<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA5580 - inside shared interface causing syslog issues in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5580-inside-shared-interface-causing-syslog-issues/m-p/1538925#M588729</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bryce,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately its not quite clear what the problem is. I understand there is an issue with syslogs? A topology will help in better understanding the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 02 Dec 2010 15:02:13 GMT</pubDate>
    <dc:creator>praprama</dc:creator>
    <dc:date>2010-12-02T15:02:13Z</dc:date>
    <item>
      <title>ASA5580 - inside shared interface causing syslog issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5580-inside-shared-interface-causing-syslog-issues/m-p/1538924#M588727</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We have two ASA5580s in HA mode and are having the same issue as reported in June 2009.&amp;nbsp; (Heading - ASA5520 inside shared interface). &lt;/P&gt;&lt;P&gt;Until recently we have been receiving all syslog messages correctly. However now the syslog server is not receiving logs for traffic entering from&lt;/P&gt;&lt;P&gt;other contexts.&lt;/P&gt;&lt;P&gt;The two interfaces external and campus (internal) share the same interfaces.&amp;nbsp; Unique mac-addresses have been assigned automatically as per best&lt;/P&gt;&lt;P&gt;practices.&lt;/P&gt;&lt;P&gt;The configurations are as below:&lt;/P&gt;&lt;P&gt;System context&lt;/P&gt;&lt;P&gt;mac-address auto&lt;BR /&gt;!&lt;BR /&gt;context sys&lt;BR /&gt;&amp;nbsp; allocate-interface Management0/0 mgmtsys &lt;BR /&gt;&amp;nbsp; allocate-interface TenGigabitEthernet7/0 external &lt;BR /&gt;&amp;nbsp; allocate-interface TenGigabitEthernet7/1.2 campus &lt;BR /&gt;&amp;nbsp; allocate-interface TenGigabitEthernet7/1.17 app &lt;BR /&gt;&amp;nbsp; allocate-interface TenGigabitEthernet8/0.18 db &lt;BR /&gt;&amp;nbsp; allocate-interface TenGigabitEthernet8/0.118 keep &lt;BR /&gt;&amp;nbsp; config-url disk0:/sys.cfg&lt;BR /&gt;!&lt;BR /&gt;context assembly&lt;BR /&gt;&amp;nbsp; allocate-interface Management0/0 mgmtass &lt;BR /&gt;&amp;nbsp; allocate-interface TenGigabitEthernet7/0 external &lt;BR /&gt;&amp;nbsp; allocate-interface TenGigabitEthernet7/1.2 campus &lt;BR /&gt;&amp;nbsp; allocate-interface TenGigabitEthernet7/1.19 app &lt;BR /&gt;&amp;nbsp; allocate-interface TenGigabitEthernet8/0.20 db &lt;BR /&gt;&amp;nbsp; allocate-interface TenGigabitEthernet8/0.120 keep &lt;BR /&gt;&amp;nbsp; config-url disk0:/assembly.cfg&lt;BR /&gt;&amp;nbsp; join-failover-group 1&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Syslog Configs&lt;/P&gt;&lt;P&gt;sys context - traffic from sys to assembly&lt;/P&gt;&lt;P&gt;Nov 29 17:28:42 10.91.21.7 %ASA-6-106100: access-list keepin permitted tcp keep/10.91.118.33(48923) -&amp;gt; campus/10.91.20.31(22) hit-cnt 1 300-second&lt;/P&gt;&lt;P&gt;interval [0x1985579a, 0x17098ed8]&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;assembly context&lt;/P&gt;&lt;P&gt;No syslog result is seen coming into assembly however rule works.&amp;nbsp; (We tested by disabling the rule).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to the original answer we have to add a global command to each context but I'm not sure how this is done.&amp;nbsp; I have read the doco but I'm&lt;/P&gt;&lt;P&gt;still not completely sure.&lt;/P&gt;&lt;P&gt;Is the below correct?&lt;/P&gt;&lt;P&gt;sys context&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Existing&lt;/P&gt;&lt;P&gt;interface external&lt;BR /&gt; nameif external&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address x.x.x.x 255.255.255.0 standby y.y.y.y &lt;BR /&gt;!&lt;BR /&gt;interface campus&lt;BR /&gt; nameif campus&lt;BR /&gt; security-level 30&lt;BR /&gt; ip address x.x.x.x 255.255.255.0 standby y.y.y.y &lt;BR /&gt;!&lt;BR /&gt;interface app&lt;BR /&gt; nameif app&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address x.x.x.x 255.255.255.0 standby y.y.y.y &lt;BR /&gt;!&lt;BR /&gt;interface db&amp;nbsp; &lt;BR /&gt; nameif db&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt; security-level 100&lt;BR /&gt; ip address x.x.x.x 255.255.255.0 standby y.y.y.y &lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;interface keep&lt;BR /&gt; nameif keep&amp;nbsp; &lt;BR /&gt; security-level 70&lt;BR /&gt; ip address x.x.x.x 255.255.255.0 standby y.y.y.y &lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;interface mgmtsys&lt;BR /&gt; nameif mgmt&amp;nbsp; &lt;BR /&gt; security-level 100&lt;BR /&gt; ip address x.x.x.x 255.255.255.0 standby y.y.y.y &lt;BR /&gt; management-only&lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;access-list 101 extended permit ip any any (not applied anywhere)&lt;/P&gt;&lt;P&gt;Required&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;global (campus) 1 interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Do we need to add static NATs?&amp;nbsp; Will this not change how the IP addresses are seen elsewhere?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance and hope this all makes sense.&lt;/P&gt;&lt;P&gt;Bryce&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:16:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5580-inside-shared-interface-causing-syslog-issues/m-p/1538924#M588727</guid>
      <dc:creator>boxhallbr</dc:creator>
