<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Reg:FWSM router mode issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951522#M435074</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you please advise what you are trying to ping and where you are trying to ping from?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you ping 192.168.2.1 from 192.168.2.2 and vice versa, and also can you ping 192.168.3.1 from 192.168.3.2 and vice versa?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 03 Jun 2012 03:39:30 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2012-06-03T03:39:30Z</dc:date>
    <item>
      <title>Reg:FWSM router mode issue</title>
      <link>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951521#M435073</link>
      <description>&lt;DIV&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a Cisco FWSM installed on Cisco 7613 router,the topology is like mentioned below,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7613+{FWSM}------3560---------3560----[10.220.0.0/29,10.220.1.0/29,10.220.2.0/29]&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here&amp;nbsp; we created a p2p link between 7613 gig port and switch3560 gig port&amp;nbsp; (say 10.220.1.252/29) and then there ia a trunk between both 3560 switches&amp;nbsp; ,We wish to run FWSM in router mode and configured vlan groups 10(101,102)and 20(200,201),assigned both these groups to firewall module on router on vlan 200 ip add 192.168.2.1/24 has been given, while on fwsm on int vl 200, 192.168.2.2 ip has been given,although the interfaces are up and pinging their individual ip ads they are not pinging each other(both ip ads appear in sh arp though.Kindly help in resolving this issue.&lt;/P&gt;&lt;P&gt;Also i configured inside vlan 201as inside its also up and visible in arp of router but not pinging others kindly help in the resolution of this issue. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We need to put this firewall in front of the router which has a serial line to another 7600 router,how would i take traffic to fwsm ,pls suggest what else do i need to do ,as i m new to FWSM .&lt;/P&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;router config:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Router&lt;/STRONG&gt;#sh firewall module&lt;/P&gt;&lt;P&gt;Module Vlan-groups&lt;/P&gt;&lt;P&gt;------ -----------&lt;/P&gt;&lt;P&gt;&amp;nbsp; 04&amp;nbsp;&amp;nbsp; 1,2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Router#sh firewall vlan-group&lt;/P&gt;&lt;P&gt;Display vlan-groups created by both ACE module and FWSM&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Group&amp;nbsp;&amp;nbsp;&amp;nbsp; Created by&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; vlans&lt;/P&gt;&lt;P&gt;-----&amp;nbsp;&amp;nbsp;&amp;nbsp; ----------&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -----&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ACE&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 100-101,200-202&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;empty&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Router&lt;/STRONG&gt;#sh arp&lt;/P&gt;&lt;P&gt;Protocol&amp;nbsp; Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Age (min)&amp;nbsp; Hardware Addr&amp;nbsp;&amp;nbsp; Type&amp;nbsp;&amp;nbsp; Interface&lt;/P&gt;&lt;P&gt;Internet&amp;nbsp; 10.225.62.145&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -&amp;nbsp;&amp;nbsp; 001d.a156.9300&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; GigabitEthernet10/1&lt;/P&gt;&lt;P&gt;Internet&amp;nbsp; 10.225.62.146&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 107&amp;nbsp;&amp;nbsp; 001d.a1a5.fbc1&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; GigabitEthernet10/1&lt;/P&gt;&lt;P&gt;Internet&amp;nbsp; 192.168.2.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -&amp;nbsp;&amp;nbsp; 001d.a156.9300&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; Vlan200&lt;/P&gt;&lt;P&gt;Internet&amp;nbsp; 192.168.2.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7&amp;nbsp;&amp;nbsp; 0007.0e5c.3d00&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; Vlan200&lt;/P&gt;&lt;P&gt;Internet&amp;nbsp; 192.168.3.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4&amp;nbsp;&amp;nbsp; 0007.0e5c.3d00&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; Vlan201&lt;/P&gt;&lt;P&gt;Internet&amp;nbsp; 192.168.3.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -&amp;nbsp;&amp;nbsp; 001d.a156.9300&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; Vlan201&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Fwsm config:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname FWSM&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan200&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.2.2 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan201&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.3.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.2.