<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA5510: enable communication between two internal networks. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5510-enable-communication-between-two-internal-networks/m-p/1644832#M592355</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Many thanks Praveen, it's working now!!! &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 08 Feb 2011 12:27:17 GMT</pubDate>
    <dc:creator>Lybra1983</dc:creator>
    <dc:date>2011-02-08T12:27:17Z</dc:date>
    <item>
      <title>ASA5510: enable communication between two internal networks.</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-enable-communication-between-two-internal-networks/m-p/1644826#M592346</link>
      <description>&lt;P&gt;Hello everybody,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have on an ASA5510 two internal netoworks (inside and voip) and an outside netowork.&lt;/P&gt;&lt;P&gt;I would like two addresses of the inside network (10.1.1.1 and 10.1.1.2) to be able to access the whole voip network.&lt;/P&gt;&lt;P&gt;I made many trial with static, nat, acl but nothing worked: I actually always make mess with these commands... could you please help me doing this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the interesting part of the conf:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;ASA Version 8.2(2) &lt;BR /&gt;!&lt;BR /&gt;names&lt;BR /&gt;name 10.245.8.0 ZZZ&lt;BR /&gt;name 10.245.4.0 UUU&lt;BR /&gt;name 10.245.0.0 CCC&lt;BR /&gt;name 10.245.255.0 NNN&lt;BR /&gt;name 10.245.16.0 LLL&lt;BR /&gt;name 10.245.12.0 FFF&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address xxx.xxx.xxx.xxx 255.255.255.224 standby xxx.xxx.xxx.xxy &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.1.3.1 255.255.248.0 standby 10.1.3.2 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; nameif voip&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.245.0.1 255.255.255.0 standby 10.245.0.2 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; description LAN Failover Interface&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name bally.ch&lt;BR /&gt;access-list outside_access_in extended permit icmp any any &lt;BR /&gt;access-list outside_access_in extended deny ip any any &lt;BR /&gt;&lt;STRONG&gt;access-list inside_access_in extended permit ip host 10.1.1.1 CCC 255.255.0.0 &lt;BR /&gt;access-list inside_access_in extended permit ip host 10.1.1.2 CCC 255.255.0.0 &lt;/STRONG&gt;&lt;BR /&gt;access-list inside_access_in extended deny ip any any &lt;BR /&gt;access-list voip extended permit ip CCC 255.255.255.0 ZZZ 255.255.255.0 &lt;BR /&gt;access-list voip extended permit ip CCC 255.255.255.0 FFF 255.255.255.0 &lt;BR /&gt;access-list voip extended permit ip CCC 255.255.255.0 UUU 255.255.255.0 &lt;BR /&gt;access-list voip extended permit ip CCC 255.255.255.0 NNN 255.255.255.0 &lt;BR /&gt;access-list voip extended permit ip host 10.245.0.9 any &lt;BR /&gt;access-list voip extended permit ip host 10.245.0.10 any &lt;BR /&gt;access-list voip extended permit icmp any any &lt;BR /&gt;access-list voip extended permit ip host 10.245.0.200 any &lt;BR /&gt;access-list voip extended permit ip CCC 255.255.255.0 LLL 255.255.255.0 &lt;BR /&gt;access-list voip extended permit ip any host 162.23.41.34 &lt;BR /&gt;access-list voip extended permit ip host 10.245.0.100 any &lt;BR /&gt;access-list voip extended permit ip host 10.245.0.101 any &lt;BR /&gt;access-list voip extended permit ip host 10.245.0.102 any &lt;BR /&gt;&lt;STRONG&gt;access-list voip extended permit ip CCC 255.255.0.0 host 10.1.1.1 &lt;BR /&gt;access-list voip extended permit ip CCC 255.255.0.0 host 10.1.1.2 &lt;/STRONG&gt;&lt;BR /&gt;access-list voip extended deny ip any any &lt;BR /&gt;access-list VPN extended permit ip CCC 255.255.255.0 ZZZ 255.255.255.0 &lt;BR /&gt;access-list VPN extended permit ip CCC 255.255.255.0 FFF 255.255.255.0 &lt;BR /&gt;access-list VPN extended permit ip CCC 255.255.255.0 UUU 255.255.255.0 &lt;BR /&gt;access-list VPN extended permit ip CCC 255.255.255.0 NNN 255.255.255.252 &lt;BR /&gt;access-list VPN extended permit ip CCC 255.255.255.0 LLL 255.255.255.0 &lt;BR /&gt;access-list ZZZ-VoIP extended permit ip CCC 255.255.255.0 ZZZ 255.255.255.0 &lt;BR /&gt;access-list FFF-VoIP extended permit ip CCC 255.255.255.0 FFF 255.255.255.0 &lt;BR /&gt;access-list UUU-VoIP extended permit ip CCC 255.255.255.0 UUU 255.255.255.0 &lt;BR /&gt;access-list REM extended permit ip CCC 255.255.255.0 NNN 255.255.255.0 &lt;BR /&gt;access-list LLL-VoIP extended permit ip CCC 255.255.255.0 LLL 255.255.255.0 &lt;BR /&gt;pager lines 24&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu voip 1500&lt;BR /&gt;ip local pool vpnpool1 10.245.255.1-10.245.255.3 mask 255.255.255.0&lt;BR /&gt;failover&lt;BR /&gt;failover lan unit primary&lt;BR /&gt;failover lan interface failover Ethernet0/3&lt;BR /&gt;failover interface ip failover 10.1.254.1 255.255.255.252 standby 10.1.254.2&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-524.