<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA 5505 Routing between internal networks in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-routing-between-internal-networks/m-p/2202958#M361789</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I would check what the server is doing with the traffic that comes from the inside. [packet capture]&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 20 Feb 2013 08:39:09 GMT</pubDate>
    <dc:creator>jocamare</dc:creator>
    <dc:date>2013-02-20T08:39:09Z</dc:date>
    <item>
      <title>Cisco ASA 5505 Routing between internal networks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-routing-between-internal-networks/m-p/2202946#M361775</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am new to Cisco ASA and have been configuring my new firewall but one thing have been bothering. I cannot get internal networks and routing between them to work as I would like to. Goal is to set four networks and control access with ACL:s between those.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Outside&lt;/P&gt;&lt;P&gt;2. DMZ&lt;/P&gt;&lt;P&gt;3. ServerNet1&lt;/P&gt;&lt;P&gt;4. Inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA version is 9.1 and i have been reading on two different ways on handling IP routing with this. NAT Exempt and not configuring NAT at all and letting normal IP routing to handle internal networks. No matter how I configure, with or without NAT I cannot get access from inside network to DMZ or from ServerNet1 to DMZ. Strange thing is that I can access services from DMZ to Inside and ServerNet1 if access list allows it. For instance DNS server is on Inside network and DMZ works great using it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the running conf:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;BR /&gt;switchport access vlan 20&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;switchport access vlan 20&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;switchport access vlan 19&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;switchport access vlan 10&lt;BR /&gt;switchport trunk allowed vlan 10,19-20&lt;BR /&gt;switchport trunk native vlan 1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;switchport access vlan 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;switchport access vlan 10&lt;BR /&gt;switchport trunk allowed vlan 10-11,19-20&lt;BR /&gt;switchport trunk native vlan 1&lt;BR /&gt;switchport mode trunk&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;switchport access vlan 10&lt;BR /&gt;switchport trunk allowed vlan 10-11,19-20&lt;BR /&gt;switchport trunk native vlan 1&lt;BR /&gt;switchport mode trunk&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;switchport access vlan 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan10&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 90&lt;BR /&gt;ip address 192.168.2.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan11&lt;BR /&gt;nameif ServerNet1&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.4.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan19&lt;BR /&gt;nameif DMZ&lt;BR /&gt;security-level 10&lt;BR /&gt;ip address 192.168.3.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan20&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address dhcp setroute&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EEST 2&lt;BR /&gt;clock summer-time EEDT recurring last Sun Mar 3:00 last Sun Oct 4:00&lt;BR /&gt;object network obj_any&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj-192.168.2.0&lt;BR /&gt;subnet 192.168.2.0 255.255.255.0&lt;BR /&gt;object network obj-192.168.3.0&lt;BR /&gt;subnet 192.168.3.0 255.255.255.0&lt;BR /&gt;object network DNS&lt;BR /&gt;host 192.168.2.10&lt;BR /&gt;description DNS Liikenne&lt;BR /&gt;object network Srv2&lt;BR /&gt;host 192.168.2.10&lt;BR /&gt;description DC, DNS, DNCP&lt;BR /&gt;object network obj-192.168.4.0&lt;BR /&gt;subnet 192.168.4.0 255.255.255.0&lt;BR /&gt;object network ServerNet1&lt;BR /&gt;subnet 192.168.4.0 255.255.255.0&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt;protocol-object udp&lt;BR /&gt;protocol-object tcp&lt;BR /&gt;object-group network RFC1918&lt;BR /&gt;object-group network InternalNetworks&lt;BR /&gt;network-object 192.168.2.0 255.255.255.0&lt;BR /&gt;network-object 192.168.3.0 255.255.255.0&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt;service-object tcp destination eq domain&lt;BR /&gt;service-object udp destination eq domain&lt;BR /&gt;service-object udp destination eq nameserver&lt;BR /&gt;service-object udp destination eq ntp&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt;port-object eq www&lt;BR /&gt;port-object eq https&lt;BR /&gt;port-object eq ftp&lt;BR /&gt;port-object eq ftp-data&lt;BR /&gt;object-group service rdp tcp-udp&lt;BR /&gt;description Microsoft RDP&lt;BR /&gt;port-object eq 3389&lt;BR /&gt;object-group service DM_INLINE_TCP_2 tcp&lt;BR /&gt;port-object eq ftp&lt;BR /&gt;port-object eq ftp-data&lt;BR /&gt;port-object eq www&lt;BR /&gt;port-object eq https&lt;BR /&gt;object-group service DM_INLINE_SERVICE_2&lt;BR /&gt;service-object tcp destination eq domain&lt;BR /&gt;service-object udp destination eq domain&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;network-object object obj-192.168.2.0&lt;BR /&gt;network-object object obj-192.168.4.0&lt;BR /&gt;access-list dmz_access_in extended permit ip object obj-192.168.3.0 object obj_any&lt;BR /&gt;access-list dmz_access_in extended deny ip any object-group InternalNetworks&lt;BR /&gt;access-list DMZ_access_in extended permit object-group TCPUDP object obj-192.168.3.0 object DNS eq domain&lt;BR /&gt;access-list DMZ_access_in extended permit object-group TCPUDP object obj-192.168.3.0 object-group DM_INLINE_NETWORK_1 object-group rdp&lt;BR /&gt;access-list DMZ_access_in extended deny ip any object-group InternalNetworks&lt;BR /&gt;access-list DMZ_access_in extended permit tcp object obj-192.168.3.0 object obj_any object-group DM_INLINE_TCP_2&lt;BR /&gt;access-list inside_access_in extended permit ip object obj-192.168.2.0 object-group InternalNetworks&lt;BR /&gt;access-list inside_access_in extended permit object-group TCPUDP object obj-192.168.2.0 object obj_any object-group rdp&lt;BR /&gt;access-list inside_access_in extended permit tcp object obj-192.168.2.0 object obj_any object-group DM_INLINE_TCP_1&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_1 object Srv2 object obj_any&lt;BR /&gt;access-list inside_access_in extended permit object-group TCPUDP object obj-192.168.2.0 object obj-192.168.3.0 object-group rdp&lt;BR /&gt;access-list ServerNet1_access_in extended permit object-group DM_INLINE_SERVICE_2 any object DNS&lt;BR /&gt;access-list ServerNet1_access_in extended permit ip any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu ServerNet1 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-711-52.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,DMZ) source static obj-192.168.2.0 obj-192.168.2.0 destination static obj-192.168.2.0 obj-192.168.2.0 no-proxy-arp&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;!&lt;BR /&gt;nat (DMZ,outside) after-auto source dynamic obj_any interface destination static obj_any obj_any&lt;BR /&gt;nat (ServerNet1,outside) after-auto source dynamic obj-192.168.4.0 interface&lt;BR /&gt;access-group ServerNet1_access_in in interface ServerNet1&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group DMZ_access_in in interface DMZ&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.2.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.4.0 255.255.255.0 ServerNet1&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.4.0 255.255.255.0 ServerNet1&lt;BR /&gt;ssh 192.168.2.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:02:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-routing-between-internal-networks/m-p/2202946#M361775</guid>
      <dc:creator>antti.alila</dc:creator>
      <dc:date>2019-03-12T01:02:39Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 Routing between internal networks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-routing-between-internal-networks/m-p/2202947#M361778</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try to replace:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,DMZ) source static obj-192.168.2.0 obj-192.168.2.0 destination static obj-192.168.2.0 obj-192.168.2.0 no-proxy-arp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;with this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,DMZ) source static obj-192.168.2.0 obj-192.168.2.0 destination static obj-192.168.3.0 obj-192.168.3.0 no-proxy-arp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or just remove it, you don't need it anyway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You seem to have the proper configuration to allow communications from ServerNet1 to DMZ, have you tried to run packet-tracers?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is how you do it [in case you don't know]:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer in &lt;/STRONG&gt;&lt;INCOMING interface=""&gt; [tcp/udp/icmp] &lt;SOURCE ip=""&gt; &lt;SOURCE port=""&gt; &lt;DESTINATION ip=""&gt; &lt;DEST port=""&gt;&lt;/DEST&gt;&lt;/DESTINATION&gt;&lt;/SOURCE&gt;&lt;/SOURCE&gt;&lt;/INCOMING&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i.e&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet tracer in inside tcp 192.168.2.11 1234 192.168.3.11 80 &lt;/P&gt;&lt;P&gt;packet tracer in ServerNet1 tcp 192.168.4.11 1234 192.168.3.11 80&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Feb 2013 19:43:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-routing-between-internal-networks/m-p/2202947#M361778</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-02-19T19:43:21Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 Routing between internal networks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-routing-between-internal-networks/m-p/2202948#M361779</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Finnish I guess judging by the username &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; Will still answer in english for others sake.