<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco IOS Router VS Cisco ASA Firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-ios-router-vs-cisco-asa-firewall/m-p/1569285#M578824</link>
    <description>&lt;P&gt;Hi There&lt;/P&gt;&lt;P&gt;Lately, I was asked to troubleshoot an issue. The network setup is I have Linux workstation that's connected to the INSIDE interface of the Firewall and a Windows workstation that's connected to the OUTSIDE interface of the Firewall. For some reason, the Linux workstation cannot ping the Windows XP workstation but if I were to replace the Firewall with a Cisco Router, everything works fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Linux CentOS workstation&lt;/P&gt;&lt;P&gt;10.10.10.10 /24 (No Default Gateway is defined or static routing defined)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco ASA Firewall&lt;/P&gt;&lt;P&gt;INSIDE : 10.10.10.1/24&lt;/P&gt;&lt;P&gt;OUTSIDE : 20.20.20.1/24&lt;/P&gt;&lt;P&gt;Note : The Firewall is doing Dynamic NAT from source network address 10.10.10.0/24 --&amp;gt; 20.20.20.1, as shown below;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list inside and outside is permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Windows XP workstation&lt;/P&gt;&lt;P&gt;20.20.20.20/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question here is what is so special about a Router that the Firewall is lacking? Is there any command I need to enable on the Firewall? I tried enabling and disabling sysopt noproxyarp inside and sysopt noproxyarp outside, no difference.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please kindly assist.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ram&lt;/P&gt;&lt;P&gt;+6-012-2918870&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 19:17:49 GMT</pubDate>
    <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
    <dc:date>2019-03-11T19:17:49Z</dc:date>
    <item>
      <title>Cisco IOS Router VS Cisco ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-router-vs-cisco-asa-firewall/m-p/1569285#M578824</link>
      <description>&lt;P&gt;Hi There&lt;/P&gt;&lt;P&gt;Lately, I was asked to troubleshoot an issue. The network setup is I have Linux workstation that's connected to the INSIDE interface of the Firewall and a Windows workstation that's connected to the OUTSIDE interface of the Firewall. For some reason, the Linux workstation cannot ping the Windows XP workstation but if I were to replace the Firewall with a Cisco Router, everything works fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Linux CentOS workstation&lt;/P&gt;&lt;P&gt;10.10.10.10 /24 (No Default Gateway is defined or static routing defined)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco ASA Firewall&lt;/P&gt;&lt;P&gt;INSIDE : 10.10.10.1/24&lt;/P&gt;&lt;P&gt;OUTSIDE : 20.20.20.1/24&lt;/P&gt;&lt;P&gt;Note : The Firewall is doing Dynamic NAT from source network address 10.10.10.0/24 --&amp;gt; 20.20.20.1, as shown below;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list inside and outside is permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Windows XP workstation&lt;/P&gt;&lt;P&gt;20.20.20.20/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question here is what is so special about a Router that the Firewall is lacking? Is there any command I need to enable on the Firewall? I tried enabling and disabling sysopt noproxyarp inside and sysopt noproxyarp outside, no difference.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please kindly assist.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ram&lt;/P&gt;&lt;P&gt;+6-012-2918870&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:17:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-router-vs-cisco-asa-firewall/m-p/1569285#M578824</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2019-03-11T19:17:49Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS Router VS Cisco ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-router-vs-cisco-asa-firewall/m-p/1569286#M578825</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am assuming that your NAT statement should read:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(Just double checking to see if you have configured "nat (inside) &lt;STRONG&gt;0&lt;/STRONG&gt; 0.0.0.0 0.0.0.0" or "nat (inside) &lt;STRONG&gt;1&lt;/STRONG&gt; 0.0.0.0 0.0.0.0"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, please enable ICMP inspection on the FW.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Dec 2010 05:35:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-router-vs-cisco-asa-firewall/m-p/1569286#M578825</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-12-03T05:35:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS Router VS Cisco ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-router-vs-cisco-asa-firewall/m-p/1569287#M578826</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also what is the security level assigned to your inside and outside interface of the ASA?