<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5505 - allow traffic between inside interfaces in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-allow-traffic-between-inside-interfaces/m-p/1769963#M493661</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Would this work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 172.22.1.0 255.255.0.0 172.16.16.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 172.16.16.0 255.255.255.0 172.22.1.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (MCBackendTraffic) 0 access-list nonat&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 10 Nov 2011 15:35:42 GMT</pubDate>
    <dc:creator>sgendron9</dc:creator>
    <dc:date>2011-11-10T15:35:42Z</dc:date>
    <item>
      <title>ASA 5505 - allow traffic between inside interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-allow-traffic-between-inside-interfaces/m-p/1769962#M493660</link>
      <description>&lt;P&gt;Hi All - Cisco ASA Novice here...&amp;nbsp;&amp;nbsp; I have a question that I'm guessing is pretty straightforward.&amp;nbsp; I trying to allow traffic between 2 inside interfaces with the same security level.&amp;nbsp; VLAN1 and VLAN15.&amp;nbsp; The are on different physical ports on the ASA.&amp;nbsp; I tried to configure this through the GUI Web interface and checked ' enable traffic between two or more interfaces with the same security levels'.&amp;nbsp; With this ASA version, I do not need NAT to allow this, correct?&amp;nbsp; What am I missing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(1) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;enable password UMrZyv1DTPLXGFch encrypted&lt;/P&gt;&lt;P&gt;passwd UMrZyv1DTPLXGFch encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name XX.YY.163.39 EDI_XX.YY.163.39&lt;/P&gt;&lt;P&gt;name XX.YY.163.38 EDI2_XX.YY.163.38&lt;/P&gt;&lt;P&gt;name 10.66.91.135 UMASS_10.66.91.135 description UMASS VPN&lt;/P&gt;&lt;P&gt;name 172.16.16.236 EDI2_172.16.16.236 description Polaris EDI2&lt;/P&gt;&lt;P&gt;name 172.16.16.235 EDI_172.16.16.235 description Polaris EDI&lt;/P&gt;&lt;P&gt;name 192.168.25.17 ImagingInst_192.168.25.17 description ImagingInstitute&lt;/P&gt;&lt;P&gt;name 192.168.25.21 ImagingInst_192.168.25.21 description ImagingInstitute&lt;/P&gt;&lt;P&gt;name 192.168.25.22 ImagingInst_192.168.25.22 description ImagingInstitute&lt;/P&gt;&lt;P&gt;name 192.168.25.8 ImagingInst_192.168.25.8 description ImagingInstitute&lt;/P&gt;&lt;P&gt;name 10.88.0.4 UMASS_10.88.0.4 description UMASS VPN&lt;/P&gt;&lt;P&gt;name 10.88.8.80 UMASS_10.88.8.80 description UMASS VPN&lt;/P&gt;&lt;P&gt;name 172.16.16.231 Utility_172.16.16.231 description Testing&lt;/P&gt;&lt;P&gt;name 172.16.16.241 MonitorInt_172.16.16.241 description MonitorInt&lt;/P&gt;&lt;P&gt;name AA.BB.136.26 Monitor_AA.BB.136.26 description Monitor&lt;/P&gt;&lt;P&gt;name AA.BB.154.135 Monitor_AA.BB.154.135 description Monitor&lt;/P&gt;&lt;P&gt;name XX.YY.163.40 Utility_XX.YY.163.40 description Used for&amp;nbsp; monitoring, and may be used for other&lt;/P&gt;&lt;P&gt;name XX.BB.188.130 Monitor_AA.BB.188.130 description MonitorTest&lt;/P&gt;&lt;P&gt;name 172.16.16.232 Gateway_172.16.16.232&lt;/P&gt;&lt;P&gt;name XX.YY.163.41 Gateway_XX.YY.163.41&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.16.16.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address XX.YY.163.36 255.255.255.240 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan5&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan15&lt;/P&gt;&lt;P&gt; nameif MCBackendTraffic&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.22.1.220 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; switchport access vlan 15&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone GMT 0&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;object-group network ImagingInstGroup&lt;/P&gt;&lt;P&gt; network-object host ImagingInst_192.168.25.17&lt;/P&gt;&lt;P&gt; network-object host ImagingInst_192.168.25.21&lt;/P&gt;&lt;P&gt; network-object host ImagingInst_192.168.25.22&lt;/P&gt;&lt;P&gt; network-object host ImagingInst_192.168.25.8&lt;/P&gt;&lt;P&gt;object-group