<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Inter interface communications not working on asa 5510 v 8.2 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035202#M400581</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;Can you add these commands and this should work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list Inside-to-Highline permit ip 192.168.100.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Highline-to-Inside permit ip 192.168.1.0 255.255.255.0 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (Inside) 0 access-list Inside-to-Highline&lt;/P&gt;&lt;P&gt;nat (Highline) 0 access-list Highline-to-Inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;clear xlate&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!!!!!!!!!!!!!!!!!!!! This is not important to remove but just do it for now. Later you could add them back. !!!!!!!!!!!!!!!!!!!!!!&lt;/P&gt;&lt;P&gt;no threat-detection basic-threat&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;no threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically, when &lt;STRONG&gt;Inside&lt;/STRONG&gt; wants to communicate with &lt;STRONG&gt;Highline&lt;/STRONG&gt; or vice-versa, you’ll need to enable “&lt;STRONG&gt;NAT Exemption&lt;/STRONG&gt;” i.e. nat (nameif) 0 &lt;ACCESS-LIST&gt;. I know you have already enabled the same-security permit inter-interface command, but this command becomes &lt;STRONG&gt;useless&lt;/STRONG&gt; once you’ve enable dynamic nat on one of those interfaces. It’s as if the same-security traffic command wasn't even entered in the first place. Hence, the Cisco ASA is behaving as expected as per Cisco's documentation. For further details on this, you could refer to the URLs below;&lt;/ACCESS-LIST&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/thread/223898" rel="nofollow"&gt;https://supportforums.cisco.com/thread/223898&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/cfgnat.html#wp1042530" rel="nofollow"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/cfgnat.html#wp1042530&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;P/S: If you think this comment is useful, please do rate it nicely &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; and click on the "Correct Answer" button&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 22 Aug 2012 08:39:51 GMT</pubDate>
    <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
    <dc:date>2012-08-22T08:39:51Z</dc:date>
    <item>
      <title>Inter interface communications not working on asa 5510 v 8.2.2</title>
      <link>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035173#M400543</link>
      <description>&lt;P&gt;Howdy,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA / Cisco Novice here: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an ASA 5510 attached to 2 internal networks.&amp;nbsp; Everything is working except communications between the 2 internal interfaces.&lt;/P&gt;&lt;P&gt;I can ping the FW from either interface and I can ping hosts on both networks from the CLI but can't get any traffic to pass.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'd like to open the connection to all traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A picture being worth a thousand words, below is the physical network and a cleaned config (Note that I have highlighted the commands that I think should make this work).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone see what I'm missing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Geoffrey&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/9/9/9/98999-BF%20asa%20highline%20com%20problem%20small.jpg" alt="BF asa highline com problem small.jpg" class="jive-image-thumbnail jive-image" height="79" width="663" /&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname CiscoASA&lt;/P&gt;&lt;P&gt;domain-name domain.org&lt;/P&gt;&lt;P&gt;enable password c7Ik4QWNoVuUmbYX encrypted&lt;/P&gt;&lt;P&gt;passwd c7Ik4QWNoVuUmbYX encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name x.x.x.x Server2-Outside&lt;/P&gt;&lt;P&gt;name x.x.x.x Konica-Outside&lt;/P&gt;&lt;P&gt;name x.x.x.x Sharepoint-Outside&lt;/P&gt;&lt;P&gt;name 192.168.100.15 Konica-Inside&lt;/P&gt;&lt;P&gt;name 192.168.100.2 Server2-Inside&lt;/P&gt;&lt;P&gt;name 192.168.100.5 Sharepoint-Inside&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;name 192.168.1.0 Highline-inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;speed 100&lt;/P&gt;&lt;P&gt;duplex full&lt;/P&gt;&lt;P&gt;nameif Outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;pppoe client vpdn group xxx&lt;/P&gt;&lt;P&gt;ip address x.x.x.x 255.255.255.255 pppoe setroute &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;interface Ethernet0/1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;nameif Inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;security-level 100&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;ip address 192.168.100.1 255.255.255.0 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;interface Ethernet0/2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;nameif Highline&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;security-level 100&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;ip address 192.168.1.3 255.255.255.0&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt;nameif management&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.11.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone PST -8&lt;/P&gt;&lt;P&gt;clock summer-time PDT recurring&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;domain-name domain.org&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;same-security-traffic permit inter-interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;same-security-traffic permit intra-interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;object-group service RDP tcp&lt;/P&gt;&lt;P&gt;port-object eq 3389&lt;/P&gt;&lt;P&gt;object-group service Sharepoint-SSL tcp&lt;/P&gt;&lt;P&gt;port-object eq 444&lt;/P&gt;&lt;P&gt;object-group service Zone3-17365 tcp&lt;/P&gt;&lt;P&gt;port-object eq 17365&lt;/P&gt;&lt;P&gt;object-group service Konica-printing tcp&lt;/P&gt;&lt;P&gt;port-object eq 9100&lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended permit tcp any host Server2-Outside eq 3389 &lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended permit tcp any host Server2-Outside eq