<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: multicontext mode shared interfaces in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/multicontext-mode-shared-interfaces/m-p/1532859#M608943</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it actually is entire network... entire network is unable to go through g0/0.10 interface all&lt;/P&gt;&lt;P&gt;traffic is going through Proxy interface...&lt;/P&gt;&lt;P&gt;below is the config of the context.. please note i have removed the global NAT for the test that is was doing....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(1) &lt;CONTEXT&gt;&lt;BR /&gt;!&lt;BR /&gt;hostname Passthrough&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;name 203.194.27.57 Soul-DNS1&lt;BR /&gt;name 10.153.66.150 Soul-DNS1_NAT&lt;BR /&gt;name 203.194.56.150 Soul-DNS2&lt;BR /&gt;name 10.153.66.151 Soul-DNS2_NAT&lt;BR /&gt;name 10.128.0.0 TG-Internal description TG Internal Domain&lt;BR /&gt;name 192.168.66.254 TG-Internal_PAT&lt;BR /&gt;name 10.142.171.20 VSVWIN2008E017 description DC TG.local&lt;BR /&gt;name 192.168.66.100 VSVWIN2008E017_NAT description DC TG.local NAT&lt;BR /&gt;name 10.152.171.20 VSVWIN2008E018 description DC TG.local&lt;BR /&gt;name 192.168.66.101 VSVWIN2008E018_NAT description DC TG.corp NAT&lt;BR /&gt;name 10.142.171.21 VSVWIN2008E019 description DC corp TG.local&lt;BR /&gt;name 192.168.66.102 VSVWIN2008E019_NAT description DC corp.TG.local NAT&lt;BR /&gt;name 10.142.171.22 VSVWIN2008E020 description DC corp.TG.local&lt;BR /&gt;name 192.168.66.103 VSVWIN2008E020_NAT description DC corp.TG.local NAT&lt;BR /&gt;name 10.152.171.21 VSVWIN2008E021 description DC corp.TG.local&lt;BR /&gt;name 192.168.66.104 VSVWIN2008E021_NAT description DC corp.TG.local NAT&lt;BR /&gt;name 192.168.66.120 SRVDWX336X001_NAT description WEB Proxy 1 NAT&lt;BR /&gt;name 192.168.66.121 SRVDWX336X002_NAT description WEB Proxy 2 NAT&lt;BR /&gt;name 144.140.108.23 Telstra&lt;BR /&gt;name 10.153.66.99 Telstra_NAT&lt;BR /&gt;name 10.153.20.120 SRVDWX336X001 description WEB Proxy 1&lt;BR /&gt;name 10.153.20.121 SRVDWX336X002 description WEB Proxy 2&lt;BR /&gt;name 10.142.176.46 VSVWIN2003E069&lt;BR /&gt;name 192.168.66.146 VSVWIN2003E069_NAT&lt;BR /&gt;name 116.193.208.10 KATTRON&lt;BR /&gt;name 10.153.66.110 KATTRON_NAT&lt;BR /&gt;name 10.137.161.131 test1&lt;BR /&gt;name 192.168.66.105 test1_NAT&lt;BR /&gt;name 10.137.161.0 test2&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0.10&lt;BR /&gt;nameif Internal-Passthrough&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.153.10.42 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.66&lt;BR /&gt;nameif DMZ-Passthrough&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 192.168.66.1 255.255.255.0&lt;/CONTEXT&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;BR /&gt;description Special interface for Proxy domain&lt;BR /&gt;nameif Internal-Proxy-Passthrough&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.153.20.42 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt;protocol-object udp&lt;BR /&gt;protocol-object tcp&lt;BR /&gt;object-group network DCs&lt;BR /&gt;description TG DC for DNS access&lt;BR /&gt;network-object host VSVWIN2008E017&lt;BR /&gt;network-object host VSVWIN2008E019&lt;BR /&gt;network-object host VSVWIN2008E020&lt;BR /&gt;network-object host VSVWIN2008E018&lt;BR /&gt;network-object host VSVWIN2008E021&lt;BR /&gt;object-group network Soul-DNS-servers&lt;BR /&gt;description (NAT)&lt;BR /&gt;network-object host Soul-DNS1_NAT&lt;BR /&gt;network-object host Soul-DNS2_NAT&lt;BR /&gt;object-group network WEB-Proxies&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; network-object host SRVDWX336X001&lt;BR /&gt;network-object host SRVDWX336X002&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt;port-object eq www&lt;BR /&gt;port-object eq https&lt;BR /&gt;port-object eq ftp&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;network-object host SRVDWX336X001_NAT&lt;BR /&gt;network-object host SRVDWX336X002_NAT&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt;service-object ip &lt;BR /&gt;service-object tcp eq ftp &lt;BR /&gt;service-object tcp eq www &lt;BR /&gt;access-list Internal-Passthrough_access_in extended permit object-group TCPUDP o&lt;BR /&gt;bject-group DCs object-group Soul-DNS-servers eq domain &lt;BR /&gt;access-list Internal-Passthrough_access_in extended permit tcp host VSVWIN2003E0&lt;BR /&gt;69 host KATTRON_NAT eq 3001 &lt;BR /&gt;access-list Internal-Passthrough_access_in extended permit object-group DM_INLIN&lt;BR /&gt;E_SERVICE_1 host test1 host bentley_NAT log inactive &lt;BR /&gt;access-list DMZ-Passthrough_access_in extended permit icmp any object-group DM_I&lt;BR /&gt;NLINE_NETWORK_1 &lt;BR /&gt;access-list Internal-Proxy-Passthrough_access_in extended permit tcp object-grou&lt;BR /&gt;p WEB-Proxies any object-group DM_INLINE_TCP_1 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging trap informational&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging device-id string SYW-Passthrough&lt;BR /&gt;logging host Internal-Passthrough 10.142.176.32&lt;BR /&gt;mtu Internal-Passthrough 1500&lt;BR /&gt;mtu DMZ-Passthrough 1500&lt;BR /&gt;mtu Internal-Proxy-Passthrough 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any Internal-Passthrough&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;static (DMZ-Passthrough,Internal-Passthrough) Soul-DNS1_NAT Soul-DNS1 netmask 25&lt;BR /&gt;5.255.255.255 &lt;BR /&gt;static (DMZ-Passthrough,Internal-Passthrough) Soul-DNS2_NAT Soul-DNS2 netmask 25&lt;BR /&gt;5.255.255.255 &lt;BR /&gt;static (Internal-Passthrough,DMZ-Passthrough) VSVWIN2008E017_NAT VSVWIN2008E017 &lt;BR /&gt;netmask 255.255.255.255 &lt;BR /&gt;static (Internal-Passthrough,DMZ-Passthrough) VSVWIN2008E018_NAT VSVWIN2008E018 &lt;BR /&gt;netmask 255.255.255.255 &lt;BR /&gt;static (Internal-Passthrough,DMZ-Passthrough) VSVWIN2008E019_NAT VSVWIN2008E019 &lt;BR /&gt;netmask 255.255.255.255 &lt;BR /&gt;static (Internal-Passthrough,DMZ-Passthrough) VSVWIN2008E020_NAT VSVWIN2008E020 &lt;BR /&gt;netmask 255.255.255.255 &lt;BR /&gt;static (Internal-Passthrough,DMZ-Passthrough) VSVWIN2008E021_NAT VSVWIN2008E021 &lt;BR /&gt;netmask 255.255.255.255 &lt;BR /&gt;static (DMZ-Passthrough,Internal-Passthrough) Telstra_NAT Telstra netmask 255.25&lt;BR /&gt;5.255.255 &lt;BR /&gt;static (Internal-Proxy-Passthrough,DMZ-Passthrough) SRVDWX336X001_NAT SRVDWX336X&lt;BR /&gt;001 netmask 255.255.255.255 &lt;BR /&gt;static (Internal-Proxy-Passthrough,DMZ-Passthrough) SRVDWX336X002_NAT SRVDWX336X&lt;BR /&gt;002 netmask 255.255.255.255 &lt;BR /&gt;static (Internal-Passthrough,DMZ-Passthrough) VSVWIN2003E069_NAT VSVWIN2003E069 &lt;BR /&gt;netmask 255.255.255.255 &lt;BR /&gt;static (DMZ-Passthrough,Internal-Passthrough) KATTRON_NAT KATTRON netmask 255.25&lt;BR /&gt;5.255.255 &lt;BR /&gt;access-group Internal-Passthrough_access_in in interface Internal-Passthrough&lt;BR /&gt;access-group DMZ-Passthrough_access_in in interface DMZ-Passthrough&lt;BR /&gt;access-group Internal-Proxy-Passthrough_access_in in interface Internal-Proxy-Pa&lt;BR /&gt;ssthrough&lt;BR /&gt;route DMZ-Passthrough 0.0.0.0 0.0.0.0 192.168.66.19 1&lt;BR /&gt;route Internal-Passthrough TG-Internal 255.128.0.0 10.153.10.1 1&lt;BR /&gt;route Internal-Proxy-Passthrough SRVDWX336X001 255.255.255.255 SRVDWX336X001 1&lt;BR /&gt;route DMZ-Passthrough SRVDWX336X002 255.255.255.255 SRVDWX336X002 1&lt;BR /&gt;route Internal-Proxy-Passthrough 146.178.211.0 255.255.255.0 10.153.20.