<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Routing between interfaces on ASA 5520 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984969#M439595</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;what is the output of:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-family: 'courier new', courier;"&gt;show run nat&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-family: 'courier new', courier;"&gt;show run nat-control&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-family: 'courier new', courier;"&gt;show run static&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 11 Jul 2012 17:01:37 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2012-07-11T17:01:37Z</dc:date>
    <item>
      <title>Routing between interfaces on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984966#M439592</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have an ASA 5520 which is in multiple context mode. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are trying to pass traffic from the outside interface to the dmz interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I may be fundamentally wrong in the way i'm configuring this, but this is one ting im hoping someone may be able to help with. We have a /27 public ip range. We need a small amount of those addresses to be in the DMZ for SIP servers specifically. The rest of the addresses are NAT'd to the inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So i created the outside interface GigabitEthernet0/0 with 1.2.3.192/28&lt;/P&gt;&lt;P&gt;Inside Interface GigabitEthernet0/2 with 192.168.20.0/24&lt;/P&gt;&lt;P&gt;DMZ interface on GigabitEthernet0/2.1 with 1.2.3.208/29&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So all i want to do is route traffic that comes in the outside interface and out to the DMZ interface for the 1.2.3.208/29 subnet. I set the gateway address as 1.2.3.214 which is the DMZ interface address on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this makes sense? Im sure im doing something stupid, im just stuck, and hoping someone can help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can provide more info if required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Birdy&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:29:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984966#M439592</guid>
      <dc:creator>birdy1982</dc:creator>
      <dc:date>2019-03-11T23:29:49Z</dc:date>
    </item>
    <item>
      <title>Routing between interfaces on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984967#M439593</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That really should work. There are some things you should be aware of:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- If your g0/0 is a shared interface you should enable individual MAC-addresses per context so that the ASA can classify the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Using a native VLAN on an interface that is also handling subinterfaces is not seen as a best practice. Better use only subinterfaces and the major interfaces should not be configured with any firewalling-settings.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Your ACLs allow the traffic from outside to DMZ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- If you still have nat-control enabled (you didn't write which version you are using), then you need a nat-config (nat-exemption) also for the communication between interfaces with public IP addresses.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jul 2012 16:03:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984967#M439593</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-07-11T16:03:03Z</dc:date>
    </item>
    <item>
      <title>Routing between interfaces on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984968#M439594</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;g0/0 isnt a shared interface.&lt;/P&gt;&lt;P&gt;I'll look into the sub-interfaces, thanks for the tip.&lt;/P&gt;&lt;P&gt;Yes i have ACL's allowing traffic outside to DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Im not sure how to configure the NAT exemption rules? Version 8.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Im sure i disabled nat-control. Do you know how i can check? I cant find in my config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jul 2012 16:25:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984968#M439594</guid>
      <dc:creator>birdy1982</dc:creator>
      <dc:date>2012-07-11T16:25:17Z</dc:date>
    </item>
    <item>
      <title>Re: Routing between interfaces on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984969#M439595</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;what is the output of:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-family: 'courier new', courier;"&gt;show run nat&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-family: 'courier new', courier;"&gt;show run nat-control&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-family: 'courier new', courier;"&gt;show run static&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jul 2012 17:01:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984969#M439595</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-07-11T17:01:37Z</dc:date>
    </item>
    <item>
      <title>Routing between interfaces on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984970#M439596</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh run nat:&lt;/P&gt;&lt;P&gt;nat (outside) 0 access-list outside_nat0_outbound outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh run nat-control:&lt;/P&gt;&lt;P&gt;no nat-control&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh run static:&lt;/P&gt;&lt;P&gt;Has static NAT definitions, none of which map to DMZ, only to management interfaces currently. There are static routes which are:&lt;/P&gt;&lt;P&gt;0.0.0.0 0.0.0.0 1.2.3.193&lt;/P&gt;&lt;P&gt;192.168.20.0 255.255.255.0 192.168.20.254&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jul 2012 09:15:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984970#M439596</guid>
      <dc:creator>birdy1982</dc:creator>
      <dc:date>2012-07-12T09:15:15Z</dc:date>
    </item>
    <item>