smtp &lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended permit tcp any host Server2-Outside eq ftp &lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended permit tcp any host Server2-Outside eq www &lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended permit tcp any host Server2-Outside eq https &lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended permit tcp any host Server2-Outside eq pptp &lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended permit gre any host Server2-Outside &lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended permit tcp any host Sharepoint-Outside eq www &lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended permit tcp any host Sharepoint-Outside eq https &lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended permit tcp any host Sharepoint-Outside object-group Zone3-17365 &lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended permit tcp any host Sharepoint-Outside object-group Sharepoint-SSL &lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended permit tcp any host Konica-Outside object-group Konica-printing &lt;/P&gt;&lt;P&gt;access-list dispatch_nat0 extended permit ip 10.99.12.0 255.255.255.0 172.29.12.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list dispatch_cryptomap extended permit ip 10.99.12.0 255.255.255.0 172.29.12.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Inside_nat_outbound extended permit ip 192.168.100.0 255.255.255.0 172.29.12.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Inside_nat_static extended permit ip host Server2-Inside any &lt;/P&gt;&lt;P&gt;access-list Inside_nat_static_1 extended permit ip host Server2-Inside host 172.29.12.5 &lt;/P&gt;&lt;P&gt;access-list Inside_nat_static_2 extended permit ip host 192.168.100.12 host 172.29.12.1 &lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;access-list Highline_access_in extended permit ip any any &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu Outside 1500&lt;/P&gt;&lt;P&gt;mtu Inside 1500&lt;/P&gt;&lt;P&gt;mtu Highline 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (Outside) 2 10.99.12.10-10.99.12.254 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;global (Outside) 1 interface&lt;/P&gt;&lt;P&gt;global (Outside) 3 Server2-Outside netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;nat (Inside) 2 access-list Inside_nat_outbound&lt;/P&gt;&lt;P&gt;nat (Inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;nat (Highline) 1 0.0.0.0 0.0.0.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;static (Inside,Outside) Sharepoint-Outside Sharepoint-Inside netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Inside,Outside) Konica-Outside Konica-Inside netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Inside,Outside) 10.99.12.5 access-list Inside_nat_static_1 &lt;/P&gt;&lt;P&gt;static (Inside,Outside) Server2-Outside access-list Inside_nat_static &lt;/P&gt;&lt;P&gt;static (Inside,Outside) 10.99.12.1 access-list Inside_nat_static_2 &lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;static (Inside,Highline) 192.168.100.0 192.168.100.0 netmask 255.255.255.0 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;static (Highline,Inside) Highline-inside Highline-inside netmask 255.255.255.0 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;access-group Outside_access_in in interface Outside&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;access-group Highline_access_in in interface Highline&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.100.0 255.255.255.0 Inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TEST esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set dispatch esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto map dispatch_map 1 match address dispatch_nat0&lt;/P&gt;&lt;P&gt;crypto map dispatch _map 1 set pfs group5&lt;/P&gt;&lt;P&gt;crypto map dispatch _map 1 set peer 146.129.253.3 &lt;/P&gt;&lt;P&gt;crypto map dispatch _map 1 set transform-set dispatch&lt;/P&gt;&lt;P&gt;crypto map dispatch _map interface Outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable Outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption aes-256&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 5&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp ipsec-over-tcp port 10000 &lt;/P&gt;&lt;P&gt;telnet 192.168.100.0 255.255.255.0 Inside&lt;/P&gt;&lt;P&gt;telnet 192.168.11.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;telnet timeout 30&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;vpdn group blah request dialout pppoe&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;vpdn group blah localname blah&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;vpdn group blah ppp authentication pap&lt;/P&gt;&lt;P&gt;vpdn username blahblahblah password ***** store-local&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.11.2-192.168.11.254 management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username admin password ra.2Iw6nrBEaHn0M encrypted&lt;/P&gt;&lt;P&gt;tunnel-group x.x.x.x type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group x.x.x.x ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *****&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;message-length maximum client auto&lt;/P&gt;&lt;P&gt;message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;inspect ftp &lt;/P&gt;&lt;P&gt;inspect h323 h225 &lt;/P&gt;&lt;P&gt;inspect h323 ras &lt;/P&gt;&lt;P&gt;inspect rsh &lt;/P&gt;&lt;P&gt;inspect rtsp &lt;/P&gt;&lt;P&gt;inspect sqlnet &lt;/P&gt;&lt;P&gt;inspect skinny &lt;/P&gt;&lt;P&gt;inspect sunrpc &lt;/P&gt;&lt;P&gt;inspect xdmcp &lt;/P&gt;&lt;P&gt;inspect sip &lt;/P&gt;&lt;P&gt;inspect netbios &lt;/P&gt;&lt;P&gt;inspect tftp &lt;/P&gt;&lt;P&gt;inspect ip-options &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt;profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;no active&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;destination address http &lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService" rel="nofollow" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;destination address email &lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;destination transport-method http&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:36468a70e58b3026ab250dfba96c4ba9&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:44:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035173#M400543</guid>
