<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5505 Traffic flow between interfaces in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-traffic-flow-between-interfaces/m-p/1963777#M440919</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks all for the replies. I have made the suggested changes but the two interfaces still don't seem to be able to talk to eachother. Machines on the inside1 network can ping eachother but cannot ping machines on the inside2 network and vice versa. If I do a traceroute from one interface to another it times out on the first hop, so doesnt give much info. I cannot see anything else wrong with the rulebase that may be stopping the flow. Any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Russell&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 13 Jun 2012 15:33:15 GMT</pubDate>
    <dc:creator>rkentpayne</dc:creator>
    <dc:date>2012-06-13T15:33:15Z</dc:date>
    <item>
      <title>ASA 5505 Traffic flow between interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-traffic-flow-between-interfaces/m-p/1963772#M440914</link>
      <description>&lt;P&gt;Good Morning,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am fairly new to configuring ASA's so I wonder if anyone could help with an issue I am having. I have an ASA 5505 with one outside interface and three inside interfaces (inside1, inside2, and management). I need inside1 and inside2 to be able to talk to eachother but cannot work out how to make this happen. They are both configured to the same security level and the 'Enable traffic between interfaces with same security level' box is ticked. I have also tried adding appropriate NAT and Access rules. The packet tracer suggests the rules are correct for allowing traffic flow between interfaces but obviosly this may not be the case. Any ideas how to make this work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have attached my config for reference.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Russell&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:18:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-traffic-flow-between-interfaces/m-p/1963772#M440914</guid>
      <dc:creator>rkentpayne</dc:creator>
      <dc:date>2019-03-11T23:18:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Traffic flow between interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-traffic-flow-between-interfaces/m-p/1963773#M440915</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can remove the following commands:&lt;/P&gt;&lt;P&gt;static (inside1,inside1) 172.16.1.0&amp;nbsp; access-list inside1_nat_static &lt;/P&gt;&lt;P&gt;static (inside2,inside2) 192.168.2.0&amp;nbsp; access-list inside2_nat_static &lt;/P&gt;&lt;P&gt;access-group inside1_access_in in interface inside1&lt;/P&gt;&lt;P&gt;access-group inside1_access_out out interface inside1&lt;/P&gt;&lt;P&gt;access-group inside2_access_in in interface inside2&lt;/P&gt;&lt;P&gt;access-group inside2_access_out out interface inside2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then configure the following:&lt;/P&gt;&lt;P&gt;static (inside1,inside2) 192.168.2.0 192.168.2.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Finally, "clear xlate" to clear any existing translations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That should allow access between inside1 and inside2&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jun 2012 11:00:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-traffic-flow-between-interfaces/m-p/1963773#M440915</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-13T11:00:27Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Traffic flow between interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-traffic-flow-between-interfaces/m-p/1963774#M440916</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Correct static translation rules&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;static (inside1,inside&lt;SPAN style="text-decoration: line-through;"&gt;1&lt;/SPAN&gt;2) 172.16.1.0&amp;nbsp; access-list inside1_nat_static &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;static (inside2,inside&lt;SPAN style="text-decoration: line-through;"&gt;2&lt;/SPAN&gt;1) 192.168.2.0&amp;nbsp; access-list inside2_nat_static &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;also&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; protocol-object ip&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; &lt;SPAN style="text-decoration: line-through;"&gt;protocol-object icmp&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; &lt;SPAN style="text-decoration: line-through;"&gt;protocol-object udp&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; &lt;SPAN style="text-decoration: line-through;"&gt;protocol-object tcp&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;object-group protocol DM_INLINE_PROTOCOL_2&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; protocol-object ip&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; &lt;SPAN style="text-decoration: line-through;"&gt;protocol-object icmp&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; &lt;SPAN style="text-decoration: line-through;"&gt;protocol-object udp&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; &lt;SPAN style="text-decoration: line-through;"&gt;protocol-object tcp&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;because IP includes ICMP UDP TCP&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jun 2012 11:10:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-traffic-flow-between-interfaces/m-p/1963774#M440916</guid>
      <dc:creator>Tagir Temirgaliyev</dc:creator>
      <dc:date>2012-06-13T11:10:31Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Traffic flow between interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-traffic-flow-between-interfaces/m-p/1963775#M440917</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;EM&gt;access-group inside1_access_in in interface inside1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-group inside1_access_out out interface inside1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-group inside2_access_in in interface inside2&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-group inside2_access_out out interface inside2&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this access-group is pointless because it allows all traffic&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jun 2012 11:13:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-traffic-flow-between-interfaces/m-p/1963775#M440917</guid>
      <dc:creator>Tagir Temirgaliyev</dc:creator>
      <dc:date>2012-06-13T11:13:18Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Traffic flow between interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-traffic-flow-between-interfaces/m-p/1963776#M440918</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jennifer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have not seen that already answered&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jun 2012 11:17:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-traffic-flow-between-interfaces/m-p/1963776#M440918</guid>
      <dc:creator>Tagir Temirgaliyev</dc:creator>