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Judging by the current NAT setup the main need at the moment regarding NAT would be use the "outside" interface IP address as PAT address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would personally first remove ALL the current NAT configurations and configure a default PAT translation in the following way&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network DEFAULT-PAT-SOURCE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; description Default PAT source networks&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 192.168.2.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 192.168.3.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 192.168.4.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (any,outside) after-auto source dynamic DEFAULT-PAT-SOURCE interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above should handle PAT translation for outbound connections from all the local networks of the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For traffic between the local interfaces/networks I would suggest not configuring any NAT at all UNLESS you specifically want to translate something to a different IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A good way to test the firewall functionality and if something is wrong with your configurations is the "packet-tracer" command which is also available on the ASDM side. The CLI output is easier to copy/paste here on the forums for troubleshooting purposes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use the following format of the command to see what the ASA would do to the traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside tcp 192.168.2.100 1234 192.168.3.100 3389&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The objective is just to simulate some connection and see what rules the ASA applies to it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is some bugs related to NAT in the newest software of ASA at the moment. I am not quite sure though would they apply in your case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Feb 2013 19:52:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-routing-between-internal-networks/m-p/2202948#M361779</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-19T19:52:21Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 Routing between internal networks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-routing-between-internal-networks/m-p/2202949#M361780</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Removed the NAT, still no access from inside to DMZ or from ServerNet1 to DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Packet-Tracer says everything is working, or so I understand from this. Still routing doesnt work:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# packet-tracer in inside tcp 192.168.2.11 1234 192.168.3.11 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 192.168.3.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; DMZ&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-list inside_access_in extended permit ip object obj-192.168.2.0 object-group InternalNetworks&lt;BR /&gt;object-group network InternalNetworks&lt;BR /&gt; network-object 192.168.2.0 255.255.255.0&lt;BR /&gt; network-object 192.168.3.0 255.255.255.0&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 101996, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: DMZ&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# packet-tracer in ServerNet1 tcp 192.168.4.11 1234 192.168.3.11 80&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 192.168.3.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; DMZ&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group ServerNet1_access_in in interface ServerNet1&lt;BR /&gt;access-list ServerNet1_access_in extended permit ip any any&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 102003, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: ServerNet1&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: DMZ&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Feb 2013 19:53:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-routing-between-internal-networks/m-p/2202949#M361780</guid>
      <dc:creator>antti.alila</dc:creator>
      <dc:date>2013-02-19T19:53:27Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 Routing between internal networks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-routing-between-internal-networks/m-p/2202950#M361781</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One question would be how the rest of the network looks like.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example you have several trunk configurations which all have the same Vlan IDs. Also the "outside" Vlan goes to several ports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Trunk ports also have access vlan configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the devices behind the ASA purely acting as L2 switches or is there some routing going on there that might mess things up.