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 1:00:00 h225 1:00:00 mgcp 0:05:00&lt;/P&gt;&lt;P&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns maximum-length 512&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect smtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:4e3eadb1a489f3b696d0c6da8b1b20b9&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;FWSM#&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;FWSM# sh arp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside 192.168.2.1 001d.a156.9300&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside 192.168.3.2 001d.a156.9300&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; eobc 127.0.0.81 0000.1800.0000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;FWSM# sh int&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Interface Vlan200 "outside", is up, line protocol is up&lt;/P&gt;&lt;P&gt;&amp;nbsp; Hardware is EtherSVI&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; MAC address 0007.0e5c.3d00, MTU 1500&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP address 192.168.2.2, subnet mask 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; Traffic Statistics for "outside":&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6 packets input, 658 bytes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 12 packets output, 1316 bytes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 474 packets dropped&lt;/P&gt;&lt;P&gt;Interface Vlan201 "inside", is up, line protocol is up&lt;/P&gt;&lt;P&gt;&amp;nbsp; Hardware is EtherSVI&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; MAC address 0007.0e5c.3d00, MTU 1500&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP address 192.168.3.1, subnet mask 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; Traffic Statistics for "inside":&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6 packets input, 658 bytes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7 packets output, 726 bytes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 107 packets dropped&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:14:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951521#M435073</guid>
      <dc:creator>cisco.anubhav</dc:creator>
      <dc:date>2019-03-11T23:14:47Z</dc:date>
    </item>
    <item>
      <title>Re: Reg:FWSM router mode issue</title>
      <link>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951522#M435074</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you please advise what you are trying to ping and where you are trying to ping from?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you ping 192.168.2.1 from 192.168.2.2 and vice versa, and also can you ping 192.168.3.1 from 192.168.3.2 and vice versa?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Jun 2012 03:39:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951522#M435074</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-03T03:39:30Z</dc:date>
    </item>
    <item>
      <title>Reg:FWSM router mode issue</title>
      <link>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951523#M435075</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the response, kindly let me know if the config is ok.I must respond to your query that i cannot ping from 192.168.2.1 from 192.168.2.2 and vicce versa.Also i cannot ping 192.168.3.1 from 192.168.3.2 and vice versa.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Jun 2012 09:12:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951523#M435075</guid>
      <dc:creator>cisco.anubhav</dc:creator>
      <dc:date>2012-06-03T09:12:06Z</dc:date>
    </item>
    <item>
      <title>Reg:FWSM router mode issue</title>
      <link>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951524#M435076</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The FWSM configuration looks OK so far.&lt;/P&gt;&lt;P&gt;Can you add the following:&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then try to ping again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BTW, does VLAN 200 and 201 exist in the vlan database on the 7600?&lt;/P&gt;&lt;P&gt;Also, which device does the ip address of 192.168.2.1 and 192.168.3.2 belong to?&lt;/P&gt;&lt;P&gt;If it's not the 7600, can you try by creating a vlan interface 200 and 201 and configure ip address in that subnet and try to see if you can ping.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Jun 2012 09:23:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951524#M435076</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-03T09:23:00Z</dc:date>
    </item>
    <item>
      <title>Reg:FWSM router mode issue</title>
      <link>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951525#M435077</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this is to mention that both vlan exist on 7600 as well and have ip configured on.&lt;/P&gt;&lt;P&gt;and thanks for the icmp access list as i can now ping all for ips from both 7600 and fwsm.&lt;/P&gt;&lt;P&gt;thanks.&lt;/P&gt;&lt;P&gt;now i hav a point to point link configred btwn 7600 and 3560(several vlans).how should i configure NAT on it,can NAT be avoided.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Jun 2012 09:35:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951525#M435077</guid>
      <dc:creator>cisco.anubhav</dc:creator>
      <dc:date>2012-06-03T09:35:38Z</dc:date>
    </item>
    <item>
      <title>Reg:FWSM router mode issue</title>
      <link>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951526#M435078</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What sort of NAT do you need, and/or what is the direction of the traffic? from outside to inside, or inside to outside, or both?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With FWSM, you would need to configure access-list on the interface to allow access through the FWSM.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, what version is your FWSM?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Jun 2012 09:39:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951526#M435078</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-03T09:39:00Z</dc:date>