      <title>Re: Routing between interfaces on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984971#M439597</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;what is your NAT-exemption on your outside-interface for? There could be something involved that drops your traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try the packet-tracer to simulate your traffic.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jul 2012 13:23:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984971#M439597</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-07-12T13:23:37Z</dc:date>
    </item>
    <item>
      <title>Routing between interfaces on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984972#M439598</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Apologies. I had not considered that i was sharing an interface between the admin context and the main context. submitted the mac-address auto command in the system context which has resolved this particular issue, although it does lock me out of the admin context! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apologies again for missing the interface sharing, i know you pointed that out at the beginning and i just missed it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your time and help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jul 2012 14:06:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984972#M439598</guid>
      <dc:creator>birdy1982</dc:creator>
      <dc:date>2012-07-12T14:06:54Z</dc:date>
    </item>
    <item>
      <title>Routing between interfaces on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984973#M439599</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No problem. But your admin-context should of course still work after that change. Any nearby devices with static arp-entries or L2-security enabled?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jul 2012 14:22:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984973#M439599</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-07-12T14:22:24Z</dc:date>
    </item>
    <item>
      <title>Routing between interfaces on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984974#M439600</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry, i was away on another project.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Im still having the problem where i cant connect to the admin context if i enable mac-address auto to solve the previous problem. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do have a Cisco 1921 in front, i havent added any L2 security unless it is on by default. I do notice that the mac address for the admin context changes when i do a sh arp on the 1921, so the address for .194 (admin context ip address) is a different mac-address to .195 (which is the other context). Both go to the g0/0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Im sure im missing&amp;nbsp; something obvious again, but im just not sure what it is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2012 14:47:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984974#M439600</guid>
      <dc:creator>birdy1982</dc:creator>
      <dc:date>2012-07-17T14:47:38Z</dc:date>
    </item>
    <item>
      <title>Routing between interfaces on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984975#M439601</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="text-align: justify;"&gt;Hi Bro&lt;/P&gt;&lt;P style="text-align: justify;"&gt;This is how I would do it, if I were you. In your Cisco ASA (multi-context mode), you will have 3 contexts namely ADMIN CONTEXT, C1 CONTEXT and C2 CONTEXT. I would then allocate Management0/0 to ADMIN CONTEXT, GE0/0 and GE 0/1 to C1 CONTEXT and GE 0/2 and GE0/3 to C2 CONTEXT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;C1 CONTEXT = Catered for INSIDE LAN users&lt;/P&gt;&lt;P style="text-align: justify;"&gt;C2 CONTEXT – Catered for DMZ Servers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;In C1 CONTEXT, GE0/0 will hold the Public IP for example 202.188.1.2/27 (default gateway is 202.188.1.1 i.e. Cisco Router 1921 LAN interface) and GE0/1 will hold the Private IP Address 192.168.20.1/24.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;Meanwhile in C2 CONTEXT, GE0/2 will hold the Public IP for example 202.188.1.3/27 (default gateway is 202.188.1.1 i.e. Cisco Router 1921 LAN interface) and GE0/3 will hold the Private IP Address 192.168.30.1/24.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;Next, in the C2 context, for all network traffic coming from the Internet to the DMZ Servers, you’ll need to enable static NAT e.g. 202.188.1.30 ••à 192.168.30.30. Please do ensure your Cisco Router has a host route for this entry.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;Finally, for outbound traffic in C1 and C2, you could apply dynamic NAT instead, translate to the respective context’s OUTSIDE interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;There are other factors to look into as well, e.g. ACL, routing etc. If you’d like, you could paste your configuration here, and I could advice further.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;You’re in safe hands, as I’ve carried out many such deployments in the past.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2012 15:27:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984975#M439601</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-07-17T15:27:17Z</dc:date>
    </item>
    <item>
      <title>Re: Routing between interfaces on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984976#M439602</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;so from the standpoint of the adjacent router it looks fine with the different MAC-addresses. Please explain what you mean with "locked out of the admin context". What exactly desn't work?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2012 15:35:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984976#M439602</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-07-17T15:35:31Z</dc:date>
    </item>
    <item>
      <title>Routing between interfaces on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984977#M439603</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the replies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I cannot connect on ASDM, SSH or telnet to the .194 address. Nor can i ping etc. So i cant manage the ASA when mac-address auto is applied. (I schedule a reload before i apply this).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So even though the router is showing a different mac-address in it's arp table, the ASA wont accept connections on the admin context and that IP address. I cant thknk of anything in the ASA that i've configured that would block/filter on L2. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2012 15:51:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984977#M439603</guid>
