<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA5510: Traffic between multiple inside interfaces in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5510-traffic-between-multiple-inside-interfaces/m-p/1768311#M495935</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Patrick.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did it in&amp;nbsp; on our ASAs lab, and both of them worked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you checked that both of them have the windows firewall disabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 12 Oct 2011 00:49:31 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2011-10-12T00:49:31Z</dc:date>
    <item>
      <title>ASA5510: Traffic between multiple inside interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-traffic-between-multiple-inside-interfaces/m-p/1768302#M495924</link>
      <description>&lt;P&gt;Howdy Folks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've been trying to figure this one out for quite a while.&amp;nbsp; I currently have 2 inside interfaces (data, phone) and I am moving to 3 inside interfaces (servers, workstations, phones).&amp;nbsp; I have not been able to get any traffic between the interfaces.&amp;nbsp; With the current setup it was not a major problem.&amp;nbsp; With the new setup it will be a major problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe I have over thought the problem and probably done more than is needed.&amp;nbsp; Below is a sanitized version of the config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for any help you can give me.&lt;/P&gt;&lt;P&gt;Pat&lt;/P&gt;&lt;P&gt;---------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;ASA Version 8.2(1) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname BOB&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; description Internet External Network&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.10.10.10 255.255.255.248 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; description Internal Network&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.0.190 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; description T1 Network&lt;/P&gt;&lt;P&gt; nameif Outside-T1&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.11.11.11 255.255.255.248 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; description VOIP Phones&lt;/P&gt;&lt;P&gt; nameif Inside-Phone&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.3.190 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; description Clients &amp;amp; Wireless workstations&lt;/P&gt;&lt;P&gt; nameif Inside1&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.7.190 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns domain-lookup inside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 192.168.0.241&lt;/P&gt;&lt;P&gt; name-server 192.168.0.242&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any 192.168.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.255.0 192.168.3.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.255.0 192.168.7.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Inside-Phone_nat0_outbound extended permit ip any 192.168.3.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Inside-Phone_nat0_outbound extended permit ip 192.168.3.0 255.255.255.0 192.168.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Inside-Phone_nat0_outbound extended permit ip 192.168.3.0 255.255.255.0 192.168.7.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Inside-Phone_nat0_outbound_1 extended permit ip 192.168.0.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list inside1_nat0_outbound extended permit ip any 192.168.7.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside1_nat0_outbound extended permit ip 192.168.7.0 255.255.255.0 192.168.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside1_nat0_outbound extended permit ip 192.168.7.0 255.255.255.0 192.168.3.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface inside&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface Outside-T1&lt;/P&gt;&lt;P&gt;ipv6 access-list inside_access_ipv6_in deny ip any any &lt;/P&gt;&lt;P&gt;ipv6 access-list Inside-Phone_access_ipv6_in deny ip any any &lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any echo-reply outside&lt;/P&gt;&lt;P&gt;icmp permit any echo-reply Outside-T1&lt;/P&gt;&lt;P&gt;asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;global (Outside-T1) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 10 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (Inside-Phone) 0 access-list Inside-Phone_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (Inside-Phone) 1 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (Inside-Phone) 10 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (Inside1) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (Inside1) 1 192.168.7.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (Inside1) 10 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 70.90.54.66 192.168.0.217 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 70.90.54.67 192.168.0.219 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 70.90.54.68 192.168.0.201 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 70.90.54.69 192.168.0.202 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 10.10.10.9 1&lt;/P&gt;&lt;P&gt;route Outside-T1 0.0.0.0 0.0.0.0 10.11.11.9 150&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;priority-queue Outside-T1&lt;/P&gt;&lt;P&gt;&amp;nbsp; queue-limit&amp;nbsp;&amp;nbsp; 2000&lt;/P&gt;&lt;P&gt;&amp;nbsp; tx-ring-limit 200&lt;/P&gt;&lt;P&gt;priority-queue Inside-Phone&lt;/P&gt;&lt;P&gt;&amp;nbsp; queue-limit&amp;nbsp;&amp;nbsp; 2000&lt;/P&gt;&lt;P&gt;&amp;nbsp; tx-ring-limit 200&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns migrated_dns_map_1 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect pptp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;policy-map Outside-T1-VOIP-policy&lt;/P&gt;&lt;P&gt; description Policy for VOIP traffic on Outside-T1 interface&lt;/P&gt;&lt;P&gt; class VOIP&lt;/P&gt;&lt;P&gt;&amp;nbsp; priority&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Patrick O'Malley&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:36:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-traffic-between-multiple-inside-interfaces/m-p/1768302#M495924</guid>
      <dc:creator>PO'Malley</dc:creator>
      <dc:date>2019-03-11T21:36:42Z</dc:date>
    </item>
    <item>
      <title>ASA5510: Traffic between multiple inside interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-traffic-between-multiple-inside-interfaces/m-p/1768303#M495925</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Patrick,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would you mind to provide us the output of the following packet tracers?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input inside tcp 192.168.0.195 1025 192.168.7.197 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input inside1 tcp 192.168.7.197 1025 192.168.0.195 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 17:44:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-traffic-between-multiple-inside-interfaces/m-p/1768303#M495925</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-10-11T17:44:44Z</dc:date>