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (voip) 0 access-list VPN&lt;BR /&gt;nat (voip) 1 CCC 255.255.255.0&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group voip in interface voip&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 xxx.xxx.xxx.xxp 1&lt;BR /&gt;!&lt;BR /&gt;management-access voip&lt;BR /&gt;!&lt;BR /&gt;dhcpd dns 10.245.0.250&lt;BR /&gt;dhcpd ping_timeout 750&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.245.0.105-10.245.0.110 voip&lt;BR /&gt;dhcpd enable voip&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map LIMIT_BAND&lt;BR /&gt; description Bandwidth Limits on VPNs&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;!&lt;BR /&gt;: end&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks for your help and best regards.&lt;/P&gt;&lt;P&gt;Luca&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:46:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-enable-communication-between-two-internal-networks/m-p/1644826#M592346</guid>
      <dc:creator>Lybra1983</dc:creator>
      <dc:date>2019-03-11T19:46:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510: enable communication between two internal networks.</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-enable-communication-between-two-internal-networks/m-p/1644827#M592347</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Luca,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Considering both "inside" and "voip" are at same security-level (100), no natting is required and only "same-security-traffic perm inter-interface" is required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far as access-list is considered,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On inside:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list inside_access_in extended permit ip host 10.1.1.1 CCC 255.255.0.0 &lt;BR /&gt;access-list inside_access_in extended permit ip host 10.1.1.2 CCC 255.255.0.0 &lt;/STRONG&gt;&lt;BR /&gt;access-list inside_access_in extended deny ip any &lt;STRONG&gt;CCC 255.255.0.0 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list inside_access_in extended permit ipany any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on voip:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list voip extended permit ip CCC 255.255.0.0 host 10.1.1.1 &lt;BR /&gt;access-list voip extended permit ip CCC 255.255.0.0 host 10.1.1.2 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list voip extended deny ip CCC 255.255.0.010.1.0.0 255.255.248.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list voip extended permit ipany any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Praveen&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Feb 2011 09:32:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-enable-communication-between-two-internal-networks/m-p/1644827#M592347</guid>
      <dc:creator>Praveena Shanubhogue</dc:creator>
      <dc:date>2011-02-08T09:32:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510: enable communication between two internal networks.</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-enable-communication-between-two-internal-networks/m-p/1644828#M592348</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Praveen,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've just put the command "same-security-traffic perm inter-interface" but from my pc (10.1.1.2) I cannot ping hosts on voip network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any guess?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Luca&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Feb 2011 09:45:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-enable-communication-between-two-internal-networks/m-p/1644828#M592348</guid>
      <dc:creator>Lybra1983</dc:creator>