    </item>
    <item>
      <title>Reg:FWSM router mode issue</title>
      <link>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951527#M435079</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our desogn is that of a triangle,three 7600 at three corners but one is connected to internet directly.What type of NAT wud be right here,i wish to keep my FWSM at front on 7600(b),so that all traffic coming from/to&amp;nbsp; (a) may pass through firewall.&lt;/P&gt;&lt;P&gt;How to start sending traffic through FWSM as my netwrk is of 10.0.0.0 range and i put 192.168.3.0 ip adds on inside interface of FWSM.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [Internet cloud}&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (a) 7613(further network x.x.x.x/14)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;7613&lt;/STRONG&gt;&lt;/SPAN&gt; &lt;STRONG&gt;(b)&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7613(c)&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt; (further network&amp;nbsp; x.x.x.x/14)&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (further network x.x.x.x/14)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Jun 2012 10:06:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951527#M435079</guid>
      <dc:creator>cisco.anubhav</dc:creator>
      <dc:date>2012-06-03T10:06:34Z</dc:date>
    </item>
    <item>
      <title>Reg:FWSM router mode issue</title>
      <link>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951528#M435080</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To send traffic towards the FWSM, you would need to make the FWSM your next hop.&lt;/P&gt;&lt;P&gt;For your internal network 10.0.0.0 to reach the internet, it would need to pass through the FWSM, ie: the route needs to point towards the FWSM inside interface as the gateway, then the traffic will be routed towards the FWSM.&lt;/P&gt;&lt;P&gt;Likewise, for incoming traffic from the Internet, you would also need to route the traffic towards the FWSM outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since you have both private IP addresses on your inside and outside interface, I assume that you have another device in front of the FWSM that will be performing the NAT/PAT to public IP? If that is the case, then you don't actually have to configure NAT on the FWSM, just have to configure static NAT to itself.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Jun 2012 11:52:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951528#M435080</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-03T11:52:47Z</dc:date>
    </item>
    <item>
      <title>Re: Reg:FWSM router mode issue</title>
      <link>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951529#M435081</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for being so helpful,there is a little issue thats arisen, i can not ping inside address configured on fwsm(192.168.3.1)where as i can ping 192.168.3.2 on router interface.i cannot telnet fwsm using its outside interface ip 192.168.2.2 either,hereis my FWSM config ,kindly suggest if there is any mistake .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also i tried to ping inside fwsm interface from my client 10.220.2.2 and enabled debug,to get these ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FWSM# debug icmp trace 255&lt;/P&gt;&lt;P&gt;debug icmp trace enabled at level 255&lt;/P&gt;&lt;P&gt;FWSM# ICMP echo request (len 50 id 2 seq 34642) 10.220.2.2 &amp;gt; 192.168.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ICMP echo reply (len 50 id 2 seq 34642) 192.168.2.2 &amp;gt; 10.220.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ICMP echo request (len 50 id 2 seq 34898) 10.220.2.2 &amp;gt; 192.168.3.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ICMP echo reply (len 50 id 2 seq 34898) 192.168.3.1 &amp;gt; 10.220.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ICMP echo request (len 32 id 2 seq 35154) 10.220.2.2 &amp;gt; 192.168.3.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ICMP echo reply (len 32 id 2 seq 35154) 192.168.3.1 &amp;gt; 10.220.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ICMP echo request (len 32 id 2 seq 43602) 10.220.2.2 &amp;gt; 192.168.3.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ICMP echo reply (len 32 id 2 seq 43602) 192.168.3.1 &amp;gt; 10.220.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ICMP echo request (len 32 id 2 seq 49746) 10.220.2.2 &amp;gt; 192.168.3.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ICMP echo reply (len 32 id 2 seq 49746) 192.168.3.1 &amp;gt; 10.220.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ICMP echo request (len 32 id 2 seq 55634) 10.220.2.2 &amp;gt; 192.168.3.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ICMP echo reply (len 32 id 2 seq 55634) 192.168.3.1 &amp;gt; 10.220.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ICMP echo request (len 50 id 2 seq 25683) 10.220.2.2 &amp;gt; 192.168.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ICMP echo reply (len 50 id 2 seq 25683) 192.168.2.2 &amp;gt; 10.220.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ICMP echo request (len 50 id 2 seq 25939) 10.220.2.2 &amp;gt; 192.168.3.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ICMP echo reply (len 50 id 2 seq 25939) 192.168.3.1 &amp;gt; 10.220.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kindly suggest what could be done.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Jun 2012 06:31:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951529#M435081</guid>