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 1024&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Cryptochecksum:50f7f89738faadcdfd62c970ecbcf147&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;-------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interface allocation for this particular context&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Passthrough&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; default&amp;nbsp;&amp;nbsp;&amp;nbsp; GigabitEthernet0/0.10, disk0:/passthrough.cfg&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; GigabitEthernet0/1.66,&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; GigabitEthernet0/2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Packet tracer result .... when the actual configuration is applied&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: Internal-Passthrough&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (ifc-classify) Virtual firewall classification failed&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 18 Oct 2010 03:06:53 GMT</pubDate>
    <dc:creator>amar_5664</dc:creator>
    <dc:date>2010-10-18T03:06:53Z</dc:date>
    <item>
      <title>multicontext mode shared interfaces</title>
      <link>https://community.cisco.com/t5/network-security/multicontext-mode-shared-interfaces/m-p/1532857#M608941</link>
      <description>&lt;P&gt;I am running a multicontext mode on my firewalls, have a shared outside interface. having few problems trying to allow a single user access to external network through the firewall....attached is the diagram for how things are connected, this is just for the context that i am having issues....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from port g0/2 i have allowed proxy to any and works fine&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i am trying to allow a specific network from port g0/0.10 to any and having no joy, receive ifc-classify fail error everytime i trace the packet....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have global NAT for g0/0.10 interface NATted to range on g0/1.66&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have enable traffic to flow across same security level interfaces...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;will appreciate any assistance...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;AP&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:55:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multicontext-mode-shared-interfaces/m-p/1532857#M608941</guid>
      <dc:creator>amar_5664</dc:creator>
      <dc:date>2019-03-11T18:55:32Z</dc:date>
    </item>
    <item>
      <title>Re: multicontext mode shared interfaces</title>
      <link>https://community.cisco.com/t5/network-security/multicontext-mode-shared-interfaces/m-p/1532858#M608942</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Amar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope you are doing great is it only one host having the issue? or is it an entire network? Can you paste the packet tracer? The configuration for the system and the context that is having the problem? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Oct 2010 02:21:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multicontext-mode-shared-interfaces/m-p/1532858#M608942</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-10-18T02:21:28Z</dc:date>
    </item>
    <item>
      <title>Re: multicontext mode shared interfaces</title>