      <dc:creator>GEOFFREY BARKER</dc:creator>
      <dc:date>2019-03-11T23:44:44Z</dc:date>
    </item>
    <item>
      <title>Re: Inter interface communications not working on asa 5510 v 8.2</title>
      <link>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035174#M400545</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you do a packet trace from 192.168.1.100 to 192.168.100.100 and check on which step the ASA is dropping the packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since you don't have nat control enabled, I don't think you will need the below statemetns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (Inside,Highline) 192.168.100.0 192.168.100.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;static (Highline,Inside) Highline-inside Highline-inside netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Siddhartha&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Aug 2012 21:22:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035174#M400545</guid>
      <dc:creator>siddhartham</dc:creator>
      <dc:date>2012-08-21T21:22:25Z</dc:date>
    </item>
    <item>
      <title>Inter interface communications not working on asa 5510 v 8.2.2</title>
      <link>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035175#M400546</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Siddhartha,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply.&amp;nbsp; I appreciate it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though I'm not sure how to understand it, here is that output:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 192.168.100.0&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; Inside&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group Inside_access_in in interface Inside&lt;BR /&gt;access-list Inside_access_in extended permit ip any any&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;nat (Inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;&amp;nbsp; match ip Inside any Inside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 2, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: Inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What's it tell you?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;G&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Aug 2012 21:42:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035175#M400546</guid>
      <dc:creator>GEOFFREY BARKER</dc:creator>
      <dc:date>2012-08-21T21:42:24Z</dc:date>
    </item>
    <item>
      <title>Inter interface communications not working on asa 5510 v 8.2.2</title>
      <link>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035176#M400548</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you did a trace from 192.168.1.X to 192.168.100.X, is that right? according to your config the packet should match the below statement&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (Highline,Inside) Highline-inside Highline-inside netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;not sure why it matches against nat (Inside) 1 0.0.0.0 0.0.0.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just to make sure can you try the below command and paste the output&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; packet-tracer input Highline tcp 192.168.1.100 80 192.168.100.1 80 detailed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Siddhartha&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Aug 2012 22:37:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035176#M400548</guid>
      <dc:creator>siddhartham</dc:creator>
      <dc:date>2012-08-21T22:37:11Z</dc:date>
    </item>
    <item>
      <title>Inter interface communications not working on asa 5510 v 8.2.2</title>
      <link>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035177#M400550</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I initally posted a response where I did not get the source and destination right.&amp;nbsp; I deleted that post though.&amp;nbsp; On the other hand, I may have run my trace from the inside interface...&amp;nbsp; &lt;/P&gt;&lt;P&gt;In any case, here's the results of the cut and paste you requested:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# packet-tracer input Highline tcp 192.168.1.100 80 192.168.100.1 80 $&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xac8ea680, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (Inside,Highline) 192.168.100.0 192.168.100.0 netmask 255.255.255.0&lt;BR /&gt;&amp;nbsp; match ip Inside 192.168.100.0 255.255.255.0 Highline any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 192.168.100.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 4, untranslate_hits = 1&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface Inside&lt;BR /&gt;Untranslate 192.168.100.0/0 to 192.168.100.0/0 using netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group Highline_access_in in interface Highline&lt;BR /&gt;access-list Highline_access_in extended permit ip any any&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xac97bad8, priority=12, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3, user_data=0xa8a9eb40, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xac8ecdb8, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=5, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (Highline,Inside) Highline-inside Highline-inside netmask 255.255.255.0&lt;BR /&gt;&amp;nbsp; match ip Highline Highline-inside 255.255.255.0 Inside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to Highline-inside&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1, untranslate_hits = 6&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate Highline-inside/0 to Highline-inside/0 using netmask 255.255.25&lt;BR /&gt;5.0&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xac9769a8, priority=5, domain=nat, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1, user_data=0xac8fd7a0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=Highline-inside, mask=255.255.255.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (Highline,Inside) Highline-inside Highline-inside netmask 255.255.255.0&lt;BR /&gt;&amp;nbsp; match ip Highline Highline-inside 255.255.255.0 Inside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to Highline-inside&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1, untranslate_hits = 6&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xac976d00, priority=5, domain=host, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=10, user_data=0xac8fd7a0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=Highline-inside, mask=255.255.255.