<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5510 Inside Routing in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-inside-routing/m-p/2000375#M401781</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It should be as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route inside 192.168.10.0 255.255.255.0 192.168.2.2 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;route inside 192.168.11.0 255.255.255.0 192.168.2.2 1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should route it to your switch ip address as you can't route it to the ASA interface itself.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 22 Jul 2012 15:54:32 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2012-07-22T15:54:32Z</dc:date>
    <item>
      <title>ASA 5510 Inside Routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-inside-routing/m-p/2000374#M401778</link>
      <description>&lt;P&gt;Hello Guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have 3-VLANs on my cisco switch:&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;VLAN1- 192.168.2.2&lt;/P&gt;&lt;P&gt;VLAN2- 192.168.10.2&lt;/P&gt;&lt;P&gt;VLAN3- 192.168.11.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i hv conected my switch --to-- ASA5510 inside int which is in vlan1 . my asa inside int ip is : 192.168.2.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; . so now i want know how to route traffic distined to VLAN2 &amp;amp; 3 on the asa?&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Previosly i had Pix-firewall and i had these normal inside routing configured, &lt;/P&gt;&lt;P&gt;route inside 192.168.10.0 255.255.255.0 192.168.2.1 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;route inside 192.168.11.0 255.255.255.0 192.168.2.1 1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But on asa 5510 i can not do it like this, while doing this it gives an eorror mesage saying that you can not route to 192.168.2.1 inside int .&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;plz share ur idea&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:33:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-inside-routing/m-p/2000374#M401778</guid>
      <dc:creator>Imran Ahmad</dc:creator>
      <dc:date>2019-03-11T23:33:19Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 Inside Routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-inside-routing/m-p/2000375#M401781</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It should be as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route inside 192.168.10.0 255.255.255.0 192.168.2.2 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;route inside 192.168.11.0 255.255.255.0 192.168.2.2 1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should route it to your switch ip address as you can't route it to the ASA interface itself.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Jul 2012 15:54:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-inside-routing/m-p/2000375#M401781</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-07-22T15:54:32Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 Inside Routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-inside-routing/m-p/2000376#M401785</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I did this but i dont know for some reason it hads slowed down all my VLAN1 (192.168.2.0) network. the network speed had goten slow and while i wanted to access any server from within vlan-1 some times i was able to access and some times i could not access them even though there was ping reply but i could not access share-folders and remote session .&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; im not 100% sure that the slow speed was due to the routing, but i could not find anyother reason except the routing. because as i connected my old pix-firewall back to the network, then my vlan-1 net speed was normal back&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Jul 2012 16:09:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-inside-routing/m-p/2000376#M401785</guid>
      <dc:creator>Imran Ahmad</dc:creator>
      <dc:date>2012-07-22T16:09:03Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Inside Routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-inside-routing/m-p/2000377#M401787</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;The advice provided by Jennier Halim is correct. I would have adviced the same thing too. Could you paste your latest show running-config here, so that everyone here can advise you further?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P/S: Paste the Cisco PIX config as well, so that we can see the config difference&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Jul 2012 17:28:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-inside-routing/m-p/2000377#M401787</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-07-22T17:28:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Inside Routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-inside-routing/m-p/2000378#M401791</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Imran,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Proceed as Jennifer suggested. Once you change replce PIX with ASA, try 'clear arp' on switch or reboot the SW. That should fix the slowness issue (as long as rest of the config and physical infrastructure is good).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hth&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Jul 2012 19:44:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-inside-routing/m-p/2000378#M401791</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2012-07-22T19:44:28Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 Inside Routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-inside-routing/m-p/2000379#M401793</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Dear all,&amp;nbsp; Bellow is my&amp;nbsp; ASA5510 configuration output. please see what is wrong ???