      <link>https://community.cisco.com/t5/network-security/multicontext-mode-shared-interfaces/m-p/1532859#M608943</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it actually is entire network... entire network is unable to go through g0/0.10 interface all&lt;/P&gt;&lt;P&gt;traffic is going through Proxy interface...&lt;/P&gt;&lt;P&gt;below is the config of the context.. please note i have removed the global NAT for the test that is was doing....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(1) &lt;CONTEXT&gt;&lt;BR /&gt;!&lt;BR /&gt;hostname Passthrough&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;name 203.194.27.57 Soul-DNS1&lt;BR /&gt;name 10.153.66.150 Soul-DNS1_NAT&lt;BR /&gt;name 203.194.56.150 Soul-DNS2&lt;BR /&gt;name 10.153.66.151 Soul-DNS2_NAT&lt;BR /&gt;name 10.128.0.0 TG-Internal description TG Internal Domain&lt;BR /&gt;name 192.168.66.254 TG-Internal_PAT&lt;BR /&gt;name 10.142.171.20 VSVWIN2008E017 description DC TG.local&lt;BR /&gt;name 192.168.66.100 VSVWIN2008E017_NAT description DC TG.local NAT&lt;BR /&gt;name 10.152.171.20 VSVWIN2008E018 description DC TG.local&lt;BR /&gt;name 192.168.66.101 VSVWIN2008E018_NAT description DC TG.corp NAT&lt;BR /&gt;name 10.142.171.21 VSVWIN2008E019 description DC corp TG.local&lt;BR /&gt;name 192.168.66.102 VSVWIN2008E019_NAT description DC corp.TG.local NAT&lt;BR /&gt;name 10.142.171.22 VSVWIN2008E020 description DC corp.TG.local&lt;BR /&gt;name 192.168.66.103 VSVWIN2008E020_NAT description DC corp.TG.local NAT&lt;BR /&gt;name 10.152.171.21 VSVWIN2008E021 description DC corp.TG.local&lt;BR /&gt;name 192.168.66.104 VSVWIN2008E021_NAT description DC corp.TG.local NAT&lt;BR /&gt;name 192.168.66.120 SRVDWX336X001_NAT description WEB Proxy 1 NAT&lt;BR /&gt;name 192.168.66.121 SRVDWX336X002_NAT description WEB Proxy 2 NAT&lt;BR /&gt;name 144.140.108.23 Telstra&lt;BR /&gt;name 10.153.66.99 Telstra_NAT&lt;BR /&gt;name 10.153.20.120 SRVDWX336X001 description WEB Proxy 1&lt;BR /&gt;name 10.153.20.121 SRVDWX336X002 description WEB Proxy 2&lt;BR /&gt;name 10.142.176.46 VSVWIN2003E069&lt;BR /&gt;name 192.168.66.146 VSVWIN2003E069_NAT&lt;BR /&gt;name 116.193.208.10 KATTRON&lt;BR /&gt;name 10.153.66.110 KATTRON_NAT&lt;BR /&gt;name 10.137.161.131 test1&lt;BR /&gt;name 192.168.66.105 test1_NAT&lt;BR /&gt;name 10.137.161.0 test2&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0.10&lt;BR /&gt;nameif Internal-Passthrough&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.153.10.42 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.66&lt;BR /&gt;nameif DMZ-Passthrough&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 192.168.66.1 255.255.255.0&lt;/CONTEXT&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;BR /&gt;description Special interface for Proxy domain&lt;BR /&gt;nameif Internal-Proxy-Passthrough&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.153.20.42 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt;protocol-object udp&lt;BR /&gt;protocol-object tcp&lt;BR /&gt;object-group network DCs&lt;BR /&gt;description TG DC for DNS access&lt;BR /&gt;network-object host VSVWIN2008E017&lt;BR /&gt;network-object host VSVWIN2008E019&lt;BR /&gt;network-object host VSVWIN2008E020&lt;BR /&gt;network-object host VSVWIN2008E018&lt;BR /&gt;network-object host VSVWIN2008E021&lt;BR /&gt;object-group network Soul-DNS-servers&lt;BR /&gt;description (NAT)&lt;BR /&gt;network-object host Soul-DNS1_NAT&lt;BR /&gt;network-object host Soul-DNS2_NAT&lt;BR /&gt;object-group network WEB-Proxies&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; network-object host SRVDWX336X001&lt;BR /&gt;network-object host SRVDWX336X002&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt;port-object eq www&lt;BR /&gt;port-object eq https&lt;BR /&gt;port-object eq ftp&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;network-object host SRVDWX336X001_NAT&lt;BR /&gt;network-object host SRVDWX336X002_NAT&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt;service-object ip &lt;BR /&gt;service-object tcp eq ftp &lt;BR /&gt;service-object tcp eq www &lt;BR /&gt;access-list Internal-Passthrough_access_in extended permit object-group TCPUDP o&lt;BR /&gt;bject-group DCs object-group Soul-DNS-servers eq domain &lt;BR /&gt;access-list Internal-Passthrough_access_in extended