<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5505 Two LANs with same IP schema in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-two-lans-with-same-ip-schema/m-p/2102944#M393322</link>
    <description>&lt;P&gt;&amp;nbsp;&amp;nbsp; Hello eveyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have ASA 5505 firewall with Security Plus license. As we plan to create disaster recovery plan for our client I had an issue with same IP schema.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current IP Schema:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On ASA 5505 Info:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LAN IP address: 172.20.1.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WAN Ip address: 1.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We would like to access 172.20.1.x access from firewall with same schema, like access 172.20.1.x network from 172.20.1.x network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need same schema on other end because of disaster recovery plan.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Senario:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WAN -----------ASA Firewall --------------LAN&amp;nbsp; 172.20.1.x&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Additional LAN 172.20.1.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is how can I access additional LAN network 172.20.1.x from orignal LAN 172.20.1.x network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can I accomplish this, Do I need to add other layer 3 device??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any suggestion would be greatly appreciate..........&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you..&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 00:44:06 GMT</pubDate>
    <dc:creator>Abhishek Shah</dc:creator>
    <dc:date>2019-03-12T00:44:06Z</dc:date>
    <item>
      <title>ASA 5505 Two LANs with same IP schema</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-two-lans-with-same-ip-schema/m-p/2102944#M393322</link>
      <description>&lt;P&gt;&amp;nbsp;&amp;nbsp; Hello eveyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have ASA 5505 firewall with Security Plus license. As we plan to create disaster recovery plan for our client I had an issue with same IP schema.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current IP Schema:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On ASA 5505 Info:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LAN IP address: 172.20.1.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WAN Ip address: 1.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We would like to access 172.20.1.x access from firewall with same schema, like access 172.20.1.x network from 172.20.1.x network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need same schema on other end because of disaster recovery plan.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Senario:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WAN -----------ASA Firewall --------------LAN&amp;nbsp; 172.20.1.x&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Additional LAN 172.20.1.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is how can I access additional LAN network 172.20.1.x from orignal LAN 172.20.1.x network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can I accomplish this, Do I need to add other layer 3 device??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any suggestion would be greatly appreciate..........&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you..&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:44:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-two-lans-with-same-ip-schema/m-p/2102944#M393322</guid>
      <dc:creator>Abhishek Shah</dc:creator>
      <dc:date>2019-03-12T00:44:06Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Two LANs with same IP schema</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-two-lans-with-same-ip-schema/m-p/2102945#M393323</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First I would ask why is there 2 LANs with same network and why would you want to keep it that way?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you need to have 2 different LANs connected to the ASA I would suggest simply changing the others network to something else to avoid problems.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If changing either networks address space is not "possible" I guess you would need to NAT both of the networks to make it possible for the 2 networks to communicate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jan 2013 19:16:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-two-lans-with-same-ip-schema/m-p/2102945#M393323</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-07T19:16:50Z</dc:date>
    </item>
    <item>
      <title>Re:ASA 5505 Two LANs with same IP schema</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-two-lans-with-same-ip-schema/m-p/2102946#M393324</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;this documents show`s how to connect the two LANs using NAT to hide the real IPs.&lt;BR /&gt;&lt;BR /&gt;http://www.cisco.com/en/US/customer/products/ps6120/products_configuration_example09186a0080b37d0b.sht&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jan 2013 19:25:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-two-lans-with-same-ip-schema/m-p/2102946#M393324</guid>
      <dc:creator>frederic_hohn</dc:creator>
      <dc:date>2013-01-07T19:25:02Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Two LANs with same IP schema</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-two-lans-with-same-ip-schema/m-p/2102947#M393325</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thank you for reply me back.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have to use same IP schema on additional LAN because of the disaster recovery plan we are implementing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Accorinding to disaster recovery plan we have to assign same IP address as my prodction server has.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Server&amp;nbsp; ------------------------------------------------------ Server&lt;/P&gt;&lt;P&gt;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;LAN 172.20.1.11&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Additional LAN 172.20.1.11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this case i can not change my IP schema.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What options I have to implemet this..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did try with NAT but i can not assign same IP addres on both interface..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will it be done by additional layer 3 device????&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jan 2013 19:25:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-two-lans-with-same-ip-schema/m-p/2102947#M393325</guid>