    </item>
    <item>
      <title>ASA5510: Traffic between multiple inside interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-traffic-between-multiple-inside-interfaces/m-p/1768304#M495926</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Happy to.&lt;/P&gt;&lt;P&gt;------------------------------------------------- &lt;/P&gt;&lt;P&gt;BOB# packet-tracer input inside tcp 192.168.0.195 1025 192.168.7.197 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.7.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; Inside1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp 192.168.0.0 255.255.255.0 any eq www &lt;/P&gt;&lt;P&gt;access-list inside_access_in remark External secure web access allowed&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: VPN&lt;/P&gt;&lt;P&gt;Subtype: ipsec-tunnel-flow&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT-EXEMPT&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside 192.168.0.0 255.255.255.0 Inside1 192.168.7.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAT exempt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT-EXEMPT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside 192.168.0.0 255.255.255.0 Inside1 any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside 192.168.0.0 255.255.255.0 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (70.90.54.65 [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 7768606, untranslate_hits = 334687&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 11&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (Inside1) 1 192.168.7.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip Inside1 192.168.7.0 255.255.255.0 inside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 12&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (Inside1) 1 192.168.7.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip Inside1 192.168.7.0 255.255.255.0 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (70.90.54.65 [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 13&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 14&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 20102140, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BOB# packet-tracer input inside1 tcp 192.168.7.197 1025 192.168.0.195 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT-EXEMPT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT-EXEMPT&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip Inside1 any inside 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAT exempt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1, untranslate_hits = 1&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (Inside1) 1 192.168.7.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip Inside1 192.168.7.0 255.255.255.0 inside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (Inside1) 1 192.168.7.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip Inside1 192.168.7.0 255.255.255.0 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (70.90.54.65 [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside 192.168.0.0 255.255.255.0 Inside1 any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 11&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside 192.168.0.0 255.255.255.0 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (70.90.54.65 [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 7768659, untranslate_hits = 334687&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 12&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 13&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 20102371, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: Inside1&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 18:20:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-traffic-between-multiple-inside-interfaces/m-p/1768304#M495926</guid>
      <dc:creator>PO'Malley</dc:creator>
      <dc:date>2011-10-11T18:20:45Z</dc:date>
    </item>
    <item>
      <title>ASA5510: Traffic between multiple inside interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-traffic-between-multiple-inside-interfaces/m-p/1768305#M495928</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;At thsi stage, I would not rely on packet-tracer, I woudl suggest takeh captures and logs simaltaneously and check where the traffic is getting dropped, and&amp;nbsp; what reason?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Captures:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-17814"&gt;https://supportforums.cisco.com/docs/DOC-17814&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 18:25:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-traffic-between-multiple-inside-interfaces/m-p/1768305#M495928</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-10-11T18:25:22Z</dc:date>
    </item>
    <item>
      <title>ASA5510: Traffic between multiple inside interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-traffic-between-multiple-inside-interfaces/m-p/1768306#M495930</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Patrick,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As we could see on the Packet-tracer output the connections are being accepted by the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now lets do some captures to find out what is happening with this traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets start with an ASP-drop capture&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -capture asp type asp-drop all&lt;/P&gt;&lt;P&gt;-------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then lets do one from the connections being build from one&amp;nbsp; inside host&amp;nbsp; to a inside1 host. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list capin permit ip host 192.168.0.195 host 192.168.7.197 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list capin permit ip host 192.168.7.197 eq&amp;nbsp; host 192.168.0.195&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; capture capin access-list capin interface inside&lt;/P&gt;&lt;P&gt;*********************************************************************&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list capin1 permit ip host 192.168.0.195 host 192.168.7.197&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list capin1 permit ip host 192.168.7.197 host 192.168.0.195&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; capture capin1 access-list capin1 interface inside1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;**********************************************************&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now you can give us the output of the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -Show cap asp | include 192.168.0.195&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -Show cap asp | include 192.168.7.197&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then download the captures capin and capin1 on a pcap file, you will need to be able to access the ASA via Https.