permit tcp host VSVWIN2003E0&lt;BR /&gt;69 host KATTRON_NAT eq 3001 &lt;BR /&gt;access-list Internal-Passthrough_access_in extended permit object-group DM_INLIN&lt;BR /&gt;E_SERVICE_1 host test1 host bentley_NAT log inactive &lt;BR /&gt;access-list DMZ-Passthrough_access_in extended permit icmp any object-group DM_I&lt;BR /&gt;NLINE_NETWORK_1 &lt;BR /&gt;access-list Internal-Proxy-Passthrough_access_in extended permit tcp object-grou&lt;BR /&gt;p WEB-Proxies any object-group DM_INLINE_TCP_1 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging trap informational&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging device-id string SYW-Passthrough&lt;BR /&gt;logging host Internal-Passthrough 10.142.176.32&lt;BR /&gt;mtu Internal-Passthrough 1500&lt;BR /&gt;mtu DMZ-Passthrough 1500&lt;BR /&gt;mtu Internal-Proxy-Passthrough 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any Internal-Passthrough&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;static (DMZ-Passthrough,Internal-Passthrough) Soul-DNS1_NAT Soul-DNS1 netmask 25&lt;BR /&gt;5.255.255.255 &lt;BR /&gt;static (DMZ-Passthrough,Internal-Passthrough) Soul-DNS2_NAT Soul-DNS2 netmask 25&lt;BR /&gt;5.255.255.255 &lt;BR /&gt;static (Internal-Passthrough,DMZ-Passthrough) VSVWIN2008E017_NAT VSVWIN2008E017 &lt;BR /&gt;netmask 255.255.255.255 &lt;BR /&gt;static (Internal-Passthrough,DMZ-Passthrough) VSVWIN2008E018_NAT VSVWIN2008E018 &lt;BR /&gt;netmask 255.255.255.255 &lt;BR /&gt;static (Internal-Passthrough,DMZ-Passthrough) VSVWIN2008E019_NAT VSVWIN2008E019 &lt;BR /&gt;netmask 255.255.255.255 &lt;BR /&gt;static (Internal-Passthrough,DMZ-Passthrough) VSVWIN2008E020_NAT VSVWIN2008E020 &lt;BR /&gt;netmask 255.255.255.255 &lt;BR /&gt;static (Internal-Passthrough,DMZ-Passthrough) VSVWIN2008E021_NAT VSVWIN2008E021 &lt;BR /&gt;netmask 255.255.255.255 &lt;BR /&gt;static (DMZ-Passthrough,Internal-Passthrough) Telstra_NAT Telstra netmask 255.25&lt;BR /&gt;5.255.255 &lt;BR /&gt;static (Internal-Proxy-Passthrough,DMZ-Passthrough) SRVDWX336X001_NAT SRVDWX336X&lt;BR /&gt;001 netmask 255.255.255.255 &lt;BR /&gt;static (Internal-Proxy-Passthrough,DMZ-Passthrough) SRVDWX336X002_NAT SRVDWX336X&lt;BR /&gt;002 netmask 255.255.255.255 &lt;BR /&gt;static (Internal-Passthrough,DMZ-Passthrough) VSVWIN2003E069_NAT VSVWIN2003E069 &lt;BR /&gt;netmask 255.255.255.255 &lt;BR /&gt;static (DMZ-Passthrough,Internal-Passthrough) KATTRON_NAT KATTRON netmask 255.25&lt;BR /&gt;5.255.255 &lt;BR /&gt;access-group Internal-Passthrough_access_in in interface Internal-Passthrough&lt;BR /&gt;access-group DMZ-Passthrough_access_in in interface DMZ-Passthrough&lt;BR /&gt;access-group Internal-Proxy-Passthrough_access_in in interface Internal-Proxy-Pa&lt;BR /&gt;ssthrough&lt;BR /&gt;route DMZ-Passthrough 0.0.0.0 0.0.0.0 192.168.66.19 1&lt;BR /&gt;route Internal-Passthrough TG-Internal 255.128.0.0 10.153.10.1 1&lt;BR /&gt;route Internal-Proxy-Passthrough SRVDWX336X001 255.255.255.255 SRVDWX336X001 1&lt;BR /&gt;route DMZ-Passthrough SRVDWX336X002 255.255.255.255 SRVDWX336X002 1&lt;BR /&gt;route Internal-Proxy-Passthrough 146.178.211.0 255.255.255.0 10.153.20.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 1024&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Cryptochecksum:50f7f89738faadcdfd62c970ecbcf147&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;-------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interface allocation for this particular context&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Passthrough&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; default&amp;nbsp;&amp;nbsp;&amp;nbsp; GigabitEthernet0/0.10, disk0:/passthrough.cfg&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; GigabitEthernet0/1.66,&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; GigabitEthernet0/2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Packet tracer result .... when the actual configuration is applied&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: Internal-Passthrough&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (ifc-classify) Virtual firewall classification failed&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Oct 2010 03:06:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multicontext-mode-shared-interfaces/m-p/1532859#M608943</guid>