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Feb 2013 20:00:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-routing-between-internal-networks/m-p/2202950#M361781</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-19T20:00:23Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 Routing between internal networks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-routing-between-internal-networks/m-p/2202951#M361782</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yep, Finnish would be good also &lt;span class="lia-unicode-emoji" title=":grinning_face_with_big_eyes:"&gt;😃&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In front of ASA is DSL modem, on the trunk ports is Hyper-V host that uses the trunk ports so that every VM has their VLAN ID defined in the VM level. Everything is working good on that end. Also there is WLAN Access Pois on one of the ASA ports, on the WLAN AP there is the management portal address on DMZ that i have been testing agains (192.168.3.4)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If i configure Dynamic PAT from inside to the DMZ then the traffic starts to work from inside to all hosts on DMZ but thats not the right way to do it so no shortcuts &lt;span class="lia-unicode-emoji" title=":grinning_face_with_big_eyes:"&gt;😃&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the conf now, still doesnt work:&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 20&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; switchport access vlan 20&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; switchport access vlan 19&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; switchport access vlan 10&lt;BR /&gt; switchport trunk allowed vlan 10,19-20&lt;BR /&gt; switchport trunk native vlan 1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt; switchport access vlan 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt; switchport access vlan 10&lt;BR /&gt; switchport trunk allowed vlan 10-11,19-20&lt;BR /&gt; switchport trunk native vlan 1&lt;BR /&gt; switchport mode trunk&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt; switchport access vlan 10&lt;BR /&gt; switchport trunk allowed vlan 10-11,19-20&lt;BR /&gt; switchport trunk native vlan 1&lt;BR /&gt; switchport mode trunk&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt; switchport access vlan 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan10&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 90&lt;BR /&gt; ip address 192.168.2.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan11&lt;BR /&gt; nameif ServerNet1&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.4.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan19&lt;BR /&gt; nameif DMZ&lt;BR /&gt; security-level 10&lt;BR /&gt; ip address 192.168.3.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan20&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address dhcp setroute&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EEST 2&lt;BR /&gt;clock summer-time EEDT recurring last Sun Mar 3:00 last Sun Oct 4:00&lt;BR /&gt;object network obj_any&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj-192.168.2.0&lt;BR /&gt; subnet 192.168.2.0 255.255.255.0&lt;BR /&gt;object network obj-192.168.3.0&lt;BR /&gt; subnet 192.168.3.0 255.255.255.0&lt;BR /&gt;object network DNS&lt;BR /&gt; host 192.168.2.10&lt;BR /&gt; description DNS Liikenne&lt;BR /&gt;object network Srv2&lt;BR /&gt; host 192.168.2.10&lt;BR /&gt; description DC, DNS, DNCP&lt;BR /&gt;object network obj-192.168.4.0&lt;BR /&gt; subnet 192.168.4.0 255.255.255.0&lt;BR /&gt;object network ServerNet1&lt;BR /&gt; subnet 192.168.4.0 255.255.255.0&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;object-group network RFC1918&lt;BR /&gt;object-group network InternalNetworks&lt;BR /&gt; network-object 192.168.2.0 255.255.255.0&lt;BR /&gt; network-object 192.168.3.0 255.255.255.0&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt; service-object tcp destination eq domain&lt;BR /&gt; service-object udp destination eq domain&lt;BR /&gt; service-object udp destination eq nameserver&lt;BR /&gt; service-object udp destination eq ntp&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq https&lt;BR /&gt; port-object eq ftp&lt;BR /&gt; port-object eq ftp-data&lt;BR /&gt;object-group service rdp tcp-udp&lt;BR /&gt; description Microsoft RDP&lt;BR /&gt; port-object eq 3389&lt;BR /&gt;object-group service DM_INLINE_TCP_2 tcp&lt;BR /&gt; port-object eq ftp&lt;BR /&gt; port-object eq ftp-data&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq https&lt;BR /&gt;object-group service DM_INLINE_SERVICE_2&lt;BR /&gt; service-object tcp destination eq domain&lt;BR /&gt; service-object udp destination eq domain&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt; network-object object obj-192.168.2.0&lt;BR /&gt; network-object object obj-192.168.4.0&lt;BR /&gt;object-group network DEFAULT-PAT-SOURCE&lt;BR /&gt; description Default PAT source networks&lt;BR /&gt; network-object 192.168.2.0 255.255.255.0&lt;BR /&gt; network-object 192.168.3.0 255.255.255.0&lt;BR /&gt; network-object 192.168.4.0 255.255.255.0&lt;BR /&gt;access-list dmz_access_in extended permit ip object obj-192.168.3.0 object obj_any&lt;BR /&gt;access-list dmz_access_in extended deny ip any object-group InternalNetworks&lt;BR /&gt;access-list DMZ_access_in extended permit object-group TCPUDP object obj-192.168.3.0 object DNS eq