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (Inside,Highline) 192.168.100.0 192.168.100.0 netmask 255.255.255.0&lt;BR /&gt;&amp;nbsp; match ip Inside 192.168.100.0 255.255.255.0 Highline any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 192.168.100.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 4, untranslate_hits = 1&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; out id=0xac975ed8, priority=5, domain=nat-reverse, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1, user_data=0xac975480, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=192.168.100.0, mask=255.255.255.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xac8a77d8, priority=500, domain=permit, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=6, user_data=0x6, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=192.168.100.1, mask=255.255.255.255, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: Highline&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Aug 2012 22:43:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035177#M400550</guid>
      <dc:creator>GEOFFREY BARKER</dc:creator>
      <dc:date>2012-08-21T22:43:04Z</dc:date>
    </item>
    <item>
      <title>Inter interface communications not working on asa 5510 v 8.2.2</title>
      <link>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035178#M400552</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Geoffrey,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access-list denied hmm, have you make any changes to the config since you created this ticket?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If yes, please post it back&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACL should not be dropping this packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Aug 2012 23:28:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035178#M400552</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-08-21T23:28:42Z</dc:date>
    </item>
    <item>
      <title>Inter interface communications not working on asa 5510 v 8.2.2</title>
      <link>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035179#M400553</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Strange right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just did a careful line by line comparison of the current config and the one I sent.&amp;nbsp; Apart from enabling Telnet on the Highline interface, they are identical.&amp;nbsp; I also just ran another packet trace and got the same results.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for any thoughts on this weird problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Geoffrey&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Aug 2012 23:53:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035179#M400553</guid>
      <dc:creator>GEOFFREY BARKER</dc:creator>
      <dc:date>2012-08-21T23:53:34Z</dc:date>
    </item>
    <item>
      <title>Inter interface communications not working on asa 5510 v 8.2.2</title>
      <link>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035180#M400554</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello again,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;...&amp;nbsp; Just so you don't have to take my word for it: here's a freshly run SH Conf (cleaned of id info) followed by Packet Trace output:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show running-config"&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(2) &lt;BR /&gt;!&lt;BR /&gt;hostname ASA&lt;BR /&gt;domain-name domain.org&lt;BR /&gt;enable password c7Ik4QWNoVuUmbYX encrypted&lt;BR /&gt;passwd c7Ik4QWNoVuUmbYX encrypted&lt;BR /&gt;names&lt;BR /&gt;name xxxx Server2-Outside&lt;BR /&gt;name xxxx Konica-Outside&lt;BR /&gt;name xxxx Sharepoint-Outside&lt;BR /&gt;name 192.168.100.15 Konica-Inside&lt;BR /&gt;name 192.168.100.2 Server2-Inside&lt;BR /&gt;name 192.168.100.5 Sharepoint-Inside&lt;BR /&gt;name 192.168.1.0 Highline-inside&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; speed 100&lt;BR /&gt; duplex full&lt;BR /&gt; nameif Outside&lt;BR /&gt; security-level 0&lt;BR /&gt; pppoe client vpdn group blah&lt;BR /&gt; ip address xxxx 255.255.255.255 pppoe setroute &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; nameif Inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.100.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; nameif Highline&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.3 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.11.1 255.255.255.0 &lt;BR /&gt; management-only&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone PST -8&lt;BR /&gt;clock summer-time PDT recurring&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name domain.org&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group service RDP tcp&lt;BR /&gt; port-object eq 3389&lt;BR /&gt;object-group service Sharepoint-SSL tcp&lt;BR /&gt; port-object eq 444&lt;BR /&gt;object-group service Zone3-17365 tcp&lt;BR /&gt; port-object eq 17365&lt;BR /&gt;object-group service Konica-printing tcp&lt;BR /&gt; port-object eq 9100&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host Server2-Outside eq 3389 &lt;BR /&gt;access-list Outside_access_in extended permit tcp any host Server2-Outside eq smtp &lt;BR /&gt;access-list Outside_access_in extended permit tcp any host Server2-Outside eq ftp &lt;BR /&gt;access-list Outside_access_in extended permit tcp any host Server2-Outside eq www &lt;BR /&gt;access-list Outside_access_in extended permit tcp any host Server2-Outside eq https &lt;BR /&gt;access-list Outside_access_in extended permit tcp any host Server2-Outside eq pptp &lt;BR /&gt;access-list Outside_access_in extended permit gre any host Server2-Outside &lt;BR /&gt;access-list Outside_access_in extended permit tcp any host Sharepoint-Outside eq www &lt;BR /&gt;access-list Outside_access_in extended permit tcp any host Sharepoint-Outside eq https &lt;BR /&gt;access-list Outside_access_in extended permit tcp any host Sharepoint-Outside object-group Zone3-17365 &lt;BR /&gt;access-list Outside_access_in extended permit tcp any host Sharepoint-Outside object-group Sharepoint-SSL &lt;BR /&gt;access-list Outside_access_in extended permit tcp any host Konica-Outside object-group Konica-printing &lt;BR /&gt;access-list valley_nat0 extended permit ip 10.99.12.0 255.255.255.0 172.29.12.0 255.255.255.0 &lt;BR /&gt;access-list valley_cryptomap extended permit ip 10.99.12.0 255.255.255.0 172.29.12.0 255.255.255.0 &lt;BR /&gt;access-list Inside_nat_outbound extended permit ip 192.168.100.0 255.255.255.0 172.29.12.0 255.255.255.0 &lt;BR /&gt;access-list Inside_nat_static extended permit ip host Server2-Inside any &lt;BR /&gt;access-list Inside_nat_static_1 extended permit ip host Server2-Inside host 172.29.12.5 &lt;BR /&gt;access-list Inside_nat_static_2 extended permit ip host 192.168.100.12 host 172.29.12.1 &lt;BR /&gt;access-list Highline_access_in extended permit ip any any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu Outside 1500&lt;BR /&gt;mtu Inside 1500&lt;BR /&gt;mtu Highline 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (Outside) 2 10.99.12.10-10.99.12.254 netmask 255.255.255.0&lt;BR /&gt;global (Outside) 1 interface&lt;BR /&gt;global (Outside) 3 Server2-Outside netmask 255.255.255.255&lt;BR /&gt;nat (Inside) 2 access-list Inside_nat_outbound&lt;BR /&gt;nat (Inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (Highline) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (Inside,Outside) Sharepoint-Outside Sharepoint-Inside netmask 255.255.255.255 &lt;BR /&gt;static (Inside,Outside) Konica-Outside Konica-Inside netmask 255.255.255.255 &lt;BR /&gt;static (Inside,Outside) 10.99.12.5&amp;nbsp; access-list Inside_nat_static_1 &lt;BR /&gt;static (Inside,Outside) Server2-Outside&amp;nbsp; access-list Inside_nat_static &lt;BR /&gt;static (Inside,Outside) 10.99.12.1&amp;nbsp; access-list Inside_nat_static_2 &lt;BR /&gt;static (Inside,Highline) 192.168.100.0 192.168.100.0 netmask 255.255.255.0 &lt;BR /&gt;static (Highline,Inside) Highline-inside Highline-inside netmask 255.255.255.0 &lt;BR /&gt;access-group Outside_access_in in interface Outside&lt;BR /&gt;access-group Highline_access_in in interface Highline&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.100.0 255.255.255.0 Inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set TEST esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set VALLEY esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map valley_map 1 match address valley_nat0&lt;BR /&gt;crypto map valley_map 1 set pfs group5&lt;BR /&gt;crypto map valley_map 1 set peer 146.129.253.3 &lt;BR /&gt;crypto map valley_map 1 set transform-set VALLEY&lt;BR /&gt;crypto map valley_map interface Outside&lt;BR /&gt;crypto isakmp enable Outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 5&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp ipsec-over-tcp port 10000 &lt;BR /&gt;telnet 192.168.100.0 255.255.255.0 Inside&lt;BR /&gt;telnet Highline-inside 255.255.255.0 Highline&lt;BR /&gt;telnet 192.168.11.0 255.255.255.0 management&lt;BR /&gt;telnet timeout 30&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;vpdn group blah request dialout pppoe&lt;BR /&gt;vpdn group blah localname &lt;A href="mailto:fidistrnobusine@qwest.net"&gt;fidistrnobusine@qwest.net&lt;/A&gt;&lt;BR /&gt;vpdn group blah ppp authentication pap&lt;BR /&gt;vpdn username Username password ***** store-local&lt;BR /&gt;dhcpd address 192.168.11.2-192.168.11.254 management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;username admin password ra.2Iw6nrBEaHn0M encrypted&lt;BR /&gt;tunnel-group 146.129.253.3 type ipsec-l2l&lt;BR /&gt;tunnel-group 146.129.253.3 ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;call-home&lt;BR /&gt; profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email &lt;A href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:25e177563bdc640b69a74af02f2c0c26&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Packet Trace Output:&lt;/P&gt;&lt;P&gt;Result of the command: "packet-tracer input Highline tcp 192.168.1.100 80 192.168.100.1 80 detailed"&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xac8ea680, priority=1, domain=permit, deny=false&lt;BR /&gt; hits=11, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (Inside,Highline) 192.168.100.0 192.168.100.0 netmask 255.255.255.0 &lt;BR /&gt;&amp;nbsp; match ip Inside 192.168.100.0 255.255.255.0 Highline any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 192.168.100.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 14, untranslate_hits = 9&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface Inside&lt;BR /&gt;Untranslate 192.168.100.0/0 to 192.168.100.0/0 using netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group Highline_access_in in interface Highline&lt;BR /&gt;access-list Highline_access_in extended permit ip any any &lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xad1a4e58, priority=12, domain=permit, deny=false&lt;BR /&gt; hits=6, user_data=0xa8a9ebc0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xac8ecdb8, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt; hits=19, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (Highline,Inside) Highline-inside Highline-inside netmask 255.255.255.0 &lt;BR /&gt;&amp;nbsp; match ip Highline Highline-inside 255.255.255.0 Inside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to Highline-inside&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 8, untranslate_hits = 17&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate Highline-inside/0 to Highline-inside/0 using netmask 255.255.255.0&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xac9769a8, priority=5, domain=nat, deny=false&lt;BR /&gt; hits=8, user_data=0xac8fd7a0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt; src ip=Highline-inside, mask=255.255.255.0, port=0&lt;BR /&gt; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (Highline,Inside) Highline-inside Highline-inside netmask 255.255.255.0 &lt;BR /&gt;&amp;nbsp; match ip Highline Highline-inside 255.255.255.0 Inside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to Highline-inside&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 8, untranslate_hits = 17&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xac976d00, priority=5, domain=host, deny=false&lt;BR /&gt; hits=40, user_data=0xac8fd7a0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip=Highline-inside, mask=255.255.255.0, port=0&lt;BR /&gt; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (Inside,Highline) 192.168.100.0 192.168.100.0 netmask 255.255.255.0 &lt;BR /&gt;&amp;nbsp; match ip Inside 192.168.100.0 255.255.255.0 Highline any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 192.168.100.