      <dc:creator>birdy1982</dc:creator>
      <dc:date>2012-07-17T15:51:17Z</dc:date>
    </item>
    <item>
      <title>Routing between interfaces on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984978#M439604</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately we cannot use NAT, we run OpenSIP/Asterisk servers from the DMZ and NAT causes too many problems with SIP we've found. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see what saying about the contexts though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2012 15:53:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984978#M439604</guid>
      <dc:creator>birdy1982</dc:creator>
      <dc:date>2012-07-17T15:53:07Z</dc:date>
    </item>
    <item>
      <title>Routing between interfaces on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984979#M439605</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;If you want to have Public IP Address in your DMZ LAN, that's fine too &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; This means you'll need to breakdown the /27 to 2 /28. 1 /28 will be used on the OUTSIDE interface and the other /28 will be used in DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;In C1 CONTEXT, GE0/0 will hold the Public IP for example 202.188.1.2/28 (default gateway is 202.188.1.1 i.e. Cisco Router 1921 LAN interface) and GE0/1 will hold the Private IP Address 192.168.20.1/24.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;Meanwhile in C2 CONTEXT, GE0/2 will hold the Public IP for example 202.188.1.3/28 (default gateway is 202.188.1.1 i.e. Cisco Router 1921 LAN interface) and GE0/3 will hold the Private IP Address 202.188.1.17/28.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;Next, in the C2 context, for all network traffic coming from the Internet to the DMZ Servers, you’ll need to either enable no nat-control or static(dmz,outside) 202.188.1.16 202.188.1.16 netmask 255.255.255.240 . Please do ensure your Cisco Router has the proper route for this entry i.e. ip route 202.188.1.16 255.255.255.240 202.188.1.3 name DMZ_SERVERS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;Finally, for outbound traffic C2, you can just forward them either via nat (dmz) 0 access-list nonat or the same way as done in C1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;Good luck bro! May the force be with you &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;P/S: If you think this comment is helpful, please do rate it nicely &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;You’re in safe hands, as I’ve carried out many such deployments in the past.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2012 16:04:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984979#M439605</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-07-17T16:04:18Z</dc:date>
    </item>
    <item>
      <title>Routing between interfaces on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984980#M439606</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Only issue is that the 1921 has only 2 interfaces. One is for the internet connection and the other connects to the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2012 16:18:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984980#M439606</guid>
      <dc:creator>birdy1982</dc:creator>
      <dc:date>2012-07-17T16:18:00Z</dc:date>
    </item>
    <item>
      <title>Routing between interfaces on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984981#M439607</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;Your Cisco Router 1921 has 2 interfaces, that's fine. In fact, that's all we need. The LAN interface will hold the IP Address 202.188.1.1/28 and the C1 OUTSIDE CONTEXT IP Address will be 202.188.1.2/28 and C2 OUTSIDE CONTEXT IP Address will be 202.188.1.3/28 &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2012 16:28:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984981#M439607</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-07-17T16:28:28Z</dc:date>
    </item>
    <item>
      <title>Routing between interfaces on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984982#M439608</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ahhh sorry, i see now. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok i'll have a look.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll let you know how i get on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2012 16:31:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984982#M439608</guid>
      <dc:creator>birdy1982</dc:creator>
      <dc:date>2012-07-17T16:31:26Z</dc:date>
    </item>
    <item>
      <title>Routing between interfaces on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984983#M439609</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="padding: 0pt; margin: 0pt;"&gt;personally, I wouldn't change my infrastructure just because one feature doesn't work as expected. Better look for the couse of the problem. After changing the MAC-addresses on the ASA, have you tried to clear the arp-cache on the router?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2012 18:06:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984983#M439609</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-07-17T18:06:13Z</dc:date>
    </item>
    <item>
      <title>Routing between interfaces on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984984#M439610</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Having had a look, my configuration doesnt differ much from what was suggested anyway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes i have cleared the arp cache on the router after changing the mac-addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jul 2012 08:18:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984984#M439610</guid>
      <dc:creator>birdy1982</dc:creator>
      <dc:date>2012-07-18T08:18:36Z</dc:date>
    </item>
    <item>
      <title>Routing between interfaces on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984985#M439611</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Anything on the Switch between the ASA and the Router?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jul 2012 16:58:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-between-interfaces-on-asa-5520/m-p/1984985#M439611</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-07-19T16:58:33Z</dc:date>
    </item>
  </channel>
</rss>