domain&lt;BR /&gt;access-list DMZ_access_in extended permit object-group TCPUDP object obj-192.168.3.0 object-group DM_INLINE_NETWORK_1 object-group rdp&lt;BR /&gt;access-list DMZ_access_in extended deny ip any object-group InternalNetworks&lt;BR /&gt;access-list DMZ_access_in extended permit tcp object obj-192.168.3.0 object obj_any object-group DM_INLINE_TCP_2&lt;BR /&gt;access-list inside_access_in extended permit ip object obj-192.168.2.0 object-group InternalNetworks&lt;BR /&gt;access-list inside_access_in extended permit object-group TCPUDP object obj-192.168.2.0 object obj_any object-group rdp&lt;BR /&gt;access-list inside_access_in extended permit tcp object obj-192.168.2.0 object obj_any object-group DM_INLINE_TCP_1&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_1 object Srv2 object obj_any&lt;BR /&gt;access-list inside_access_in extended permit object-group TCPUDP object obj-192.168.2.0 object obj-192.168.3.0 object-group rdp&lt;BR /&gt;access-list ServerNet1_access_in extended permit object-group DM_INLINE_SERVICE_2 any object DNS&lt;BR /&gt;access-list ServerNet1_access_in extended permit ip any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu ServerNet1 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-711-52.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;nat (any,outside) after-auto source dynamic DEFAULT-PAT-SOURCE interface&lt;BR /&gt;access-group ServerNet1_access_in in interface ServerNet1&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group DMZ_access_in in interface DMZ&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.2.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.4.0 255.255.255.0 ServerNet1&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.4.0 255.255.255.0 ServerNet1&lt;BR /&gt;ssh 192.168.2.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Feb 2013 20:21:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-routing-between-internal-networks/m-p/2202951#M361782</guid>
      <dc:creator>antti.alila</dc:creator>
      <dc:date>2013-02-19T20:21:54Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 Routing between internal networks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-routing-between-internal-networks/m-p/2202952#M361783</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA Vlan interface configuration is fine and also the NAT configuration should be fine with the Default PAT configuration I mentioned previously.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rest of the problem most probably have a cause somewhere else than the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sadly I know nothing about Hyper-V or virtual machines so I can't help there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I hadnt heard anything else than the fact that PAT from inside to DMZ makes connections work would lead me to believe that the DMZ can only communicate with hosts on the directly connected network and therefore the problem is the lack of correct default gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not really sure where to go with this. ASA configuration (excluding the physical port configurations) seems fine to me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Feb 2013 21:06:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-routing-between-internal-networks/m-p/2202952#M361783</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-19T21:06:04Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 Routing between internal networks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-routing-between-internal-networks/m-p/2202953#M361784</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Config looks fine, let's take a look at the traffic and see if it is traversing the ASA, that way we can at least forget or focus on it when trying to solve the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We do that using packet captures, let's focus on the inside users for now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list test permit ip host&lt;/STRONG&gt; &amp;lt;&lt;EM&gt;ip of an internal host&lt;/EM&gt;&amp;gt; &lt;STRONG&gt;host &lt;/STRONG&gt;&amp;lt;&lt;EM&gt;ip of a DMZ host&lt;/EM&gt;&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list test permit ip host &lt;/STRONG&gt;&amp;lt;&lt;EM&gt;ip of a DMZ host&lt;/EM&gt;&amp;gt; &lt;STRONG&gt;host &lt;/STRONG&gt;&amp;lt;&lt;EM&gt;ip of an internal host&lt;/EM&gt;&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;cap test access-list test in inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;cap test1 access-list in DMZ&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Review the captures with the "&lt;STRONG&gt;show capture&lt;/STRONG&gt; &lt;CAP&gt;" command, it should show exactly the same packets.&lt;/CAP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try to run the "&lt;STRONG&gt;show local&lt;/STRONG&gt; &lt;IP of="" the="" internal="" host=""&gt; &lt;STRONG&gt;details&lt;/STRONG&gt;" command once you know traffic is being sent to the DMZ device.&lt;/IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It can be any type of traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Share the outputs if you think it will be necessary.