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 14, untranslate_hits = 9&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; out id=0xac975ed8, priority=5, domain=nat-reverse, deny=false&lt;BR /&gt; hits=8, user_data=0xac975480, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip=192.168.100.0, mask=255.255.255.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xac8a77d8, priority=500, domain=permit, deny=true&lt;BR /&gt; hits=9, user_data=0x6, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip=192.168.100.1, mask=255.255.255.255, port=0&lt;BR /&gt; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: Highline&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Strange no?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for any help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Geoffrey&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Aug 2012 00:00:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035180#M400554</guid>
      <dc:creator>GEOFFREY BARKER</dc:creator>
      <dc:date>2012-08-22T00:00:23Z</dc:date>
    </item>
    <item>
      <title>Re: Inter interface communications not working on asa 5510 v 8.2</title>
      <link>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035181#M400555</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As a test please remove the following command as its not need it &lt;/P&gt;&lt;P&gt;no access-group Highline_access_in in interface Highline&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That should not make a difference but I would like to have a clear configuration &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Run the following packet-tracer:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input inside tcp 192.168.100.20 1025 192.168.1.20 80 &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Aug 2012 00:16:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035181#M400555</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-08-22T00:16:35Z</dc:date>
    </item>
    <item>
      <title>Re: Inter interface communications not working on asa 5510 v 8.2</title>
      <link>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035182#M400556</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Interesting... For an unneeded access-group, removing it sure had an affect on Packet Tracer output.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After removing that line - current Packet Tracer Output below.&amp;nbsp; Oddly, though the traffic is no longer blocked, I still can't RDP (for example) through the FW.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA(config)#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; packet-tracer input Inside tcp 192.168.100.20 1065 192.168.1.20 80&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (Highline,Inside) Highline-inside Highline-inside netmask 255.255.255.0&lt;BR /&gt;&amp;nbsp; match ip Highline Highline-inside 255.255.255.0 Inside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to Highline-inside&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 8, untranslate_hits = 19&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface Highline&lt;BR /&gt;Untranslate Highline-inside/0 to Highline-inside/0 using netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (Inside,Highline) 192.168.100.0 192.168.100.0 netmask 255.255.255.0&lt;BR /&gt;&amp;nbsp; match ip Inside 192.168.100.0 255.255.255.0 Highline any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 192.168.100.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 16, untranslate_hits = 9&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 192.168.100.0/0 to 192.168.100.0/0 using netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (Inside,Highline) 192.168.100.0 192.168.100.0 netmask 255.255.255.0&lt;BR /&gt;&amp;nbsp; match ip Inside 192.168.100.0 255.255.255.0 Highline any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 192.168.100.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 16, untranslate_hits = 9&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (Highline,Inside) Highline-inside Highline-inside netmask 255.255.255.0&lt;BR /&gt;&amp;nbsp; match ip Highline Highline-inside 255.255.255.0 Inside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to Highline-inside&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 8, untranslate_hits = 19&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (Highline,Inside) Highline-inside Highline-inside netmask 255.255.255.0&lt;BR /&gt;&amp;nbsp; match ip Highline Highline-inside 255.255.255.0 Inside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to Highline-inside&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 8, untranslate_hits = 19&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 15104, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: Inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Highline&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Aug 2012 00:28:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035182#M400556</guid>
      <dc:creator>GEOFFREY BARKER</dc:creator>
      <dc:date>2012-08-22T00:28:40Z</dc:date>
    </item>
    <item>
      <title>Re: Inter interface communications not working on asa 5510 v 8.2</title>
      <link>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035183#M400557</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Geoff,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am doing the packet tracer from the inside, the one you did before was this one:&lt;/P&gt;&lt;P&gt;packet-tracer input Highline tcp 192.168.1.100 1025 192.168.100.1 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you do it and if by any chance it says allow our next step would be the captures,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Aug 2012 00:32:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035183#M400557</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-08-22T00:32:08Z</dc:date>
    </item>
    <item>
      <title>Re: Inter interface communications not working on asa 5510 v 8.2</title>