      <dc:creator>amar_5664</dc:creator>
      <dc:date>2010-10-18T03:06:53Z</dc:date>
    </item>
    <item>
      <title>Re: multicontext mode shared interfaces</title>
      <link>https://community.cisco.com/t5/network-security/multicontext-mode-shared-interfaces/m-p/1532860#M608944</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Amar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you so much for the reply. This is interesting, I was doing some research regarding this issue. Are you able to pass real traffic? Or have you just use packet tracer to test? Do you have mac-address auto configured? This smells like the following bug:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&amp;amp;bugId=CSCso17884"&gt;http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&amp;amp;bugId=CSCso17884&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But this is cosmetic and does not affect the real traffiric&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would you please confirm?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you ! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Oct 2010 21:30:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multicontext-mode-shared-interfaces/m-p/1532860#M608944</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-10-18T21:30:46Z</dc:date>
    </item>
    <item>
      <title>Re: multicontext mode shared interfaces</title>
      <link>https://community.cisco.com/t5/network-security/multicontext-mode-shared-interfaces/m-p/1532861#M608945</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;no i have not configured mac-add auto for any contexts, all of my internal traffic is forwarded through Proxy interface (g0/2).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;according to my understanding it seems the internal traffic is classified out of g0/2 interface as when there is an outside shared interface the classifier uses dest ip and g0/2 interface has an ACE to allow web proxies to any ...&lt;/P&gt;&lt;P&gt;for internal interface g0/0.10 i tried and created ACE to allow one user access ftp to a particular site and had a static NAT entry for that it worked fine.... but when i allow network/user to any for g0/0.10 interface ifc-classify fails ... firewall is unable to classify internal network for g0/0.10....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it doesnt solve my issue.... my question now is why cant i have an ACE on g0/0.10 and g0/2 to allow any dst&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;g0/0.10&lt;/P&gt;&lt;P&gt;access-list xxxx permit ip 10.137.x.x 0.0.255.255 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;g0/2&lt;/P&gt;&lt;P&gt;access-list xxxx permit ip web-proxies any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when i have above config and packet trace internal network (10.137) from g0/0.10 interface ifc-classify fails while packet trace 10.137 from g0/2 firewall classifies that packet which confuses me as i have a dynamic NAT entry for 10.137 network for g0/0.10 interface.....&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Oct 2010 22:44:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multicontext-mode-shared-interfaces/m-p/1532861#M608945</guid>
      <dc:creator>amar_5664</dc:creator>
      <dc:date>2010-10-18T22:44:10Z</dc:date>
    </item>
  </channel>
</rss>