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Feb 2013 22:50:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-routing-between-internal-networks/m-p/2202953#M361784</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-02-19T22:50:21Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5505 Routing between internal networks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-routing-between-internal-networks/m-p/2202954#M361785</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the output:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# access-list test permit ip host 192.168.2.37 host 192.168.3.4&lt;/P&gt;&lt;P&gt;ciscoasa(config)# access-list test permit ip host 192.168.3.4 host 192.168.2.37&lt;/P&gt;&lt;P&gt;ciscoasa(config)# cap test access-list test in inside&lt;/P&gt;&lt;P&gt;ciscoasa(config)# cap test1 access-list test in dmz&lt;/P&gt;&lt;P&gt;ciscoasa(config)# show capture test&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;20 packets captured&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 07:33:52.712777&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#10 P0 192.168.2.37.50407 &amp;gt; 192.168.3.4.443: S 3090835039:3090835039(0) win 65535 &lt;MSS 1460=""&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 07:33:52.718438&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#10 P0 192.168.2.37.500 &amp;gt; 192.168.3.4.500:&amp;nbsp; udp 412&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 07:33:52.719460&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#10 P0 192.168.2.37.500 &amp;gt; 192.168.3.4.500:&amp;nbsp; udp 384&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 4: 07:33:53.702356&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#10 P0 192.168.2.37.50407 &amp;gt; 192.168.3.4.443: S 3090835039:3090835039(0) win 65535 &lt;MSS 1460=""&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 5: 07:33:53.718071&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#10 P0 192.168.2.37.500 &amp;gt; 192.168.3.4.500:&amp;nbsp; udp 412&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 6: 07:33:53.718255&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#10 P0 192.168.2.37.500 &amp;gt; 192.168.3.4.500:&amp;nbsp; udp 384&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 7: 07:33:54.732460&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#10 P0 192.168.2.37.500 &amp;gt; 192.168.3.4.500:&amp;nbsp; udp 412&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 8: 07:33:54.733024&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#10 P0 192.168.2.37.500 &amp;gt; 192.168.3.4.500:&amp;nbsp; udp 384&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 9: 07:33:55.715035&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#10 P0 192.168.2.37.50407 &amp;gt; 192.168.3.4.443: S 3090835039:3090835039(0) win 65535 &lt;MSS 1460=""&gt;&lt;BR /&gt;&amp;nbsp; 10: 07:33:57.737648&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#10 P0 192.168.2.37.500 &amp;gt; 192.168.3.4.500:&amp;nbsp; udp 412&lt;BR /&gt;&amp;nbsp; 11: 07:33:57.738990&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#10 P0 192.168.2.37.500 &amp;gt; 192.168.3.4.500:&amp;nbsp; udp 384&lt;BR /&gt;&amp;nbsp; 12: 07:36:42.829165&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#10 P0 192.168.2.37.50611 &amp;gt; 192.168.3.4.443: S 2119788698:2119788698(0) win 65535 &lt;MSS 1460=""&gt;&lt;BR /&gt;&amp;nbsp; 13: 07:36:42.841371&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#10 P0 192.168.2.37.500 &amp;gt; 192.168.3.4.500:&amp;nbsp; udp 412&lt;BR /&gt;&amp;nbsp; 14: 07:36:42.845293&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#10 P0 192.168.2.37.500 &amp;gt; 192.168.3.4.500:&amp;nbsp; udp 384&lt;BR /&gt;&amp;nbsp; 15: 07:36:43.823108&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#10 P0 192.168.2.37.50611 &amp;gt; 192.168.3.4.443: S 2119788698:2119788698(0) win 65535 &lt;MSS 1460=""&gt;&lt;BR /&gt;&amp;nbsp; 16: 07:36:43.885879&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#10 P0 192.168.2.37.500 &amp;gt; 192.168.3.4.500:&amp;nbsp; udp 412&lt;BR /&gt;&amp;nbsp; 17: 07:36:43.886428&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#10 P0 192.168.2.37.500 &amp;gt; 192.168.3.4.500:&amp;nbsp; udp 384&lt;BR /&gt;&amp;nbsp; 18: 07:36:44.947079&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#10 P0 192.168.2.37.500 &amp;gt; 192.168.3.4.500:&amp;nbsp; udp 412&lt;BR /&gt;&amp;nbsp; 19: 07:36:44.947643&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#10 P0 192.168.2.37.500 &amp;gt; 192.168.3.4.500:&amp;nbsp; udp 384&lt;BR /&gt;&amp;nbsp; 20: 07:36:45.835543&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#10 P0 192.168.2.37.50611 &amp;gt; 192.168.3.4.443: S 2119788698:2119788698(0) win 65535 &lt;MSS 1460=""&gt;&lt;BR /&gt;20 packets shown&lt;BR /&gt;ciscoasa(config)# show capture test1&lt;/MSS&gt;&lt;/MSS&gt;&lt;/MSS&gt;&lt;/MSS&gt;&lt;/MSS&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;22 packets captured&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 07:33:52.713052&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#19 P0 192.168.2.37.50407 &amp;gt; 192.168.3.4.443: S 