<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Trying to get ASA's to route in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/trying-to-get-asa-s-to-route/m-p/2077066#M395521</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok. Figured it out. problem is two fold:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Ensure that the correct license is on the box. I had the base license on the 5505's which mean that I could not use mutiple vlans/sub interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. The ability for the box to pass traffic from one interface of the same security level to another of the same security level has to be configured using the line: &lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;(config)#same-security-traffic permit intra-interface&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then the security policies have to be defined to let specific traffic from the inside and outside defined networks pass. This has to be ammended to include icmp traffic since by default it does not allow it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Whew..Solved it!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 15 Nov 2012 16:30:48 GMT</pubDate>
    <dc:creator>joelgooding</dc:creator>
    <dc:date>2012-11-15T16:30:48Z</dc:date>
    <item>
      <title>Trying to get ASA's to route</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-get-asa-s-to-route/m-p/2077065#M395520</link>
      <description>&lt;P&gt;ok, the situation is that for a customer's WAN solution, instead of buying routers, purchasing department bought ASA's (don't even get me started!). So I have 5 ASA 5505's for the branch offices and one 5510 for the Head Office. I am trying to get them to behave like routers and pass the traffic across. I set up a lab with a 5505 and the 5510 using an ethernet cable for both Outside interfaces since the WAN links are going to be MetroEthernet Layer 2 anyway. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried static routes, dynamic routing, I followed examples from other persons who did it and it doesn't work. I attached the configs here to show I have the default routes, specific static routes pointing the traffic out, any any rules configured as well. I cannot ping from the internal lan of the 5505 to the internal lan of the 5510. It maybe something silly I am missing or not doing. Can someone please assist? Below is the setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/8/4/0/113048-Capture.JPG" alt="Capture.JPG" class="jive-image-thumbnail jive-image" onclick="" width="450" /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:23:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-get-asa-s-to-route/m-p/2077065#M395520</guid>
      <dc:creator>joelgooding</dc:creator>
      <dc:date>2019-03-12T00:23:52Z</dc:date>
    </item>
    <item>
      <title>Trying to get ASA's to route</title>
      <link>https://community.cisco.com/t5/network-security/trying-to-get-asa-s-to-route/m-p/2077066#M395521</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok. Figured it out. problem is two fold:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Ensure that the correct license is on the box. I had the base license on the 5505's which mean that I could not use mutiple vlans/sub interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. The ability for the box to pass traffic from one interface of the same security level to another of the same security level has to be configured using the line: &lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;(config)#same-security-traffic permit intra-interface&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then the security policies have to be defined to let specific traffic from the inside and outside defined networks pass. This has to be ammended to include icmp traffic since by default it does not allow it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Whew..Solved it!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Nov 2012 16:30:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trying-to-get-asa-s-to-route/m-p/2077066#M395521</guid>
      <dc:creator>joelgooding</dc:creator>
      <dc:date>2012-11-15T16:30:48Z</dc:date>
    </item>
  </channel>
</rss>