      <dc:date>2012-06-13T11:17:31Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Traffic flow between interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-traffic-flow-between-interfaces/m-p/1963777#M440919</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks all for the replies. I have made the suggested changes but the two interfaces still don't seem to be able to talk to eachother. Machines on the inside1 network can ping eachother but cannot ping machines on the inside2 network and vice versa. If I do a traceroute from one interface to another it times out on the first hop, so doesnt give much info. I cannot see anything else wrong with the rulebase that may be stopping the flow. Any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Russell&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jun 2012 15:33:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-traffic-flow-between-interfaces/m-p/1963777#M440919</guid>
      <dc:creator>rkentpayne</dc:creator>
      <dc:date>2012-06-13T15:33:15Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Traffic flow between interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-traffic-flow-between-interfaces/m-p/1963778#M440920</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do Machines on the inside1 network have default gateway 192.168.2.254 ?&lt;/P&gt;&lt;P&gt;Do Machines on the inside2 network have default gateway 172.16.1.254 ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;write here&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ipconfig /all&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from Machines on the inside1 and inside2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;probably there is not default gateway in &lt;EM&gt;inside1 network&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;dhcpd address 192.168.2.100-192.168.2.253 inside1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;dhcpd dns 194.72.6.57 194.73.82.242 interface inside1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;dhcpd enable inside1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and dont forget to rate post&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jun 2012 02:55:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-traffic-flow-between-interfaces/m-p/1963778#M440920</guid>
      <dc:creator>Tagir Temirgaliyev</dc:creator>
      <dc:date>2012-06-14T02:55:47Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Traffic flow between interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-traffic-flow-between-interfaces/m-p/1963779#M440921</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, default gateway is set correctly. Machines on the inside1 network all have the default gateway 192.168.2.254 and the inside2 network have 172.16.1.254. All machines can also successfully ping their own default gateway. This puzzled me as well becuase I thought the traceroute would at least get to the default gateway (ip address of the source interface), even if it goes no further, but it does not even get that far.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Russell&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jun 2012 09:14:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-traffic-flow-between-interfaces/m-p/1963779#M440921</guid>
      <dc:creator>rkentpayne</dc:creator>
      <dc:date>2012-06-14T09:14:11Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Traffic flow between interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-traffic-flow-between-interfaces/m-p/1963780#M440922</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;first of all try to remove the access-list inside1 and inside2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;conf t&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;no access-group inside1_access_in in interface inside1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;no access-group inside1_access_out out interface inside1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;no access-group inside2_access_in in interface inside2&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;no access-group inside2_access_out out interface inside2&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;exi&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and check connectivity from inside1 to inside2&lt;/P&gt;&lt;P&gt;if not&lt;/P&gt;&lt;P&gt;so mistake is in static translation rules&lt;/P&gt;&lt;P&gt;write here the result.&lt;/P&gt;&lt;P&gt;we will continue&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jun 2012 09:56:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-traffic-flow-between-interfaces/m-p/1963780#M440922</guid>
      <dc:creator>Tagir Temirgaliyev</dc:creator>
      <dc:date>2012-06-14T09:56:44Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Traffic flow between interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-traffic-flow-between-interfaces/m-p/1963781#M440923</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, I have removed the above but still unable to ping between networks. Up-to-date config printed below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Russell&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;: Saved&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;:&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ASA Version 8.2(5) &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;hostname cerberus&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;names&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Ethernet0/0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; switchport access vlan 2&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Ethernet0/1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; switchport access vlan 42&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Ethernet0/2&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; switchport access vlan 32&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Ethernet0/3&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; switchport access vlan 22&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Ethernet0/4&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; switchport access vlan 12&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Ethernet0/5&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; switchport access vlan 52&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Ethernet0/6&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Ethernet0/7&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Vlan1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; nameif management&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; security-level 100&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; ip address 192.168.1.1 255.255.255.0 &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; management-only&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Vlan2&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; nameif outside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; security-level 0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; ip address 195.171.131.50 255.255.255.240 &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Vlan12&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; nameif inside1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; security-level 50&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; ip address 192.168.2.254 255.255.255.0 &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Vlan22&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; nameif inside2&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; security-level 50&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; ip address 172.16.1.254 255.255.255.0 &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ftp mode passive&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;same-security-traffic permit inter-interface&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;same-security-traffic permit intra-interface&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;object-group protocol TCPUDP&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; protocol-object