<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Static Route Issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-route-issue/m-p/1924345#M457636</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; That is a great suggesting, and I tried it, but it didn't solve the problem.&amp;nbsp; Still can't ping from a client, but can from inside the device.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 29 Mar 2012 13:11:02 GMT</pubDate>
    <dc:creator>DurableJoe</dc:creator>
    <dc:date>2012-03-29T13:11:02Z</dc:date>
    <item>
      <title>Static Route Issue</title>
      <link>https://community.cisco.com/t5/network-security/static-route-issue/m-p/1924343#M457633</link>
      <description>&lt;P&gt;I have an ASA 5510 running 8.2(1) that I recently purchased and installed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To give you an overview of our network layout, we have 3 remote offices.&amp;nbsp; Our main office is 10.0.0.0/24.&amp;nbsp; The ASA 5510 is 10.0.0.1.&amp;nbsp; Right now I have a VPN router that the ASA 5510 will eventually be taking the place of at 10.0.0.3.&amp;nbsp; It does a VPN tunnel to 10.0.5.0/24.&amp;nbsp; I have an MPLS router at 10.0.0.2 that connects to the other remote office (10.0.3.0/24).&amp;nbsp; I am also trying to get the ASA 5510 to do a vpn tunnel to 10.0.4.0/24 which has an ASA 5505 in place, but before I try and figure out why that is not working, I want to resolve this static route issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA 5510 is working fine for us to get out on the internet from the 10.0.0.0/24 network, it is set as our default gateway on our client machines.&amp;nbsp; However, I cannot ping or in any way see anything on our remote networks from any client on the 10.0.0.0/24 network that uses the ASA 5510 as the default gateway.&amp;nbsp; I can however ping the remote equipment from the CLI interface on the ASA 5510, so I think I have my static routes just fine.&amp;nbsp; It makes me think it is an access list issue or some other command I am missing to keep the thing from blocking the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks so much to anyone who is willing to point me in the right direction.&amp;nbsp; My brain is just about mush.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:48:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-issue/m-p/1924343#M457633</guid>
      <dc:creator>DurableJoe</dc:creator>
      <dc:date>2019-03-11T22:48:11Z</dc:date>
    </item>
    <item>
      <title>Static Route Issue</title>
      <link>https://community.cisco.com/t5/network-security/static-route-issue/m-p/1924344#M457634</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following command(s) came to mind first as I didnt find them on the configuration attached. You traffic is entering and leaving the same interface so you'll need one of the below configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From Cisco material&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;H2&gt; same-security-traffic &lt;/H2&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1421316"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; To permit communication between interfaces with equal security levels,&amp;nbsp; or to allow traffic to enter and exit the same interface, use the &lt;STRONG&gt;same-security-traffic &lt;/STRONG&gt;command in global configuration mode. To disable the same-security traffic, use the &lt;STRONG&gt;no&lt;/STRONG&gt; form of this command. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1421317"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit {inter-interface | intra-interface} &lt;/P&gt;&lt;P&gt;
&lt;A name="wp1421318"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no &lt;/STRONG&gt;same-security-traffic permit {inter-interface | intra-interface} &lt;/P&gt;&lt;P&gt;
&lt;A name="wp1421328"&gt;&lt;/A&gt;&lt;/P&gt;&lt;H3&gt; Syntax Description&lt;/H3&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV align="left"&gt;
&lt;TABLE border="1" cellpadding="3" cellspacing="0" id="wp1421321table1421319" width="80%"&gt;
&lt;CAPTION&gt;&lt;BR /&gt;&lt;/CAPTION&gt; 
&lt;TBODY&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;&lt;A name="wp1421321"&gt;&lt;/A&gt;
&lt;P&gt; &lt;STRONG&gt;inter-interface&lt;/STRONG&gt; &lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp1421323"&gt;&lt;/A&gt;
&lt;P&gt; Permits communication between different interfaces that have the same security level. &lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;&lt;A name="wp1421325"&gt;&lt;/A&gt;
&lt;P&gt; &lt;STRONG&gt;intra-interface&lt;/STRONG&gt; &lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp1421327"&gt;&lt;/A&gt;