      <dc:creator>cisco.anubhav</dc:creator>
      <dc:date>2012-06-04T06:31:37Z</dc:date>
    </item>
    <item>
      <title>Re: Reg:FWSM router mode issue</title>
      <link>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951530#M435082</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have route for the 10.220.2.0 network pointing back via the FWSM inside interface?&lt;/P&gt;&lt;P&gt;You would need to have the following route:&lt;/P&gt;&lt;P&gt;route inside 10.220.2.0 255.255.255.0 192.168.3.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You won't be able to telnet to the lowest security interface on FWSM, and outside interface has the lowest security level. This is the behaviour by design. You can however SSH to the outside interface, and you need to configure the following;&lt;/P&gt;&lt;P&gt;ssh 0 0 outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above command will allow any IP Address to ssh to the outside interface IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please also generate RSA keypair for SSH as SSH is encrypted session: crypto key generate rsa &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Jun 2012 08:36:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951530#M435082</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-04T08:36:08Z</dc:date>
    </item>
    <item>
      <title>Re: Reg:FWSM router mode issue</title>
      <link>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951531#M435083</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the response,i wish to mention that i have my client outside of ouside interface,whatever i searched i got the we may not be able to ping inside interface from outside client,is it so.Also,did what is mentioned above for ssh fwsm had an rsa key generated ,i tried to connect 192.168.2.2 outside intrface through ssh client but following debug msg appeared on fwsm,kindly take a look,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SSH0: SSH client: IP = '10.220.2.2'&amp;nbsp; interface # = 1&lt;/P&gt;&lt;P&gt;SSH: host key initialised&lt;/P&gt;&lt;P&gt;SSH: license supports 3DES: 2&lt;/P&gt;&lt;P&gt;SSH: license supports DES: 2&lt;/P&gt;&lt;P&gt;SSH0: starting SSH control process&lt;/P&gt;&lt;P&gt;SSH0: Exchanging versions - SSH-1.99-Cisco-1.25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SSH0: send SSH message: outdata is NULL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;server version string:SSH-1.99-Cisco-1.25SSH0: receive SSH message: 83 (83)&lt;/P&gt;&lt;P&gt;SSH0: client version is - SSH-1.99-3.2.5 SSH Secure Shell for Windows&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;client version string:SSH-1.99-3.2.5 SSH Secure Shell for WindowsSSH0: begin server key generation&lt;/P&gt;&lt;P&gt;SSH0: complete server key generation, elapsed time = 590 ms&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SSH2 0: SSH2_MSG_KEXINIT sent&lt;/P&gt;&lt;P&gt;SSH2 0: SSH2_MSG_KEXINIT received&lt;/P&gt;&lt;P&gt;SSH2: kex: client-&amp;gt;server aes128-cbc hmac-md5 none&lt;/P&gt;&lt;P&gt;SSH2: kex: server-&amp;gt;client aes128-cbc hmac-md5 none&lt;/P&gt;&lt;P&gt;SSH2 0: expecting SSH2_MSG_KEXDH_INIT&lt;/P&gt;&lt;P&gt;SSH2 0: SSH2_MSG_KEXDH_INIT received&lt;/P&gt;&lt;P&gt;SSH2 0: signature length 143&lt;/P&gt;&lt;P&gt;SSH2: kex_derive_keys complete&lt;/P&gt;&lt;P&gt;SSH2 0: newkeys: mode 1&lt;/P&gt;&lt;P&gt;SSH2 0: SSH2_MSG_NEWKEYS sent&lt;/P&gt;&lt;P&gt;SSH2 0: waiting for SSH2_MSG_NEWKEYS&lt;/P&gt;&lt;P&gt;SSH2 0: newkeys: mode 0&lt;/P&gt;&lt;P&gt;SSH2 0: SSH2_MSG_NEWKEYS receivedSSH(cisco): user authen method is 'no AAA', aaa server group ID = 0&lt;/P&gt;&lt;P&gt;SSH0: TCP read failed, error code = 0x86300003 "TCP connection closed"&lt;/P&gt;&lt;P&gt;SSH0: receive SSH message: [no message ID: variable *data is NULL]&lt;/P&gt;&lt;P&gt;SSH0: Session disconnected by SSH server - error 0x00 "Internal error"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FWSM#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Jun 2012 09:02:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951531#M435083</guid>
      <dc:creator>cisco.anubhav</dc:creator>
      <dc:date>2012-06-04T09:02:18Z</dc:date>
    </item>
    <item>
      <title>Re: Reg:FWSM router mode issue</title>
      <link>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951532#M435084</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, that is the correct behaviour of FWSM, ie: you can only ping the inbound interface of FWSM, not the cross interface. Eg: if you are pinging towards the outside interface, you can only ping the outside, not the inside interface, and vice versa.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In regards to the SSH, what username did you try to SSH with? by default if you haven't configured any AAA, username will be pix, and password would be the one that you configure with the "passwd" command.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Jun 2012 11:31:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951532#M435084</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-04T11:31:10Z</dc:date>