3874243330:3874243330(0) win 65535 &lt;MSS 1380=""&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 07:33:52.718636&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#19 P0 192.168.2.37.500 &amp;gt; 192.168.3.4.500:&amp;nbsp; udp 412&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 07:33:52.719475&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#19 P0 192.168.2.37.500 &amp;gt; 192.168.3.4.500:&amp;nbsp; udp 384&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 4: 07:33:53.702386&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#19 P0 192.168.2.37.50407 &amp;gt; 192.168.3.4.443: S 3874243330:3874243330(0) win 65535 &lt;MSS 1380=""&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 5: 07:33:53.718087&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#19 P0 192.168.2.37.500 &amp;gt; 192.168.3.4.500:&amp;nbsp; udp 412&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 6: 07:33:53.718285&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#19 P0 192.168.2.37.500 &amp;gt; 192.168.3.4.500:&amp;nbsp; udp 384&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 7: 07:33:54.732490&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#19 P0 192.168.2.37.500 &amp;gt; 192.168.3.4.500:&amp;nbsp; udp 412&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 8: 07:33:54.733040&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#19 P0 192.168.2.37.500 &amp;gt; 192.168.3.4.500:&amp;nbsp; udp 384&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 9: 07:33:55.715066&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#19 P0 192.168.2.37.50407 &amp;gt; 192.168.3.4.443: S 3874243330:3874243330(0) win 65535 &lt;MSS 1380=""&gt;&lt;BR /&gt;&amp;nbsp; 10: 07:33:57.737678&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#19 P0 192.168.2.37.500 &amp;gt; 192.168.3.4.500:&amp;nbsp; udp 412&lt;BR /&gt;&amp;nbsp; 11: 07:33:57.739021&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#19 P0 192.168.2.37.500 &amp;gt; 192.168.3.4.500:&amp;nbsp; udp 384&lt;BR /&gt;&amp;nbsp; 12: 07:36:42.829470&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#19 P0 192.168.2.37.50611 &amp;gt; 192.168.3.4.443: S 2996390519:2996390519(0) win 65535 &lt;MSS 1380=""&gt;&lt;BR /&gt;&amp;nbsp; 13: 07:36:42.841570&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#19 P0 192.168.2.37.500 &amp;gt; 192.168.3.4.500:&amp;nbsp; udp 412&lt;BR /&gt;&amp;nbsp; 14: 07:36:42.845323&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#19 P0 192.168.2.37.500 &amp;gt; 192.168.3.4.500:&amp;nbsp; udp 384&lt;BR /&gt;&amp;nbsp; 15: 07:36:43.823138&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#19 P0 192.168.2.37.50611 &amp;gt; 192.168.3.4.443: S 2996390519:2996390519(0) win 65535 &lt;MSS 1380=""&gt;&lt;BR /&gt;&amp;nbsp; 16: 07:36:43.885894&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#19 P0 192.168.2.37.500 &amp;gt; 192.168.3.4.500:&amp;nbsp; udp 412&lt;BR /&gt;&amp;nbsp; 17: 07:36:43.886444&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#19 P0 192.168.2.37.500 &amp;gt; 192.168.3.4.500:&amp;nbsp; udp 384&lt;BR /&gt;&amp;nbsp; 18: 07:36:44.947109&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#19 P0 192.168.2.37.500 &amp;gt; 192.168.3.4.500:&amp;nbsp; udp 412&lt;BR /&gt;&amp;nbsp; 19: 07:36:44.947659&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#19 P0 192.168.2.37.500 &amp;gt; 192.168.3.4.500:&amp;nbsp; udp 384&lt;BR /&gt;&amp;nbsp; 20: 07:36:45.835589&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#19 P0 192.168.2.37.50611 &amp;gt; 192.168.3.4.443: S 2996390519:2996390519(0) win 65535 &lt;MSS 1380=""&gt;&lt;BR /&gt;&amp;nbsp; 21: 07:36:48.020049&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#19 P0 192.168.2.37.500 &amp;gt; 192.168.3.4.500:&amp;nbsp; udp 412&lt;BR /&gt;&amp;nbsp; 22: 07:36:48.020598&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1Q vlan#19 P0 192.168.2.37.500 &amp;gt; 192.168.3.4.500:&amp;nbsp; udp 384&lt;BR /&gt;22 packets shown&lt;/MSS&gt;&lt;/MSS&gt;&lt;/MSS&gt;&lt;/MSS&gt;&lt;/MSS&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So trying from on the inside network with my laptop 192.168.2.37 to the WLAN AP at DMZ using https 192.168.3.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Antti&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Feb 2013 05:43:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-routing-between-internal-networks/m-p/2202954#M361785</guid>
      <dc:creator>antti.alila</dc:creator>
