2.61 255.255.254.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa846-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;access-list outside ethertype permit any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging console informational&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;icmp permit any management&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;route management 10.10.0.0 255.255.0.0 10.10.3.254 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 10.10.0.0 255.255.0.0 management&lt;/P&gt;&lt;P&gt;ssh timeout 30&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;username mus3 password NKpF6OSnjbuhpso1 encrypted&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptochecksum:86a0046a15a88d923dd4cf89da61cef3&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:40:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-transparent-firewall/m-p/2248009#M350318</guid>
      <dc:creator>mroes1234</dc:creator>
      <dc:date>2019-03-12T01:40:10Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5520 transparent firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-transparent-firewall/m-p/2248010#M350319</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think you used to configure the "ip address" configuration in the global configuration mode in for example 8.2 software level.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the later software levels you are using, you will have to configure a BVI interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa84/command/reference/i3.html#wp1931025" rel="nofollow"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/command/reference/i3.html#wp1931025&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Before this, I think you need to assing the physical interfaces in "bridge-group"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa84/command/reference/b.html#wp1373280" rel="nofollow"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/command/reference/b.html#wp1373280&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rememer to mark the reply as the correct answer if it did answer your question and/or rate helpfull answers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 May 2013 18:45:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-transparent-firewall/m-p/2248010#M350319</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-07T18:45:13Z</dc:date>
    </item>
    <item>
      <title>ASA5520 transparent firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-transparent-firewall/m-p/2248011#M350320</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration guide should have more information related to the Transparent mode interface configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/interface_start.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/interface_start.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 May 2013 18:46:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-transparent-firewall/m-p/2248011#M350320</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-07T18:46:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5520 transparent firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-transparent-firewall/m-p/2248012#M350321</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have looked at that too.&amp;nbsp; I tried setting bridge groups and a BVI like so (no change):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# sr&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.4(6) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;command-alias exec sr show run &lt;/P&gt;&lt;P&gt;firewall transparent&lt;/P&gt;&lt;P&gt;hostname guestfw&lt;/P&gt;&lt;P&gt;enable password 2AUevpoV6wPBdTtM encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; bridge-group 1&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; bridge-group 1&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.10.2.61 255.255.254.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface BVI1&lt;/P&gt;&lt;P&gt; ip address 10.12.2.61 255.255.254.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface BVI10&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa846-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;access-list outside ethertype permit any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging console informational&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;icmp permit any management&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;route management 10.10.0.0 255.255.0.0 128.180.3.254 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 10.10.0.0 255.255.0.0 management&lt;/P&gt;&lt;P&gt;ssh timeout 30&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;username mroes1234 password ***************** encrypted&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptochecksum:f66af66c0053c0beecfbd5e6ae604f11&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 May 2013 18:50:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-transparent-firewall/m-p/2248012#M350321</guid>
      <dc:creator>mroes1234</dc:creator>
      <dc:date>2013-05-07T18:50:19Z</dc:date>
    </item>
    <item>
      <title>ASA5520 transparent firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-transparent-firewall/m-p/2248013#M350322</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What are you using for testing? ICMP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If yes, then try to add the commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;fixup protocol icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;fixup protocol icmp error&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To enable ICMP inspection on the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also check the MAC address table of the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show mac-address-table&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And check if there there is any MAC addresses that the ASA had learned&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 May 2013 19:01:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-transparent-firewall/m-p/2248013#M350322</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-07T19:01:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5520 transparent firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-transparent-firewall/m-p/2248014#M350323</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the only entry in the mac address table is the host directly connected to the inside interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 May 2013 19:21:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-transparent-firewall/m-p/2248014#M350323</guid>
      <dc:creator>mroes1234</dc:creator>
      <dc:date>2013-05-07T19:21:03Z</dc:date>
    </item>
    <item>
      <title>ASA5520 transparent firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-transparent-firewall/m-p/2248015#M350324</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you remove the IP address from the "management" interface. Its the same as the BVI interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also add the above ICMP related configurations and try to ping some host on the same network as the test host and see if that works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If that works then try to reach some remote network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 May 2013 19:24:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-transparent-firewall/m-p/2248015#M350324</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-07T19:24:26Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5520 transparent firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-transparent-firewall/m-p/2248016#M350326</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Turns out, for some reason, the BVI interface needs to be on the same subnet that the FW is firewalling.&amp;nbsp; The logic behind this eludes me.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 May 2013 19:56:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-transparent-firewall/m-p/2248016#M350326</guid>
      <dc:creator>mroes1234</dc:creator>
      <dc:date>2013-05-07T19:56:22Z</dc:date>
    </item>
    <item>
      <title>ASA5520 transparent firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-transparent-firewall/m-p/2248017#M350329</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont have that much expirience with the Transparent firewalls as I have not had the need to configure them in any customer environment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding you can configure several bridge-groups on the firewall for each segment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And the management/BVI IP address has to be on the same subnet as the connected segment. Otherwise the device wouldnt really be able to be managed remotely or it wouldnt be able to forward any from the box/to the box traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the same way when you have several L2 switches. You have one Vlan ID and interface per Switch usually and all configured with a separate IP address from the subnet so you can manage the device and the device knows where to forward traffic from the actual box.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA also requires the IP address from the same network to be able to determine where to forward the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 May 2013 20:08:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-transparent-firewall/m-p/2248017#M350329</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-07T20:08:13Z</dc:date>
    </item>
    <item>
      <title>ASA5520 transparent firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-transparent-firewall/m-p/2248018#M350330</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To your first point, there is no reason to have the *management* of the device on the subnet being firewalled.&amp;nbsp; It makes more sense to have the management interface on the management network.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far as your second point, the point of a layer-2 firewall is that it doesn't need to *know* where to forward traffic as it is a dumb bridge.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While I recognize the need to have this BVI on the same network as the traffic being bridged, these are not sufficient reasons to support this need.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 May 2013 20:11:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-transparent-firewall/m-p/2248018#M350330</guid>
      <dc:creator>mroes1234</dc:creator>
      <dc:date>2013-05-07T20:11:41Z</dc:date>
    </item>
    <item>
      <title>ASA5520 transparent firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-transparent-firewall/m-p/2248019#M350331</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA configuration guide says the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt; The ASA learns and builds a MAC address table in a similar way as a&amp;nbsp; normal bridge or switch: when a device sends a packet through the ASA,&amp;nbsp; the ASA adds the MAC address to its table. The table associates the MAC&amp;nbsp; address with the source interface so that the ASA knows to send any&amp;nbsp; packets addressed to the device out the correct interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SOME asa5505="" related="" output="" removed=""&gt;&lt;/SOME&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1231406"&gt;&lt;/A&gt;&lt;A name="wpmkr1231407"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1231411"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; Because the ASA is a firewall, if the destination MAC address of a&amp;nbsp; packet is not in the table, the ASA does not flood the original packet&amp;nbsp; on all interfaces as a normal bridge does. Instead, it generates the&amp;nbsp; following packets for directly connected devices or for remote devices: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1231418"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;Packets&amp;nbsp; for directly connected devices—The ASA generates an ARP request for the&amp;nbsp; destination IP address, so that the ASA can learn which interface&amp;nbsp; receives the ARP response. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1231425"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;Packets&amp;nbsp; for remote devices—The ASA generates a ping to the destination IP&amp;nbsp; address so that the ASA can learn which interface receives the ping&amp;nbsp; reply. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 May 2013 20:19:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-transparent-firewall/m-p/2248019#M350331</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-07T20:19:15Z</dc:date>
    </item>
  </channel>
</rss>