&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; i restarted everything the switch, the asa, clear arp.....&amp;nbsp;&amp;nbsp;&amp;nbsp; but no result.&amp;nbsp;&amp;nbsp;&amp;nbsp; when i connect the asa into my network,&amp;nbsp; it automatically slows down the vlan-1 only.&amp;nbsp; other vlans can access vlan-1 normaly.&amp;nbsp; but a host from&amp;nbsp; VLAN-1 can not access other host inside of VLAN-1.&amp;nbsp;&amp;nbsp; after many reties then they can access.&amp;nbsp; plz see what is wrong&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 202.86.17.246 255.255.255.240 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.2.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1.4&lt;BR /&gt; vlan 4&lt;BR /&gt; nameif WIRELESS&lt;BR /&gt; security-level 94&lt;BR /&gt; ip address 192.168.101.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1.6&lt;BR /&gt; vlan 6&lt;BR /&gt; nameif GUEST&lt;BR /&gt; security-level 90&lt;BR /&gt; ip address 192.168.110.1 255.255.255.224 &lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object network NAT0&lt;BR /&gt; subnet 192.168.0.0 255.255.128.0&lt;BR /&gt;object network NAT0.1&lt;BR /&gt; subnet 192.168.2.0 255.255.255.0&lt;BR /&gt;object network NAT0.2&lt;BR /&gt; subnet 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network inside_any&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network guest_any&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network WIRELESS_any&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu WIRELESS 1500&lt;BR /&gt;mtu GUEST 1500&lt;BR /&gt;mtu MPAISA-DMZ 1500&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;nat (inside,any) source static NAT0.1 NAT0.1 destination static NAT0 NAT0&lt;BR /&gt;nat (inside,any) source static NAT0.2 NAT0.2 destination static NAT0 NAT0&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;object network inside_any&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt;object network guest_any&lt;BR /&gt; nat (GUEST,outside) dynamic interface&lt;BR /&gt;object network WIRELESS_any&lt;BR /&gt; nat (WIRELESS,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 202.86.17.245 1&lt;BR /&gt;route inside 192.168.100.0 255.255.255.0 192.168.2.250 1&lt;BR /&gt;route inside 192.168.101.192 255.255.255.240 192.168.2.250 1&lt;BR /&gt;route inside 192.168.102.0 255.255.255.224 192.168.2.250 1&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect pptp &lt;BR /&gt;&amp;nbsp; inspect http &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt; profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email &lt;A href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:675eee6acc783964e9f064bc9158d5a0&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;HQASA# &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jul 2012 08:57:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-inside-routing/m-p/2000379#M401793</guid>
      <dc:creator>Imran Ahmad</dc:creator>
      <dc:date>2012-07-26T08:57:31Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 Inside Routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-inside-routing/m-p/2000380#M401796</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; plz dont get confused.&amp;nbsp; on my prevois post i was using old ips with my vlans,&amp;nbsp; but on last one which i hav attached my asa config,&amp;nbsp; i have changed the vlans-ip-address&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jul 2012 09:43:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-inside-routing/m-p/2000380#M401796</guid>
      <dc:creator>Imran Ahmad</dc:creator>
      <dc:date>2012-07-26T09:43:33Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 Inside Routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-inside-routing/m-p/2000381#M401798</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Imran,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still i do see you inetrafce configurations and other configuration seems improper.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;bject network NAT0&lt;/P&gt;&lt;P&gt; subnet 192.168.0.0 255.255.128.0&lt;/P&gt;&lt;P&gt;object network NAT0.1&lt;/P&gt;&lt;P&gt; subnet 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network NAT0.2&lt;/P&gt;&lt;P&gt; subnet 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,any) source static NAT0.1 NAT0.1 destination static NAT0 NAT0&lt;/P&gt;&lt;P&gt;nat (inside,any) source static NAT0.2 NAT0.2 destination static NAT0 NAT0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can u pls explain what you are trying with the above statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do rate for the helpful posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jul 2012 14:16:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-inside-routing/m-p/2000381#M401798</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2012-07-26T14:16:18Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 Inside Routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-inside-routing/m-p/2000382#M401800</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;Could you issue the command show threa-detection shun, and see if you have any IP Address 192.168.2.XXX being listed?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Perhaps, this could be a host issue, not VLAN-1.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jul 2012 02:06:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-inside-routing/m-p/2000382#M401800</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-07-27T02:06:20Z</dc:date>
    </item>
  </channel>
</rss>