      <dc:creator>Abhishek Shah</dc:creator>
      <dc:date>2013-01-07T19:25:19Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Two LANs with same IP schema</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-two-lans-with-same-ip-schema/m-p/2102948#M393326</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I know I can do that via VPN. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In my senario I had two network with IP schema and access via LAN not via WAN.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jan 2013 19:30:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-two-lans-with-same-ip-schema/m-p/2102948#M393326</guid>
      <dc:creator>Abhishek Shah</dc:creator>
      <dc:date>2013-01-07T19:30:58Z</dc:date>
    </item>
    <item>
      <title>Re:ASA 5505 Two LANs with same IP schema</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-two-lans-with-same-ip-schema/m-p/2102949#M393327</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I dont think that this will be possible just with the LANs directly connected to the asa. If it is, i would like to see the config &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; If there is no way to change the real IPs in the second LAN, i would use another l3-device to do the nat like in the vpn-scenario.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support Android App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jan 2013 19:39:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-two-lans-with-same-ip-schema/m-p/2102949#M393327</guid>
      <dc:creator>frederic_hohn</dc:creator>
      <dc:date>2013-01-07T19:39:57Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Two LANs with same IP schema</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-two-lans-with-same-ip-schema/m-p/2102950#M393328</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I am willing to buy a layer 3 device to get this going.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please give some example, how can i implemet this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jan 2013 19:50:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-two-lans-with-same-ip-schema/m-p/2102950#M393328</guid>
      <dc:creator>Abhishek Shah</dc:creator>
      <dc:date>2013-01-07T19:50:40Z</dc:date>
    </item>
    <item>
      <title>Re:ASA 5505 Two LANs with same IP schema</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-two-lans-with-same-ip-schema/m-p/2102951#M393329</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you attach another asa 5505 to the existing one using a seperate LAN on the link for example, you will have the scenario from the vpn document i posted. You dont need the vpn of course, only a single route to the "faked" LAN. But the natting would be the same like shown.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support Android App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jan 2013 20:01:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-two-lans-with-same-ip-schema/m-p/2102951#M393329</guid>
      <dc:creator>frederic_hohn</dc:creator>
      <dc:date>2013-01-07T20:01:21Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Two LANs with same IP schema</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-two-lans-with-same-ip-schema/m-p/2102952#M393330</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Sorry for the delay response.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let say I have Prodauction Firewall as Firewall A and Additional Firewall as Firewall B&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall A:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside: 172.20.1.254&lt;/P&gt;&lt;P&gt;Outside: 1.1.1.1&lt;/P&gt;&lt;P&gt;DMZ: 192.168.1.1 with Security level 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall B:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside: 172.20.1.254&lt;/P&gt;&lt;P&gt;DMZ: 192.168.1.2 with Security level 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Connect Firewall B interface in DMZ to Firewall interface A DMZ interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is that senario will work, Do I need to configure NAT or Static route?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you can broadly explain that will be really helpful..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jan 2013 23:16:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-two-lans-with-same-ip-schema/m-p/2102952#M393330</guid>
      <dc:creator>Abhishek Shah</dc:creator>
      <dc:date>2013-01-07T23:16:50Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Two LANs with same IP schema</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-two-lans-with-same-ip-schema/m-p/2102953#M393331</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After this you would need to also&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;NAT Firewall A INSIDE to another /24 network, for example 10.10.1.0/24&lt;/LI&gt;&lt;LI&gt;NAT Firewall B INSIDE to another /24 network, for example 10.10.2.0/24&lt;/LI&gt;&lt;LI&gt;Add route on Firewall A for network 10.10.2.0/24 pointing towards Firewall B DMZ IP of 192.168.1.2&lt;/LI&gt;&lt;LI&gt;Add route on Firewall B for network 10.10.1.0/24 pointing towards Firewall A DMZ IP of 192.168.1.1&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need NAT for both INSIDEs towards the other INSIDE for the traffic to flow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jan 2013 23:24:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-two-lans-with-same-ip-schema/m-p/2102953#M393331</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-07T23:24:05Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Two LANs with same IP schema</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-two-lans-with-same-ip-schema/m-p/2102954#M393332</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My both firewall has same Inside network as you exolain in previous example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have Firewall A has 10.10.1.x network also Firewall B has 10.10.1.x network not the 10.10.2.x....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also do i need to connect both firewall via DMZ interface????&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jan 2013 23:29:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-two-lans-with-same-ip-schema/m-p/2102954#M393332</guid>