    </item>
    <item>
      <title>Re: Reg:FWSM router mode issue</title>
      <link>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951533#M435085</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;gr8 ,i got the ssh seeion going usin the credentials you suggested.thanks a lot.&lt;/P&gt;&lt;P&gt;I now try to divert the traffic to fwsm, let me tell your that i hav 10 more routers connected to this 7600(which is a core router) and as many Lans also communicating through this 7600.we are using static routing at branch level (between 7613 and 10 routers) where all branch traffic comes to 7600 through default routes and ospf between our three 7600 routers.&lt;/P&gt;&lt;P&gt;further i have the LAN of this 7600(10.225.2.0) and (10.225.5.0) connected to a 3560 connected to gigabit interface of this 7600.the link between 7600 and 3560 is point to point.&lt;/P&gt;&lt;P&gt;to divert traffic coming from 3560 i set its default route to 0.0.0.0 0.0.0.0 192.168.3.1(inside at FWSM),but i had to give a static route as well for 192.168.2.0/3.0 on 3560.Then i disabled route outside 0 0 on fwsm,still the traffic was going through .&lt;/P&gt;&lt;P&gt;Kindly suggest how to divert traffic to FWSM .our 7600 and 3560 hav p2p link of 10.225.62.144/30.If any other information is required kindly let me know.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Jun 2012 12:26:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951533#M435085</guid>
      <dc:creator>cisco.anubhav</dc:creator>
      <dc:date>2012-06-04T12:26:49Z</dc:date>
    </item>
    <item>
      <title>Re: Reg:FWSM router mode issue</title>
      <link>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951534#M435086</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, you can't really disable "route outside 0 0" on the FWSM, otherwise, how is the FWSM supposed to route the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please advise where you are trying to ping to and from? and how are the host connected?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FWSM is just like a route hop, same as router. So if you need traffic to go through the FWSM, just think of it as traffic going through the router and configure the routing the same way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Further more, you would need to configure access-list on the inside interface if you are sending traffic towards the inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you say the traffic was going through, where exactly is it going through? FWSM? 7600? and how do you test it?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Jun 2012 12:44:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951534#M435086</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-04T12:44:38Z</dc:date>
    </item>
    <item>
      <title>Re: Reg:FWSM router mode issue</title>
      <link>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951535#M435087</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I removed outside route to see if the traffic that was coming from 3560 is still going through FWSM,because if i set default route to fwsm inside interface at 3560 ,traffic must come to fwsm and halt in the absence of outside route.I am trying to give My N/W structure here,to clear thing more&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [Internet cloud}&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (a) 7613 ------router 1-12&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (further network x.x.x.x/14)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;7613&lt;/STRONG&gt; &lt;STRONG&gt;(b)&lt;/STRONG&gt; -----router 1-10connected down the line.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7613(c)| ----------router 1-10&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt; (further network&amp;nbsp; x.x.x.x/14)&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (further network x.x.x.x/14)&lt;/P&gt;&lt;P&gt;----------------------------------------------------------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;further i describe 7600(b) LAN segment,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7600(b)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; | (10.225.62.145)/30(P2P Link)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; | (10.225.62.146)/30&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3560&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; /\&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; /&amp;nbsp;&amp;nbsp;&amp;nbsp; \&lt;/P&gt;&lt;P&gt;vlan2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; vlan 5(10.225.5.x)&lt;/P&gt;&lt;P&gt;(10.225.2.x)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope the Picture is a li'll clear now, kindly suggest how must i route traffic coming from down the line routers and barious LANs connected through 3560.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Jun 2012 13:16:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951535#M435087</guid>
      <dc:creator>cisco.anubhav</dc:creator>
      <dc:date>2012-06-04T13:16:00Z</dc:date>
    </item>
    <item>
      <title>Re: Reg:FWSM router mode issue</title>
