<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA in One-Armed Transparent Mode in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-in-one-armed-transparent-mode/m-p/3907692#M5712</link>
    <description>&lt;P&gt;I forgot to add that there would be 2 physical interfaces connecting the switch to the ASA transparent fw. Both physical ports will be trunks with multiple vlans. Each physical link will have multiple vlans each tied to a different BVI on the ASA. For example we may have vlan 10 on physical port 1 mapped to BVI 1. On physical port 2 we may have vlan 110 also mapped to BVI 1.&amp;nbsp; The traffic would flow through the ASA between vlan 10 and vlan 110. This means that there will be different vlan tags for the BVI 1 traffic on physical port 1 and physical port 2. I'm hoping this doesn't confuse the ASA. This would be similar to what you do with IPS inline vlan pairs.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Would this be supported?&lt;/P&gt;</description>
    <pubDate>Tue, 13 Aug 2019 20:39:43 GMT</pubDate>
    <dc:creator>pacavell</dc:creator>
    <dc:date>2019-08-13T20:39:43Z</dc:date>
    <item>
      <title>ASA in One-Armed Transparent Mode</title>
      <link>https://community.cisco.com/t5/network-security/asa-in-one-armed-transparent-mode/m-p/3907563#M5699</link>
      <description>&lt;P&gt;Can an ASA running later code (ex: 9.6) support running in one-armed transparent mode? Assuming 2 interfaces in a BVI and both physically connecting to the same upstream/downstream switch. This would require the ASA to stitch 2 different vlans on the upstream switch together while they are in the same subnet and BVI on the ASA.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:23:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-in-one-armed-transparent-mode/m-p/3907563#M5699</guid>
      <dc:creator>pacavell</dc:creator>
      <dc:date>2020-02-21T17:23:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA in One-Armed Transparent Mode</title>
      <link>https://community.cisco.com/t5/network-security/asa-in-one-armed-transparent-mode/m-p/3907685#M5708</link>
      <description>&lt;P&gt;I have done that some time ago with my home-office ASA to separate the various DMZs (IoT stuff and such) from the rest of the network. Yes, that works.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2019 20:21:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-in-one-armed-transparent-mode/m-p/3907685#M5708</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2019-08-13T20:21:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA in One-Armed Transparent Mode</title>
      <link>https://community.cisco.com/t5/network-security/asa-in-one-armed-transparent-mode/m-p/3907692#M5712</link>
      <description>&lt;P&gt;I forgot to add that there would be 2 physical interfaces connecting the switch to the ASA transparent fw. Both physical ports will be trunks with multiple vlans. Each physical link will have multiple vlans each tied to a different BVI on the ASA. For example we may have vlan 10 on physical port 1 mapped to BVI 1. On physical port 2 we may have vlan 110 also mapped to BVI 1.&amp;nbsp; The traffic would flow through the ASA between vlan 10 and vlan 110. This means that there will be different vlan tags for the BVI 1 traffic on physical port 1 and physical port 2. I'm hoping this doesn't confuse the ASA. This would be similar to what you do with IPS inline vlan pairs.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Would this be supported?&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2019 20:39:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-in-one-armed-transparent-mode/m-p/3907692#M5712</guid>
      <dc:creator>pacavell</dc:creator>
      <dc:date>2019-08-13T20:39:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA in One-Armed Transparent Mode</title>
      <link>https://community.cisco.com/t5/network-security/asa-in-one-armed-transparent-mode/m-p/3907870#M5717</link>
      <description>&lt;P&gt;I don't remember exactly as this setup is not in place any more. But I had multiple DMZs, so it probably was exactly what you describe.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2019 06:30:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-in-one-armed-transparent-mode/m-p/3907870#M5717</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2019-08-14T06:30:28Z</dc:date>
    </item>
  </channel>
</rss>