      <link>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035184#M400558</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Here's the Highline version as requested.&amp;nbsp; Not sure I understand the "next step would be the captures".&amp;nbsp; I hope you'll be able to give some guidance on that...&amp;nbsp; Thanks again for the help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "packet-tracer input Highline tcp 192.168.1.100 1025 192.168.100.1 80"&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (Inside,Highline) 192.168.100.0 192.168.100.0 netmask 255.255.255.0 &lt;BR /&gt;&amp;nbsp; match ip Inside 192.168.100.0 255.255.255.0 Highline any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 192.168.100.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 19, untranslate_hits = 11&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface Inside&lt;BR /&gt;Untranslate 192.168.100.0/0 to 192.168.100.0/0 using netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (Highline,Inside) Highline-inside Highline-inside netmask 255.255.255.0 &lt;BR /&gt;&amp;nbsp; match ip Highline Highline-inside 255.255.255.0 Inside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to Highline-inside&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 10, untranslate_hits = 22&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate Highline-inside/0 to Highline-inside/0 using netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (Highline,Inside) Highline-inside Highline-inside netmask 255.255.255.0 &lt;BR /&gt;&amp;nbsp; match ip Highline Highline-inside 255.255.255.0 Inside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to Highline-inside&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 10, untranslate_hits = 22&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (Inside,Highline) 192.168.100.0 192.168.100.0 netmask 255.255.255.0 &lt;BR /&gt;&amp;nbsp; match ip Inside 192.168.100.0 255.255.255.0 Highline any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 192.168.100.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 19, untranslate_hits = 11&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: Highline&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Aug 2012 00:37:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035184#M400558</guid>
      <dc:creator>GEOFFREY BARKER</dc:creator>
      <dc:date>2012-08-22T00:37:03Z</dc:date>
    </item>
    <item>
      <title>Re: Inter interface communications not working on asa 5510 v 8.2</title>
      <link>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035185#M400559</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OH GOD!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well that happens because of not using your own stuff &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was ussing the packet tracer that Sid provide us "packet-tracer input Highline tcp 192.168.1.100 80 192.168.100.1 80 detailed"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This packet tracer is pointing to the Ip address of the inside interface and ofcourse its not going to work!&lt;/P&gt;&lt;P&gt;Traffic to a distant interface is never allowed on the ASA no matter what.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hmmm well I need to know the ip address of the RDP computers you are using ( both client and server)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate all the helpful posts!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Aug 2012 00:41:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035185#M400559</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-08-22T00:41:58Z</dc:date>
    </item>
    <item>
      <title>Re: Inter interface communications not working on asa 5510 v 8.2</title>
      <link>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035186#M400560</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oops.&amp;nbsp; Been there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm trying to (amoung other things) RDP from 192.168.1.254 to 192.168.100.2 and vice versa.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just in case, it might be worth saying again that I can ping both of these hosts from the CLI on the firewall.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Aug 2012 00:51:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035186#M400560</guid>
      <dc:creator>GEOFFREY BARKER</dc:creator>
      <dc:date>2012-08-22T00:51:12Z</dc:date>
    </item>
    <item>
      <title>Re: Inter interface communications not working on asa 5510 v 8.2</title>
      <link>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035187#M400561</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Geoffrey,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture capin interface inside match Tcp host 192.168.100.2 host 192.168.1.254 eq 3389&lt;/P&gt;&lt;P&gt;capture capout interface Highline match tcp host&amp;nbsp; 192.168.100.2 host 192.168.1.254 eq 3389&lt;/P&gt;&lt;P&gt;cap asp type asp-drop all circular-buffer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then try to go from&amp;nbsp; 192.168.100.2 to&amp;nbsp; 192.168.1.254 RDP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Afterwards post the output of the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh cap capin &lt;/P&gt;&lt;P&gt;sh cap capout&lt;/P&gt;&lt;P&gt;sh cap asp | include 192.168.1.254&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Aug 2012 00:56:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035187#M400561</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-08-22T00:56:53Z</dc:date>
    </item>
    <item>
      <title>Re: Inter interface communications not working on asa 5510 v 8.2</title>