      <link>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951536#M435088</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ahh ok, makes sense now. Thanks for the picture.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Base on that, i assume that you don't have 192.168.3.0/24 subnet on the 3560 switch, right?&lt;/P&gt;&lt;P&gt;If that is the case, that means traffic from 3560 will be routed next to the 7600 since you have the P2P link. What was the original default gateway on the 3560? is it 10.225.62.145?&lt;/P&gt;&lt;P&gt;If that is the case, then you would need to change the default gateway on the 7600 to be the FWSM inside interface since you don't have a VLAN on 3560 that is in the same subnet as the FWSM inside interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Jun 2012 13:29:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951536#M435088</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-04T13:29:12Z</dc:date>
    </item>
    <item>
      <title>Re: Reg:FWSM router mode issue</title>
      <link>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951537#M435089</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yes i dont have 192.168..x.x on my 3560 and yes original default gateway on 3560 is 10.225.62.145.I tried to change the default gateway of 7600 to divert all traffic to fwsm but OSPF that is running on all three 7600 core routers only is routing traffic as earlier,ignoring FWSM&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BTW the OSPF config is ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;router ospf 1&lt;/P&gt;&lt;P&gt; log-adjacency-changes&lt;/P&gt;&lt;P&gt; redistribute static metric 50 metric-type 1 subnets&lt;/P&gt;&lt;P&gt; network 10.220.62.2 0.0.0.0 area 0&lt;/P&gt;&lt;P&gt; network 10.225.2.0 0.0.0.0 area 0&lt;/P&gt;&lt;P&gt; network 10.225.62.1 0.0.0.0 area 0&lt;/P&gt;&lt;P&gt; network 10.225.62.0 0.0.0.255 area 0&lt;/P&gt;&lt;P&gt; network 10.225.63.0 0.0.0.255 area 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kindly suggest &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Jun 2012 13:44:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951537#M435089</guid>
      <dc:creator>cisco.anubhav</dc:creator>
      <dc:date>2012-06-04T13:44:46Z</dc:date>
    </item>
    <item>
      <title>Re: Reg:FWSM router mode issue</title>
      <link>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951538#M435090</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have physical access to your switches?&lt;/P&gt;&lt;P&gt;If you do, the best way is to create VLAN 201 on your 3560 and configure IP Address in the 192.168.3.0/24 subnet, then configure default route to be the FWSM inside interface 192.168.3.1.&lt;/P&gt;&lt;P&gt;Then connect an interface on 3560 to 7600 and assign them to VLAN 201.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Jun 2012 14:45:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951538#M435090</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-04T14:45:18Z</dc:date>
    </item>
    <item>
      <title>Re: Reg:FWSM router mode issue</title>
      <link>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951539#M435091</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what if i put inside address to some range that is operational on 3560(e.g.:10.225.2.252/30 or 10.225.3),we cannot disturb our topology and we need that point to point link .Also there is one moe 3560 connected to the previously mentioned 3560&lt;/P&gt;&lt;P&gt;Also how to get all the donlink routers' traffic to fwsm iside interface apart from that of LAN level trafic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you have been very helpful ,i thank u very much.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jun 2012 13:37:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951539#M435091</guid>
      <dc:creator>cisco.anubhav</dc:creator>
      <dc:date>2012-06-05T13:37:24Z</dc:date>
    </item>
    <item>
      <title>Re: Reg:FWSM router mode issue</title>
      <link>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951540#M435092</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;do you have a trunk port between the 3560 and the 7600? because as per your diagram, it seems that you only have p2p link therefore it's a routed connection (layer 3) instead of layer 2 connection between the 2 devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if you do have trunk port, or access vlan connected between the 2 apart from the P2P link, then yes, you can put the inside interface of the FWSM in the same vlan as the 3560 vlan. You would also need to change the vlan assign to the fwsm inside interface to the same vlan as the 3560 vlan that you are going to use.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To get all the routers traffic to the fwsm inside, as long as the routers next hop is to the fwsm inside instead of the 7600(b), then the traffic will be routed towards the fwsm. The router that is connected directly to the 7600 (b) needs to have an interface in the same subnet as the fwsm inside interface so you can configure the default route on that router to be the fwsm inside.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jun 2012 14:19:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reg-fwsm-router-mode-issue/m-p/1951540#M435092</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-05T14:19:52Z</dc:date>
    </item>
  </channel>
</rss>