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Dec 2010 05:36:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-router-vs-cisco-asa-firewall/m-p/1569287#M578826</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-12-03T05:36:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS Router VS Cisco ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-router-vs-cisco-asa-firewall/m-p/1569288#M578827</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jennifer Halim&lt;/P&gt;&lt;P&gt;Yes, I do have the command &lt;SPAN style="mso-bidi-language: AR-SA; mso-fareast-language: EN-US; : ; mso-bidi-font-family: 'Times New Roman'; sans-serif&amp;quot;: ; mso-ascii-theme-font: minor-latin; ,&amp;quot;: ; color: #000000; font-size: 11pt; mso-hansi-theme-font: minor-latin; mso-ansi-language: EN-US; font-family: &amp;quot; mso-fareast-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-bidi-theme-font: minor-bidi; Calibri&amp;quot;: ; "&gt;nat (inside) 1 0.0.0.0 0.0.0.0, sorry for the typo error. The INSIDE and OUTSIDE security level are the default values i.e. 100 and 0 respectively.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="mso-bidi-language: AR-SA; mso-fareast-language: EN-US; : ; mso-bidi-font-family: 'Times New Roman'; sans-serif&amp;quot;: ; mso-ascii-theme-font: minor-latin; ,&amp;quot;: ; color: #000000; font-size: 11pt; mso-hansi-theme-font: minor-latin; mso-ansi-language: EN-US; font-family: &amp;quot; mso-fareast-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-bidi-theme-font: minor-bidi; Calibri&amp;quot;: ; "&gt;For the Firewall console, I can ping the Linux workstation and Windows XP workstation. This is working fine but from the Linux workstation, I cannot PING the Windows XP workstation. Of course, from the Windows XP workstation, I cannot PING the Linux workstation due to the dynamic NAT. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="mso-bidi-language: AR-SA; mso-fareast-language: EN-US; : ; mso-bidi-font-family: 'Times New Roman'; sans-serif&amp;quot;: ; mso-ascii-theme-font: minor-latin; ,&amp;quot;: ; color: #000000; font-size: 11pt; mso-hansi-theme-font: minor-latin; mso-ansi-language: EN-US; font-family: &amp;quot; mso-fareast-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-bidi-theme-font: minor-bidi; Calibri&amp;quot;: ; "&gt;That means, as far as the Windows XP is concern, the the Linux workstation and the Firewall OUTSIDE interface is the same IP Address i.e. 20.20.20.1. With Router, this is working fine, I'm suprised why with a Firewall, it doesn't.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="mso-bidi-language: AR-SA; mso-fareast-language: EN-US; : ; mso-bidi-font-family: 'Times New Roman'; sans-serif&amp;quot;: ; mso-ascii-theme-font: minor-latin; ,&amp;quot;: ; color: #000000; font-size: 11pt; mso-hansi-theme-font: minor-latin; mso-ansi-language: EN-US; font-family: &amp;quot; mso-fareast-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-bidi-theme-font: minor-bidi; Calibri&amp;quot;: ; "&gt;Note: No personal Firewall is installed on any of those workstations.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Dec 2010 05:40:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-router-vs-cisco-asa-firewall/m-p/1569288#M578827</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2010-12-03T05:40:22Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS Router VS Cisco ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-router-vs-cisco-asa-firewall/m-p/1569289#M578828</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you perform "clear xlate" after configuring the NAT statement?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also please configure the ICMP inspection (assuming that you already have global_policy policy-map applied globally with the service-policy command):&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;policy-map global_policy&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1917574"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt; class inspection_default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect icmp&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Dec 2010 05:44:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-router-vs-cisco-asa-firewall/m-p/1569289#M578828</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-12-03T05:44:34Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS Router VS Cisco ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-router-vs-cisco-asa-firewall/m-p/1569290#M578829</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV class="jive-thread-reply-message"&gt;&lt;!