      <link>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035188#M400562</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Here you go:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "sh cap capin"&lt;/P&gt;&lt;P&gt;3 packets captured&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 09:52:10.805881 192.168.100.2.26421 &amp;gt; 192.168.1.254.3389: S 1302960143:1302960143(0) win 65535 &lt;MSS 1460=""&gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 09:52:13.754523 192.168.100.2.26421 &amp;gt; 192.168.1.254.3389: S 1302960143:1302960143(0) win 65535 &lt;MSS 1460=""&gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 09:52:19.790349 192.168.100.2.26421 &amp;gt; 192.168.1.254.3389: S 1302960143:1302960143(0) win 65535 &lt;MSS 1460=""&gt; &lt;BR /&gt;3 packets shown&lt;/MSS&gt;&lt;/MSS&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "sh cap capout"&lt;/P&gt;&lt;P&gt;3 packets captured&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 09:52:10.806064 192.168.100.2.26421 &amp;gt; 192.168.1.254.3389: S 3305133695:3305133695(0) win 65535 &lt;MSS 1380=""&gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 09:52:13.754553 192.168.100.2.26421 &amp;gt; 192.168.1.254.3389: S 3305133695:3305133695(0) win 65535 &lt;MSS 1380=""&gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 09:52:19.790379 192.168.100.2.26421 &amp;gt; 192.168.1.254.3389: S 3305133695:3305133695(0) win 65535 &lt;MSS 1380=""&gt; &lt;BR /&gt;3 packets shown&lt;/MSS&gt;&lt;/MSS&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "sh cap asp | include 192.168.1.254"&lt;/P&gt;&lt;P&gt;257: 09:56:26.689615 192.168.1.254.138 &amp;gt; 192.168.1.255.138:&amp;nbsp; udp 201&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Aug 2012 01:05:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035188#M400562</guid>
      <dc:creator>GEOFFREY BARKER</dc:creator>
      <dc:date>2012-08-22T01:05:14Z</dc:date>
    </item>
    <item>
      <title>Re: Inter interface communications not working on asa 5510 v 8.2</title>
      <link>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035189#M400563</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Geoffrey,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Doest not look like an ASA problem to be honest with you &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On both interfaces we can se the same amount of packets...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you know each tcp session gets established by following a three way handshake. In this session we only see a SYN packet comming from the client to the RDP server that let us know 2 things:&lt;/P&gt;&lt;P&gt;1- The packet is getting lost or dropped on the way from the ASA to the server&lt;/P&gt;&lt;P&gt;2- The server is not allowing that traffic ( Please tell me you have the wonderful Windows Firewall disabled &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt; )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the windows firewall is disabled please go ahead to the server and download and install wireshark this will let us know what is happening and as you know wireshark does not lie &lt;SPAN __jive_emoticon_name="cool" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&amp;nbsp; so if the packets are reaching the server and he is replying back we will see it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Rate &lt;/STRONG&gt;all the helpful posts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Aug 2012 03:15:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035189#M400563</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-08-22T03:15:10Z</dc:date>
    </item>
    <item>
      <title>Re: Inter interface communications not working on asa 5510 v 8.2</title>
      <link>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035190#M400564</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, the ASA is not off the hook yet (and I so wanted it to be).&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;Wireshark sees no TPKT traffic when I attempt to RDP from 192.168.100.2 to 192.168.1.254.&lt;/P&gt;&lt;P&gt;It does however see tons of packets when I successfully RDP from 192.168.1.101 to 192.168.1.254&lt;/P&gt;&lt;P&gt;Windows Firewall is indeed disabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;﻿The only equipment between 192.168.1.254 and the firewall is a managed Netgear switch. I looked at it's configuration and found that it has a single default VLAN that is active on all ports so I assume the packets are not being lost there.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also will say again that I CAN ping from the CLI on the FW to 192.168.1.254.&amp;nbsp; Weird one isn't it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thoughts?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;﻿&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Aug 2012 04:36:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035190#M400564</guid>
      <dc:creator>GEOFFREY BARKER</dc:creator>
      <dc:date>2012-08-22T04:36:41Z</dc:date>
    </item>
    <item>
      <title>Inter interface communications not working on asa 5510 v 8.2.2</title>
      <link>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035191#M400565</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;Can you ensure you do the following and let use know what's the outcome&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Inside permit ip any any&lt;BR /&gt;access-group Inside in interface Inside&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;no global (Outside) 3 Server2-Outside netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no static (Inside,Highline) 192.168.100.0 192.168.100.0 netmask 255.255.255.0 &lt;BR /&gt;no static (Highline,Inside) Highline-inside Highline-inside netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: Those workstations in Inside and Highline can access the Internet, am I right?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Aug 2012 04:43:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035191#M400565</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-08-22T04:43:00Z</dc:date>
    </item>
    <item>
      <title>Inter interface communications not working on asa 5510 v 8.2.2</title>
      <link>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035192#M400566</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hey Will, &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" height="16" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif" width="16"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nice avatar...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did all of that but no change.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are correct.&amp;nbsp; Workstations on both subnets can access the internet through this ASA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Aug 2012 05:02:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-interface-communications-not-working-on-asa-5510-v-8-2-2/m-p/2035192#M400566</guid>
      <dc:creator>GEOFFREY BARKER</dc:creator>
      <dc:date>2012-08-22T05:02:57Z</dc:date>
    </item>
  </channel>
</rss>