&lt;P&gt; Permits communication in and out of the same interface. &lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H3&gt; &lt;/H3&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1421329"&gt;&lt;/A&gt;&lt;/P&gt;&lt;H3&gt; Defaults &lt;/H3&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1421330"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; This command is disabled by default. &lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;H3&gt; Usage Guidelines &lt;/H3&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1421401"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; Allowing communication between same security interfaces (enabled by the &lt;STRONG&gt;same-security-traffic inter-interface &lt;/STRONG&gt;command) provides the following benefits: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1421402"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;You&amp;nbsp; can configure more than 101 communicating interfaces. If you use&amp;nbsp; different levels for each interface, you can configure only one&amp;nbsp; interface per level (0 to 100). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1421403"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;You can allow traffic to flow freely between all same security interfaces without access lists. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1421404"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; The &lt;STRONG&gt;same-security-traffic intra-interface&lt;/STRONG&gt; command&amp;nbsp; lets traffic enter and exit the same interface, which is normally not&amp;nbsp; allowed. This feature might be useful for VPN traffic that enters an&amp;nbsp; interface, but is then routed out the same interface. The VPN traffic&amp;nbsp; might be unencrypted in this case, or it might be reencrypted for&amp;nbsp; another VPN connection. For example, if you have a hub and spoke VPN&amp;nbsp; network, where the adaptive security appliance is the hub, and remote&amp;nbsp; VPN networks are spokes, for one spoke to communicate with another&amp;nbsp; spoke, traffic must go into the adaptive security appliance and then out&amp;nbsp; again to the other spoke. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://www.cisco.com/en/US/i/templates/note.gif" /&gt;&lt;/P&gt;&lt;HR /&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1421411"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;Note &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="1" /&gt;All traffic allowed by the&lt;STRONG&gt; same-security-traffic intra-interface&lt;/STRONG&gt; command is still subject to firewall rules. Be careful not to create an&amp;nbsp; asymmetric routing situation that can cause return traffic not to&amp;nbsp; traverse the adaptive security appliance. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;HR /&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1421415"&gt;&lt;/A&gt;&lt;/P&gt;&lt;H3&gt; Examples &lt;/H3&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1421416"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; The following example shows how to enable the same-security interface communication: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1421419"&gt;&lt;/A&gt;&lt;/P&gt;&lt;DIV&gt;
&lt;PRE&gt;hostname(config)# &lt;STRONG&gt;same-security-traffic permit inter-interface
&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;P&gt; &lt;A name="wp1421421"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;DIV&gt; &lt;/DIV&gt;
&lt;P&gt; &lt;A name="wp1421422"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt; The following example shows how to enable traffic to enter and exit the same interface: &lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt; &lt;A name="wp1421425"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;PRE&gt;hostname(config)# &lt;STRONG&gt;same-security-traffic permit intra-interface
&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Mar 2012 06:38:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-issue/m-p/1924344#M457634</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-03-29T06:38:01Z</dc:date>
    </item>
    <item>
      <title>Static Route Issue</title>
      <link>https://community.cisco.com/t5/network-security/static-route-issue/m-p/1924345#M457636</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; That is a great suggesting, and I tried it, but it didn't solve the problem.&amp;nbsp; Still can't ping from a client, but can from inside the device.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Mar 2012 13:11:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-issue/m-p/1924345#M457636</guid>
      <dc:creator>DurableJoe</dc:creator>
      <dc:date>2012-03-29T13:11:02Z</dc:date>
    </item>
    <item>
      <title>Static Route Issue</title>
      <link>https://community.cisco.com/t5/network-security/static-route-issue/m-p/1924346#M457637</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above quoted text mentions that the traffic is still subject to normal firewall rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you make sure that you have permitted ICMP from the interface that has the routes to the remote network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you also check that you have the following inspect configured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "inspect icmp" line basicly simplifies the ICMP handling with the firewall. You wont have to use access-list in both directions to get the ICMP working. Atleast thats how I understood it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Doesnt seem you have that configured in the attached ASA configuration. Though I'm not sure if its needed in the way your traffic is going. But I'm sure it wont hurt adding the "inspect icmp" anyway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why does both your routes have the same gateway address? Wasn't the other network supposed to be reached from 10.0.0.2 and not 10.0.0.3?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Mar 2012 14:18:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-issue/m-p/1924346#M457637</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-03-29T14:18:58Z</dc:date>
    </item>
  </channel>
</rss>