&lt;/P&gt;&lt;P&gt;for this go to a browser in a PC located on the inside interface and attached it to this discussion.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; -&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://"&gt;https://&lt;/A&gt;&lt;SPAN&gt; 192.168.0.190/capture/capin/pcap&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://"&gt;https://&lt;/A&gt;&lt;SPAN&gt; 192.168.0.190/capture/capin1/pcap&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 18:43:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-traffic-between-multiple-inside-interfaces/m-p/1768306#M495930</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-10-11T18:43:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510: Traffic between multiple inside interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-traffic-between-multiple-inside-interfaces/m-p/1768307#M495931</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Howdy,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are the results of the Show cap commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BOB# Show cap asp | include 192.168.0.196&lt;/P&gt;&lt;P&gt; 131: 18:03:03.215976 192.168.0.196.138 &amp;gt; 192.168.0.255.138:&amp;nbsp; udp 201&lt;/P&gt;&lt;P&gt; 449: 18:04:18.479848 192.168.0.196.138 &amp;gt; 192.168.0.255.138:&amp;nbsp; udp 214&lt;/P&gt;&lt;P&gt;BOB# Show cap asp | include 192.168.7.197&lt;/P&gt;&lt;P&gt; 408: 18:04:03.354672 192.168.7.197.138 &amp;gt; 192.168.7.255.138:&amp;nbsp; udp 213&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 22:49:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-traffic-between-multiple-inside-interfaces/m-p/1768307#M495931</guid>
      <dc:creator>PO'Malley</dc:creator>
      <dc:date>2011-10-11T22:49:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510: Traffic between multiple inside interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-traffic-between-multiple-inside-interfaces/m-p/1768308#M495932</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Patrick,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you save them on .dat format and send them to us.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I open the file I did not see anything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding the ASP capture we can see that the ASA is not dropping the connections between both interfaces as wee did not see any drops.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 23:39:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-traffic-between-multiple-inside-interfaces/m-p/1768308#M495932</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-10-11T23:39:50Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510: Traffic between multiple inside interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-traffic-between-multiple-inside-interfaces/m-p/1768309#M495933</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Patrick,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did a lab recreation to help you on this and I can tell you that the configuration its fine.&lt;/P&gt;&lt;P&gt;In our lab the connections between these two interfaces were accepted by the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One question, Are you able to ping from&amp;nbsp;&amp;nbsp; to 192.168.0.195 192.168.7.197 and backwards ???&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Oct 2011 00:23:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-traffic-between-multiple-inside-interfaces/m-p/1768309#M495933</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-10-12T00:23:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510: Traffic between multiple inside interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-traffic-between-multiple-inside-interfaces/m-p/1768310#M495934</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;192.168.0.195 to 192.168.7.197 and viceversa works.&amp;nbsp; Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would you try 192.168.0.195 to 192.168.3.197 in the simulator?&amp;nbsp; I still can not ping between them.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Oct 2011 00:40:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-traffic-between-multiple-inside-interfaces/m-p/1768310#M495934</guid>
      <dc:creator>PO'Malley</dc:creator>
      <dc:date>2011-10-12T00:40:15Z</dc:date>
    </item>
    <item>
      <title>ASA5510: Traffic between multiple inside interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-traffic-between-multiple-inside-interfaces/m-p/1768311#M495935</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Patrick.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did it in&amp;nbsp; on our ASAs lab, and both of them worked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you checked that both of them have the windows firewall disabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Oct 2011 00:49:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-traffic-between-multiple-inside-interfaces/m-p/1768311#M495935</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-10-12T00:49:31Z</dc:date>
    </item>
    <item>
      <title>ASA5510: Traffic between multiple inside interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-traffic-between-multiple-inside-interfaces/m-p/1768312#M495936</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;They are all working smoothly now.&amp;nbsp; The 192.168.3.x device was a switch that had the wrong ip address setup on it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you again for all of your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Oct 2011 01:07:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-traffic-between-multiple-inside-interfaces/m-p/1768312#M495936</guid>
      <dc:creator>PO'Malley</dc:creator>
      <dc:date>2011-10-12T01:07:10Z</dc:date>
    </item>
    <item>
      <title>ASA5510: Traffic between multiple inside interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-traffic-between-multiple-inside-interfaces/m-p/1768313#M495937</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Patrick,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good to hear that everything is working fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope you have a great day.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Oct 2011 04:14:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-traffic-between-multiple-inside-interfaces/m-p/1768313#M495937</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-10-12T04:14:09Z</dc:date>
    </item>
  </channel>
</rss>