udp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; protocol-object tcp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;object-group protocol DM_INLINE_PROTOCOL_3&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; protocol-object ip&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; protocol-object icmp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; protocol-object udp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; protocol-object tcp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;object-group protocol DM_INLINE_PROTOCOL_4&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; protocol-object ip&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; protocol-object icmp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; protocol-object udp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; protocol-object tcp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;object-group protocol DM_INLINE_PROTOCOL_5&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; protocol-object ip&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; protocol-object icmp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; protocol-object udp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; protocol-object tcp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;object-group protocol DM_INLINE_PROTOCOL_6&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; protocol-object ip&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; protocol-object icmp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; protocol-object udp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; protocol-object tcp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list inside1_access_out extended permit ip any any &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list inside1_access_in extended permit ip any any &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list management_access_in extended permit object-group DM_INLINE_PROTOCOL_3 any any &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list management_access_out extended permit object-group DM_INLINE_PROTOCOL_4 any any &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list inside1_nat_static extended permit ip 192.168.2.0 255.255.255.0 172.16.1.0 255.255.255.0 &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list inside2_nat_static extended permit ip 172.16.1.0 255.255.255.0 192.168.2.0 255.255.255.0 &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list inside2_access_in extended permit object-group DM_INLINE_PROTOCOL_5 any any &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list inside2_access_out extended permit object-group DM_INLINE_PROTOCOL_6 any any &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;pager lines 24&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;logging enable&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;logging asdm informational&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;mtu management 1500&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;mtu outside 1500&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;mtu inside1 1500&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;mtu inside2 1500&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;no failover&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;no asdm history enable&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;arp timeout 14400&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;global (outside) 1 interface&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;nat (management) 1 192.168.1.0 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;nat (inside1) 1 192.168.2.0 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;nat (inside2) 1 172.16.1.0 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;static (inside1,inside2) 172.16.1.0&amp;nbsp; access-list inside1_nat_static &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;static (inside2,inside1) 192.168.2.0&amp;nbsp; access-list inside2_nat_static &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-group management_access_in in interface management&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-group management_access_out out interface management&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;route outside 0.0.0.0 0.0.0.0 195.171.131.49 1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;timeout xlate 3:00:00&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;timeout floating-conn 0:00:00&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;http server enable&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;http 192.168.1.0 255.255.255.0 management&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;no snmp-server location&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;no snmp-server contact&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;crypto ipsec security-association lifetime seconds 28800&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;telnet timeout 5&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ssh timeout 5&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;console timeout 0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;dhcpd auto_config outside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;dhcpd address 192.168.1.5-192.168.1.254 management&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;dhcpd dns 194.72.6.57 194.73.82.242 interface management&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;dhcpd enable management&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;dhcpd address 192.168.2.100-192.168.2.253 inside1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;dhcpd dns 194.72.6.57 194.73.82.242 interface inside1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;dhcpd enable inside1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;threat-detection basic-threat&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;threat-detection statistics access-list&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;no threat-detection statistics tcp-intercept&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;webvpn&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;class-map inspection_default&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; match default-inspection-traffic&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;policy-map type inspect dns preset_dns_map&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; parameters&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; message-length maximum client auto&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; message-length maximum 512&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;policy-map global_policy&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; class inspection_default&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect ftp &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect h323 h225 &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect h323 ras &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect rsh &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect rtsp &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect esmtp &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect sqlnet &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect sunrpc &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect xdmcp &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect netbios &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect tftp &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect ip-options &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;service-policy global_policy global&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;prompt hostname context &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;no call-home reporting anonymous&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Cryptochecksum:31109763a4e257072caddf9574b58b53&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;: end&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;no asdm history enable&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jun 2012 10:39:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-traffic-flow-between-interfaces/m-p/1963781#M440923</guid>