service EDI2_Ports tcp&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt; port-object eq ssh&lt;/P&gt;&lt;P&gt;object-group service EDI_Ports tcp&lt;/P&gt;&lt;P&gt; port-object eq ftp&lt;/P&gt;&lt;P&gt; port-object eq ftp-data&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_1&lt;/P&gt;&lt;P&gt; network-object host UMASS_10.66.91.135&lt;/P&gt;&lt;P&gt; network-object host UMASS_10.88.0.4&lt;/P&gt;&lt;P&gt; network-object host UMASS_10.88.8.80&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_2&lt;/P&gt;&lt;P&gt; network-object host Monitor_XX.YY.136.26&lt;/P&gt;&lt;P&gt; network-object host Monitor_XX.YY.154.135&lt;/P&gt;&lt;P&gt; network-object host Monitor_XX.YY.188.130&lt;/P&gt;&lt;P&gt;object-group service Monitor_Ports&lt;/P&gt;&lt;P&gt; service-object tcp-udp range 48000 48020 &lt;/P&gt;&lt;P&gt; service-object tcp eq ssh &lt;/P&gt;&lt;P&gt; service-object udp eq snmp &lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_1 tcp&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt;access-list outside_1_cryptomap extended permit ip 172.16.16.0 255.255.255.0 10.242.55.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 172.16.16.0 255.255.255.0 10.242.55.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip host EDI2_172.16.16.236 host UMASS_10.66.91.135 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip host EDI2_172.16.16.236 object-group ImagingInstGroup &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 172.16.16.0 255.255.255.0 object-group DM_INLINE_NETWORK_1 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any 172.16.16.96 255.255.255.240 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host EDI2_XX.YY.163.38 object-group EDI2_Ports &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host EDI_XX.YY.163.39 object-group EDI_Ports &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit object-group Monitor_Ports object-group DM_INLINE_NETWORK_2 host Utility_XX.YY.163.40 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host Gateway_XX.YY.163.41 object-group DM_INLINE_TCP_1 &lt;/P&gt;&lt;P&gt;access-list outside_2_cryptomap extended permit ip 172.16.16.0 255.255.255.0 object-group DM_INLINE_NETWORK_1 &lt;/P&gt;&lt;P&gt;access-list outside_3_cryptomap extended permit ip 172.16.16.0 255.255.255.0 object-group ImagingInstGroup &lt;/P&gt;&lt;P&gt;access-list throttle_edi_servers extended permit ip host EDI2_XX.YY.163.38 any &lt;/P&gt;&lt;P&gt;access-list throttle_edi_servers extended permit ip any host EDI2_XX.YY.163.38 &lt;/P&gt;&lt;P&gt;access-list throttle_edi_servers extended permit ip host EDI_XX.YY.163.39 any &lt;/P&gt;&lt;P&gt;access-list throttle_edi_servers extended permit ip any host EDI_XX.YY.163.39 &lt;/P&gt;&lt;P&gt;access-list RemoteAccessVPN_splitTunnelAcl standard permit 172.16.16.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging asdm warnings&lt;/P&gt;&lt;P&gt;logging mail errors&lt;/P&gt;&lt;P&gt;logging from-address noreply@utility..com&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;logging recipient-address &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:aa@bb.com" target="_blank"&gt;aa@bb.com&lt;/A&gt;&lt;SPAN&gt; level errors&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;logging host inside Utility_172.16.16.231&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;mtu MCBackendTraffic 1500&lt;/P&gt;&lt;P&gt;ip local pool VPNPool 172.16.16.101-172.16.16.111 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) EDI_XX.YY.163.39 EDI_172.16.16.235 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) EDI2_XX.YY.163.38 EDI2_172.16.16.236 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) Utility_XX.YY.163.40 MonitorInt_172.16.16.241 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) Gateway_XX.YY.163.41 Gateway_172.16.16.232 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 XX.YY.163.33 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 172.16.16.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 10.242.55.