      <dc:creator>Abhishek Shah</dc:creator>
      <dc:date>2013-01-07T23:29:27Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Two LANs with same IP schema</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-two-lans-with-same-ip-schema/m-p/2102955#M393333</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the 2 overlapping networks of 172.20.1.0/24 to be able to connect to eachtother you will simply need to NAT both of the LANs to something else.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I mean with the above is that&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;You Connect the ASAs through the DMZ interface&lt;/LI&gt;&lt;LI&gt;Firewall As network 172.20.1.0/24 will be NATed to 10.10.1.0/24 for example that it doesnt show to Firewall B with its original IP addresses&lt;/LI&gt;&lt;LI&gt;Firewall Bs network 172.20.1.0/24 will be NATed to 10.10.2.0/24 for example that it doesnt show to Firewall A with its ogirinal IP addresses&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you dont NAT both LAN networks they simply wont be able to connect to eachother because traffic wont be routed correctly. NAT networks can be something else than 10.10.x.0/24 if needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jan 2013 23:47:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-two-lans-with-same-ip-schema/m-p/2102955#M393333</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-07T23:47:32Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Two LANs with same IP schema</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-two-lans-with-same-ip-schema/m-p/2102956#M393334</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; So far I get this far...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Create Inside VLAN and DMZ vlan on both firewall and connect both firewall via DMZ, still not able access both networks via nated IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall A&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Firewall B&lt;/P&gt;&lt;P&gt;Inside: 172.20.1.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inside: 172.20.1.1 &lt;/P&gt;&lt;P&gt;DMZ: 192.168.1.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DMZ:&amp;nbsp; 192.168.1.2&lt;/P&gt;&lt;P&gt;Inside Nated IP: 192.168.2.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inside Nated IP: 192.168.3.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here I attached Both Firewall configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall A&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(5) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 172.20.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;access-list new extended permit ip 192.168.2.0 255.255.255.0 192.168.3.0 255.255.255.0 &lt;BR /&gt;access-list new extended permit ip any any &lt;BR /&gt;access-list policy-nat extended permit ip 172.20.1.0 255.255.255.0 192.168.3.0 255.255.255.0 &lt;BR /&gt;access-list dmz_access extended permit ip any any &lt;BR /&gt;pager lines 24&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;static (inside,dmz) 192.168.2.0&amp;nbsp; access-list policy-nat &lt;BR /&gt;access-group new in interface inside&lt;BR /&gt;access-group dmz_access in interface dmz&lt;BR /&gt;route inside 192.168.2.0 255.255.255.0 192.168.1.2 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:c543b6bfbaf778425d78f5a9dd20963e&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;ciscoasa#&amp;nbsp; &lt;/P&gt;&lt;P&gt;-------------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall B Configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 7.2(4) &lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable &lt;BR /&gt;password 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;interface &lt;BR /&gt;Vlan1&lt;BR /&gt; &lt;BR /&gt;nameif inside&lt;BR /&gt; &lt;BR /&gt;security-level 100&lt;BR /&gt; &lt;BR /&gt;ip address 172.20.1.1 255.255.255.0 &lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;interface Vlan2&lt;BR /&gt; &lt;BR /&gt;nameif dmz&lt;BR /&gt; &lt;BR /&gt;security-level 100&lt;BR /&gt; &lt;BR /&gt;ip address 192.168.1.2 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;BR /&gt; &lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;access-list new extended permit ip 192.168.3.0 255.255.255.0 192.168.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list new extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list policy-nat extended permit ip 172.20.1.0 255.255.255.0 192.168.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list dmz_access extended permit ip any any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;BR /&gt;mtu &lt;BR /&gt;inside 1500&lt;BR /&gt;mtu &lt;BR /&gt;dmz 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;BR /&gt;arp &lt;BR /&gt;timeout 14400&lt;/P&gt;&lt;P&gt;static (inside,dmz) 192.168.3.0&amp;nbsp; access-list policy-nat &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;access-group new in interface inside&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;access-group dmz_access in interface dmz&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;route inside 192.168.3.0 255.255.255.0 192.168.1.1 1&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:c543b6bfbaf778425d78f5a9dd20963e&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;ciscoasa#&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jan 2013 19:35:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-two-lans-with-same-ip-schema/m-p/2102956#M393334</guid>
      <dc:creator>Abhishek Shah</dc:creator>
      <dc:date>2013-01-14T19:35:14Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Two LANs with same IP schema</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-two-lans-with-same-ip-schema/m-p/2102957#M393335</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I did Configure NAT on both Firewall still not able to access network with NATed IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please take a look at Configuration???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you!!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jan 2013 20:40:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-two-lans-with-same-ip-schema/m-p/2102957#M393335</guid>
      <dc:creator>Abhishek Shah</dc:creator>
      <dc:date>2013-01-14T20:40:28Z</dc:date>
    </item>
  </channel>
</rss>