      <dc:creator>rkentpayne</dc:creator>
      <dc:date>2012-06-14T10:39:01Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Traffic flow between interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-traffic-flow-between-interfaces/m-p/1963782#M440924</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;second step is simplest static nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;conf t&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;EM style="border-collapse: collapse; list-style: none;"&gt;no static (inside1,inside2) 172.16.1.0&amp;nbsp; access-list inside1_nat_static&lt;/EM&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;EM style="border-collapse: collapse; list-style: none;"&gt;no static (inside2,inside1) 192.168.2.0&amp;nbsp; access-list inside2_nat_static&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;EM&gt;&lt;EM style="border-collapse: collapse; list-style: none;"&gt;static (inside2,inside1) 172.16.1.0&amp;nbsp; &lt;EM style="font-family: Arial, verdana, sans-serif; font-size: 12px; border-collapse: collapse; list-style: none;"&gt;172.16.1.0&amp;nbsp; &lt;/EM&gt;&lt;/EM&gt;netmask 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;EM&gt;&lt;EM style="border-collapse: collapse; list-style: none;"&gt;static (inside1,inside2) 192.168.2.0&amp;nbsp; &lt;EM style="font-family: Arial, verdana, sans-serif; font-size: 12px; border-collapse: collapse; list-style: none;"&gt;192.168.2.0 &lt;/EM&gt;&lt;/EM&gt;netmask 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;EM&gt;exi&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;EM style="border-collapse: collapse; list-style: none;"&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;EM style="border-collapse: collapse; list-style: none;"&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;if it dosnt help&lt;/P&gt;&lt;P&gt;so The third step&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;conf t&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;EM style="border-collapse: collapse; list-style: none;"&gt;interface Vlan22&lt;/EM&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;EM style="border-collapse: collapse; list-style: none;"&gt;nameif inside2&lt;/EM&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;EM style="border-collapse: collapse; list-style: none;"&gt;security-level 55&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; exi&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jun 2012 11:15:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-traffic-flow-between-interfaces/m-p/1963782#M440924</guid>
      <dc:creator>Tagir Temirgaliyev</dc:creator>
      <dc:date>2012-06-14T11:15:02Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Traffic flow between interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-traffic-flow-between-interfaces/m-p/1963783#M440925</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, ok I have tried the above, first changing the static NAT and then changing the security level of the interface. But the two networks will still not talk to eachother. I cannot figure out what could still be stopping it. Any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Russell&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jun 2012 13:03:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-traffic-flow-between-interfaces/m-p/1963783#M440925</guid>
      <dc:creator>rkentpayne</dc:creator>
      <dc:date>2012-06-14T13:03:28Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Traffic flow between interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-traffic-flow-between-interfaces/m-p/1963784#M440926</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess it should work with the access-rule poermit itself. Because both the zones arfe directly connected to the firewall...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;remove the current acl's and nat confs..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;let both interfaces in security level...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_1 extended permit ip 192.168.2.0 255.255.255.0 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list inside_2 extended permit ip 172.16.1.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-group inside_1 in interface inside1&lt;/P&gt;&lt;P&gt;access-group inside_2 in interface inside2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 195.171.131.50&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;outside nwtrok alone you need the nat to be enabled since that is getting translated in to public network....&lt;/P&gt;&lt;P&gt;so these all directly connected network so it should work with the ACL permit itself.....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if not working remove the vlan's and conf it as the routed interface with the same ip and try out...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;definitely it should work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jun 2012 17:36:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-traffic-flow-between-interfaces/m-p/1963784#M440926</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2012-06-14T17:36:11Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Traffic flow between interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-traffic-flow-between-interfaces/m-p/1963785#M440927</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;With the same security level, it should work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you just try to ping, please add ICMP inspection:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;policy-map global_policy&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; class inspection_default&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also check to see if you have any firewall enabled on the server/host that you are trying to ping as it normally will block ping from different subnet. Disable it temporarily while testing, or configure rule to allow inbound ICMP. By default it allows ping from the same subnet so you should be able to ping the host from the ASA itself.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jun 2012 19:01:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-traffic-flow-between-interfaces/m-p/1963785#M440927</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-14T19:01:16Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Traffic flow between interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-traffic-flow-between-interfaces/m-p/1963786#M440928</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jennifer, I added the ICMP inspection in and I can now ping from one network to another. Thank you very much indeed!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks everyone for your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Russell&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jun 2012 15:12:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-traffic-flow-between-interfaces/m-p/1963786#M440928</guid>
      <dc:creator>rkentpayne</dc:creator>
      <dc:date>2012-06-15T15:12:20Z</dc:date>
    </item>
  </channel>
</rss>