-- [DocumentBodyStart:0f86fac9-8383-4c38-b11b-26e574c9e362] --&gt;&lt;DIV class="jive-rendered-content"&gt;&lt;P&gt;Hi Jennifer Halim&lt;/P&gt;&lt;P&gt;Yes, I did perform "clear xlate" after configuring the NAT statement. However, I'll try out the suggestion as shown below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;SPAN class="content"&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt; class inspection_default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect icmp&lt;/PRE&gt;&lt;/DIV&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just to update, this problem was solved after I added a static route in the Linux workstation to point to 10.10.10.1 for destionation network address 20.20.20.X/24. My question here is when the Linux workstation wants to go to 20.20.20.X/24, without having a static route point to 10.10.10.1, this works fine in a Router but not in a Firewall whereby you need to a static route in the Linux workstation to point to 10.10.10.1 for destionation network address 20.20.20.X/24.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The netstat -rn table in the Linux workstations is&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;20.20.20.0/24 next hop IP is it self IP Address i.e. 10.10.10.10&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Dec 2010 05:49:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-router-vs-cisco-asa-firewall/m-p/1569290#M578829</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2010-12-03T05:49:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS Router VS Cisco ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-router-vs-cisco-asa-firewall/m-p/1569291#M578831</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, you definitely need a route on your Linux host to reach the Windows host as they are not in the same subnet.&lt;/P&gt;&lt;P&gt;You either have default gateway configured, or specific route configured if you don't have default gateway to be able to reach a host who is not in the same subnet.&lt;/P&gt;&lt;P&gt;Router or firewall, both of them are L3 device, and you definitely need correct routing on each hop.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Dec 2010 05:52:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-router-vs-cisco-asa-firewall/m-p/1569291#M578831</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-12-03T05:52:51Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS Router VS Cisco ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-router-vs-cisco-asa-firewall/m-p/1569292#M578833</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jennifer Halim&lt;/P&gt;&lt;P&gt;I agree with your explanation, in fact that's the same thing I told my customer, but he proved me wrong by showing it to me practically. He replaced with a Cisco Router, and all is good. Only with the Firewall this doesn't work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My customer explained to me that when 10.10.10.10 (linux) wants to go to 20.20.20.20, it will send out an ARP broadcast asking who knows how to go to 20.20.20.20. The Router will reply and say that it knows how to go to 20.20.20.20. hence, 10.10.10.10 goes to the Router i.e. 10.10.10.1, gets nat-ted to 20.20.20.1 and talks to 20.20.20.20.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For some reason, the Firewall doesn't accept this behaviour.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That means just because the Linux doesn have a gateway, it uses its' interface to route out all traffic. This is the same concept as in some routers, we can configure ip route 0.0.0.0 0.0.0.0 Serial0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do you think of the situation I have so far? Does it make sense or doesn't?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Dec 2010 06:00:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-router-vs-cisco-asa-firewall/m-p/1569292#M578833</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2010-12-03T06:00:47Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS Router VS Cisco ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-router-vs-cisco-asa-firewall/m-p/1569293#M578834</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Seems like the router might have a bug. That should not be the behaviour of L3 device, and ARP request is not to be broadcast out a L3 interface. ARP broadcast should be contained within L2 broadcast domain.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The firewall definitely does not have that behaviour. You would need to have route to access any L3 subnet hops away. Being a firewall, it has correctly prevent the incorrect behaviour to work. So when the firewall is in place, it actually provides the correct behaviour, ie: it wouldn't resolve the ARP if it's not in the same subnet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Dec 2010 06:39:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-router-vs-cisco-asa-firewall/m-p/1569293#M578834</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-12-03T06:39:24Z</dc:date>
    </item>
  </channel>
</rss>