      <dc:date>2011-02-08T09:45:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510: enable communication between two internal networks.</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-enable-communication-between-two-internal-networks/m-p/1644829#M592349</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Luca,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even though with "same-security-traffic perm inter-interface" we do not require NAT'ing between interfaces,&lt;/P&gt;&lt;P&gt;1... since we have a generic NAT'ing on the voip interface [ at (voip) 1 CCC 255.255.255.0 ]......&lt;/P&gt;&lt;P&gt;AND&lt;/P&gt;&lt;P&gt;2... We reuire bi-derectional traffic between voip and inside interface......&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cconfigure NAT'exemption on voip-interface:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list nat0_voip extended permit ip CCC 255.255.0.0 host 10.1.1.1 &lt;BR /&gt;access-list nat0_voip extended permit ip CCC 255.255.0.0 host 10.1.1.2 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (voip) 0 access-list nat0_voip&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PS: this is based on the first post. So if the config has changed in the mean time, provide the following:&lt;/P&gt;&lt;P&gt;show run nat&lt;/P&gt;&lt;P&gt;show run global&lt;/P&gt;&lt;P&gt;show run static&lt;/P&gt;&lt;P&gt;show run access-g&lt;/P&gt;&lt;P&gt;show run access-list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Praveen&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Feb 2011 11:00:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-enable-communication-between-two-internal-networks/m-p/1644829#M592349</guid>
      <dc:creator>Praveena Shanubhogue</dc:creator>
      <dc:date>2011-02-08T11:00:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510: enable communication between two internal networks.</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-enable-communication-between-two-internal-networks/m-p/1644830#M592351</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Praveen,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I already have a "&lt;STRONG&gt;nat (voip) 0&lt;/STRONG&gt;" for the VPN, I cannot overwrite it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I've put the following commands:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list nat2_voip extended permit ip CCC 255.255.0.0 host 10.1.1.1&lt;BR /&gt;access-list nat2_voip extended permit ip CCC 255.255.0.0 host 10.1.1.2 &lt;BR /&gt;nat (voip) 2 access-list nat2_voip&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's still not working, but actually I don't know if &lt;STRONG&gt;nat (voip) 2 &lt;/STRONG&gt;is the same as&lt;STRONG&gt; &lt;/STRONG&gt;&lt;STRONG&gt;nat (voip) 0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Luca&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Feb 2011 11:16:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-enable-communication-between-two-internal-networks/m-p/1644830#M592351</guid>
      <dc:creator>Lybra1983</dc:creator>
      <dc:date>2011-02-08T11:16:27Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510: enable communication between two internal networks.</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-enable-communication-between-two-internal-networks/m-p/1644831#M592353</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Luca,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I kind of ignored the existing "nat 0".&amp;nbsp; Please add the following access-list entry for the traffic from voip to&amp;nbsp; inside to get nat-exempted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list VPN extended permit ip CCC 255.255.0.0 host 10.1.1.1 &lt;BR /&gt;access-list VPN extended permit ip CCC 255.255.0.0 host 10.1.1.2 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FYI, "nat (&lt;INTERFACE&gt;) &lt;STRONG&gt;0&lt;/STRONG&gt; access-list &lt;NAME&gt;", here "0" says that the traffic selected by the access-list in the statement needs to be nat-exempted. AND "&lt;STRONG&gt;nat (&lt;INTERFACE&gt;) &lt;NON_ZERO_VALUE&gt; ...&lt;/NON_ZERO_VALUE&gt;&lt;/INTERFACE&gt;&lt;/STRONG&gt;." requires a matching "&lt;STRONG&gt;global (&lt;INTERFACE&gt;) &lt;NON_ZERO_VALUE&gt; ...&lt;/NON_ZERO_VALUE&gt;&lt;/INTERFACE&gt;&lt;/STRONG&gt; "&amp;nbsp; statement.&lt;/NAME&gt;&lt;/INTERFACE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Praveen&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Feb 2011 11:22:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-enable-communication-between-two-internal-networks/m-p/1644831#M592353</guid>
      <dc:creator>Praveena Shanubhogue</dc:creator>
      <dc:date>2011-02-08T11:22:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510: enable communication between two internal networks.</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-enable-communication-between-two-internal-networks/m-p/1644832#M592355</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Many thanks Praveen, it's working now!!! &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Feb 2011 12:27:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-enable-communication-between-two-internal-networks/m-p/1644832#M592355</guid>
      <dc:creator>Lybra1983</dc:creator>
      <dc:date>2011-02-08T12:27:17Z</dc:date>
    </item>
  </channel>
</rss>