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 match address outside_1_cryptomap&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set peer AA.CC.125.146 &lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set transform-set ESP-3DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outside_map 2 match address outside_2_cryptomap&lt;/P&gt;&lt;P&gt;crypto map outside_map 2 set peer AA.CC.139.26 &lt;/P&gt;&lt;P&gt;crypto map outside_map 2 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map outside_map 3 match address outside_3_cryptomap&lt;/P&gt;&lt;P&gt;crypto map outside_map 3 set peer AA.CC.56.227 &lt;/P&gt;&lt;P&gt;crypto map outside_map 3 set transform-set ESP-3DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; group 1&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 30&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;telnet 172.16.16.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet 10.242.55.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd dns XX.YY.136.155 XX.YY.136.100&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 172.16.16.5-172.16.16.100 inside&lt;/P&gt;&lt;P&gt;dhcpd dns XX.YY.136.155 XX.YY.136.100 interface inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics port&lt;/P&gt;&lt;P&gt;threat-detection statistics protocol&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec svc &lt;/P&gt;&lt;P&gt;group-policy RemoteAccessVPN internal&lt;/P&gt;&lt;P&gt;group-policy RemoteAccessVPN attributes&lt;/P&gt;&lt;P&gt; dns-server value 172.16.16.230&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value RemoteAccessVPN_splitTunnelAcl&lt;/P&gt;&lt;P&gt; default-domain value .com&lt;/P&gt;&lt;P&gt;username remote password HP6P1nlQDIJY7Y8G encrypted privilege 0&lt;/P&gt;&lt;P&gt;username remote attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy RemoteAccessVPN&lt;/P&gt;&lt;P&gt;tunnel-group AA.CC.125.146 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group AA.CC.125.146 ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group AA.CC.139.26 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group AA.CC.139.26 ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group AA.CC.56.227 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group AA.CC.56.227 ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group RemoteAccessVPN type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group RemoteAccessVPN general-attributes&lt;/P&gt;&lt;P&gt; address-pool VPNPool&lt;/P&gt;&lt;P&gt; default-group-policy RemoteAccessVPN&lt;/P&gt;&lt;P&gt;tunnel-group RemoteAccessVPN ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map throttle-me&lt;/P&gt;&lt;P&gt; match access-list throttle_edi_servers&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map throttle-policy&lt;/P&gt;&lt;P&gt; class throttle-me&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 524000 4000&lt;/P&gt;&lt;P&gt;&amp;nbsp; police input 524000 4000&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy throttle-policy interface outside&lt;/P&gt;&lt;P&gt;smtp-server 172.16.16.231&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:884757d08c2dab5220a40758f543f8fb&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:48:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-allow-traffic-between-inside-interfaces/m-p/1769962#M493660</guid>
      <dc:creator>sgendron9</dc:creator>
      <dc:date>2019-03-11T21:48:51Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 - allow traffic between inside interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-allow-traffic-between-inside-interfaces/m-p/1769963#M493661</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Would this work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 172.22.1.0 255.255.0.0 172.16.16.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 172.16.16.0 255.255.255.0 172.22.1.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (MCBackendTraffic) 0 access-list nonat&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Nov 2011 15:35:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-allow-traffic-between-inside-interfaces/m-p/1769963#M493661</guid>
      <dc:creator>sgendron9</dc:creator>
      <dc:date>2011-11-10T15:35:42Z</dc:date>
    </item>
  </channel>
</rss>