      <dc:date>2013-02-20T05:43:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5505 Routing between internal networks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-routing-between-internal-networks/m-p/2202955#M361786</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; If we exclude the UDP/500 traffic [IPSec] we can see HTTPS packets reaching the inside interface and see the exact same packets going out the DMZ interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can see traffic going both ways, but HTTPS goes only in one direction and the packets are all SYN packets, the first packet of the 3-way handshake.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; The server never replies and the connection is never established. The problem is not your asa, we just confirmed that it's forwarding the traffic to the server, it just doesn't reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you talked about this problem with the server's manager? You can have him/her get a packet capture from the server itself now that we know that the traffic is passing through.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Feb 2013 08:04:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-routing-between-internal-networks/m-p/2202955#M361786</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-02-20T08:04:47Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5505 Routing between internal networks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-routing-between-internal-networks/m-p/2202956#M361787</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes I agree but if I try to access the same address 192.168.3.4 using tcp:443 from computer on the same subnet (192.168.3.0) the portal works great and I get reply, Both computers are connected to asa and are on the same VLAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thats why I am suspecting the ASA and routing since in the previous scenario the traffic is not routed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have checked the gateway settings on these machines and they all point to their own subnet .1 address that is the gateway in asa. Also traffic from all networks work if going outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another thing is that if I create Dynamic PAT between inside and DMZ using DMZ gateway as the source address after that the 192.168.3.4 using tcp:443 also responds to the inside.&lt;/P&gt;&lt;P&gt;Question is that how do I troubleshoot this scenario if the asa is not passing packets back to the original address?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One bad option would be to downgrade the ASA and try using older firmware.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Antti&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Feb 2013 08:22:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-routing-between-internal-networks/m-p/2202956#M361787</guid>
      <dc:creator>antti.alila</dc:creator>
      <dc:date>2013-02-20T08:22:58Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 Routing between internal networks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-routing-between-internal-networks/m-p/2202957#M361788</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I said before with the inside -&amp;gt; DMZ NAT the traffic will seem for the DMZ host as coming from a directly connected network and therefore doesnt need any default route to reach the NATed inside host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Same goes naturally for the host thats on the same DMZ network and initiating the connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a possibility that the DMZ host/device is forwarding the traffic to wrong place?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or is there something blocking the connection from a remote network on the actual DMZ device?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall wise its hard to troubleshoot this when we dont know the whole network setup. Personally its hard for me as I have no knowledge of the hardware/software used behind the ASA in this case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Feb 2013 08:30:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-routing-between-internal-networks/m-p/2202957#M361788</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-20T08:30:13Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5505 Routing between internal networks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-routing-between-internal-networks/m-p/2202958#M361789</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I would check what the server is doing with the traffic that comes from the inside. [packet capture]&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Feb 2013 08:39:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-routing-between-internal-networks/m-p/2202958#M361789</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-02-20T08:39:09Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 Routing between internal networks</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-routing-between-internal-networks/m-p/2202959#M361790</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I really feel ashame to admit but the host on DMZ had local FW blocking the traffic from other networks than the local subnet so that was the reason and you were right, ASA is working as it should &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_macro_emoticon" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a million for your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Antti&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Feb 2013 15:25:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-routing-between-internal-networks/m-p/2202959#M361790</guid>
      <dc:creator>antti.alila</dc:creator>
      <dc:date>2013-02-20T15:25:58Z</dc:date>
    </item>
  </channel>
</rss>