      <dc:date>2019-03-11T19:16:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5580 - inside shared interface causing syslog issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5580-inside-shared-interface-causing-syslog-issues/m-p/1538925#M588729</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bryce,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately its not quite clear what the problem is. I understand there is an issue with syslogs? A topology will help in better understanding the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Dec 2010 15:02:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5580-inside-shared-interface-causing-syslog-issues/m-p/1538925#M588729</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-12-02T15:02:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5580 - inside shared interface causing syslog issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5580-inside-shared-interface-causing-syslog-issues/m-p/1538926#M588731</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Prapanch,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for not getting back to you earlier.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think our issue is to do with having the same shared inside interface (in this case campus)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I do a packet-tracer command I get the following responses (rules are in and connectivity is working).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;From context sys to context assembly.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;internal-asa-1/act/sys# packet-tracer input keep tcp 10.91.118.33 48552 10.91.20.31 22&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 10.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; campus&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group keepin in interface keep&lt;BR /&gt;access-list keepin extended permit object-group svc-ssh object-group grp-keepdb-syst object-group grp-db2-ass log &lt;BR /&gt;object-group service svc-ssh&lt;BR /&gt; service-object tcp eq ssh &lt;BR /&gt;object-group network grp-keepdb-syst&lt;BR /&gt; network-object host 10.91.118.33&lt;BR /&gt;object-group network grp-db2-ass&lt;BR /&gt; network-object host 10.91.20.31&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: FOVER&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 2887113746, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: keep&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: campus&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Into context assembly from context sys&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;internal-asa-1/act/sys# chan cont ass&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;internal-asa-1/act/assembly# packet-tracer input campus tcp 10.91.118.33 48552 10.91.20.31 22&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: campus&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (ifc-classify) Virtual firewall classification failed&lt;/P&gt;&lt;P&gt;internal-asa-1/act/assembly# &lt;BR /&gt;internal-asa-1/act/assembly# &lt;BR /&gt;internal-asa-1/act/assembly# &lt;BR /&gt;internal-asa-1/act/assembly# exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to Cisco documentation to rectify this we need to add static NATs.&amp;nbsp; But will this not change how the IP addresses are seen elsewhere?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this adds a bit more light into what we are trying to do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bryce.&lt;/P&gt;&lt;P&gt;&lt;!-- [DocumentBodyEnd:875ff0d8-9632-4852-a784-3eb52f674d0b] --&gt;&lt;!-- BEGIN attachments --&gt;&lt;/P&gt;&lt;P&gt;&lt;!-- END attachments --&gt;&lt;!-- END reply --&gt;&lt;/P&gt;&lt;P&gt;&lt;!-- END main body column --&gt;&lt;/P&gt;&lt;P&gt;&lt;!-- END main body --&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Dec 2010 03:08:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5580-inside-shared-interface-causing-syslog-issues/m-p/1538926#M588731</guid>
      <dc:creator>boxhallbr</dc:creator>
      <dc:date>2010-12-08T03:08:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5580 - inside shared interface causing syslog issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5580-inside-shared-interface-causing-syslog-issues/m-p/1538927#M588733</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bryce,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have the &lt;STRONG&gt;mac-address auto&lt;/STRONG&gt; command configured on your ASA? This might help us in our situation. Let me know how it goes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Dec 2010 14:26:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5580-inside-shared-interface-causing-syslog-issues/m-p/1538927#M588733</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-12-10T14:26:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5580 - inside shared interface causing syslog issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5580-inside-shared-interface-causing-syslog-issues/m-p/1538928#M588734</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Prapanch,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mac-address auto is configured on the system context.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 Dec 2010 22:40:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5580-inside-shared-interface-causing-syslog-issues/m-p/1538928#M588734</guid>
      <dc:creator>boxhallbr</dc:creator>
      <dc:date>2010-12-12T22:40:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5580 - inside shared interface causing syslog issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5580-inside-shared-interface-causing-syslog-issues/m-p/1538929#M588737</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bryce,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest opening up a TAC case to take a look into this. Unfortunately, i am still unable to get a clear picture of the topology and live access to the device will certainly help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do let us know how it goes for the benefit of the community!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Dec 2010 15:12:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5580-inside-shared-interface-causing-syslog-issues/m-p/1538929#M588737</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-12-13T15:12:47Z</dc:date>
    </item>
  </channel>
</rss>

