<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA- Multi-Context Shared Interface Packet Classifier in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-multi-context-shared-interface-packet-classifier/m-p/1559640#M612249</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;Hi jim,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;There are two ways to set up multiple security contexts:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;Multiple contexts in Routed mode (supports Shared Interface)&lt;BR /&gt;Multiple contexts in Transparent mode (does not support Shared Interface) &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;Each packet that enters the security appliance must be classified, so that the security appliance can determine to which context to send a packet. It is very important in case two security contexts share one physical interface.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL start="1"&gt;&lt;LI&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;&lt;STRONG&gt;&lt;EM&gt;Unique Interfaces&lt;/EM&gt;&lt;/STRONG&gt; &lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;If only one context is associated with the ingress interface, the security appliance classifies the packet into that context. &lt;STRONG&gt;In transparent firewall mode, unique interfaces for contexts are required&lt;/STRONG&gt;, so this method is used to classify packets at all times.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL start="1"&gt;&lt;LI&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;&lt;STRONG&gt;&lt;EM&gt;Unique MAC Addresses&lt;/EM&gt;&lt;/STRONG&gt; &lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;&lt;STRONG&gt;If multiple contexts share an interface, then the classifier uses the interface MAC address.&lt;/STRONG&gt; The security appliance lets you assign a different MAC address in each context to the same shared interface, whether it is a shared physical interface or a shared subinterface. By default, shared interfaces do not have unique MAC addresses; the interface uses the physical interface burned-in MAC address in every context. An upstream router cannot route directly to a context without unique MAC addresses. You can set the MAC addresses manually when you configure each interface, or you can automatically generate MAC addresses using &lt;STRONG&gt;mac-address auto&lt;/STRONG&gt; command.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL start="1"&gt;&lt;LI&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;&lt;STRONG&gt;&lt;EM&gt;NAT Configuration&lt;/EM&gt;&lt;/STRONG&gt; &lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;If you do not have unique MAC addresses, then the classifier intercepts the packet and performs a destination IP address lookup. All other fields are ignored; only the destination IP address is used. To use the destination address for classification, the classifier must have knowledge about the subnets located behind each security context. The classifier relies on the NAT configuration to determine the subnets in each context. The classifier matches the destination IP address to either a &lt;STRONG&gt;static&lt;/STRONG&gt; command or a &lt;STRONG&gt;global&lt;/STRONG&gt; command. In the case of the &lt;STRONG&gt;global&lt;/STRONG&gt; command, the classifier does not need a matching &lt;STRONG&gt;nat&lt;/STRONG&gt; command or an active NAT session to classify the packet. Whether the packet can communicate with the destination IP address after classification depends on how you configure NAT and NAT control.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;If you share an &lt;STRONG&gt;&lt;EM&gt;inside&lt;/EM&gt;&lt;/STRONG&gt; interface and do not use unique MAC addresses, the classifier imposes some major restrictions. The classifier relies on the address translation configuration to classify the packet within a context, and you must translate the destination addresses of the traffic. Because you do not usually perform NAT on outside addresses, sending packets from inside to outside on a shared interface is not always possible; the outside network is large, (the Web, for example), and addresses are not predictable for an outside NAT configuration. &lt;STRONG&gt;If you share an inside interface, I suggest you to use unique MAC addresses.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;&lt;STRONG style=": ; font-family: georgia,palatino; text-decoration: underline; "&gt;Enabling Multiple Context Mode&lt;/STRONG&gt;&lt;/DIV&gt;&lt;P&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;The context mode (single or multiple) is not stored in the configuration file, even though it does endure reboots. If you need to copy your configuration to another device, set the mode on the new device to match using the mode command.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;When you convert from single mode to multiple mode, the security appliance converts the running configuration into two files: a new startup configuration that comprises the system configuration, and &lt;STRONG&gt;&lt;EM style="color: #0000ff; "&gt;admin.cfg&lt;/EM&gt;&lt;/STRONG&gt; that comprises the admin context (in the root directory of the internal Flash memory). The original running configuration is saved as &lt;STRONG&gt;&lt;EM style="color: #339966; "&gt;old_running.cfg&lt;/EM&gt;&lt;/STRONG&gt; (in the root directory of the internal Flash memory). The original startup configuration is not saved. The security appliance automatically adds an entry for the admin context to the system configuration with the name &lt;STRONG&gt;admin&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;To enable multiple mode, enter command &lt;STRONG&gt;mode multiple&lt;/STRONG&gt;. You are prompted to reboot the security appliance.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;&lt;STRONG style=": ; font-family: georgia,palatino; text-decoration: underline; "&gt;VLAN Interfaces&lt;/STRONG&gt;&lt;/DIV&gt;&lt;P&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;For each VLAN to pass traffic, you need to configure an interface name (the &lt;STRONG&gt;nameif&lt;/STRONG&gt; command), and for routed mode, an IP address. You should also change the security level from the default, which is 0. If you name an interface &lt;STRONG&gt;&lt;EM&gt;inside&lt;/EM&gt;&lt;/STRONG&gt; and you do not set the security level explicitly, then the adaptive security appliance sets the security level to 100.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;To configure a VLAN interface, specify the VLAN ID on the subinterface (ex. f0/0.1) using command &lt;STRONG&gt;vlan &lt;EM&gt;number&lt;/EM&gt;&lt;/STRONG&gt;, where the number is between 1 and 1001.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;For further reading in this regard:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://etherealmind.com/cisco-fwsm-configuration-design-trap-advice-help/"&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;http://etherealmind.com/cisco-fwsm-configuration-design-trap-advice-help/&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://learningnetwork.cisco.com/thread/9864"&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;https://learningnetwork.cisco.com/thread/9864&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.ciscopress.com/articles/article.asp?p=426641"&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;http://www.ciscopress.com/articles/article.asp?p=426641&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa71/configuration/guide/contexts.html"&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;http://www.cisco.com/en/US/docs/security/asa/asa71/configuration/guide/contexts.html&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.mail-archive.com/ccie_security@onlinestudylist.com/msg02474.html"&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;http://www.mail-archive.com/ccie_security@onlinestudylist.com/msg02474.html&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Georgia;"&gt;HTH&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Georgia;"&gt;Sachin Garg&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: sachinga.hcl&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 07 Sep 2010 20:16:02 GMT</pubDate>
    <dc:creator>sachinga.hcl</dc:creator>
    <dc:date>2010-09-07T20:16:02Z</dc:date>
    <item>
      <title>ASA- Multi-Context Shared Interface Packet Classifier</title>
      <link>https://community.cisco.com/t5/network-security/asa-multi-context-shared-interface-packet-classifier/m-p/1559639#M612247</link>
      <description>&lt;P&gt;I'm trying to get my head wrapped around the multi-context packet classifier used by the ASA when a shared outside interface is used. Below is what I think I think (props to Peter King at Sports Illustrated); could someone please point out the errors in my understanding?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I've boiled it down to is that the edge router and the ASA are using a shared network on the shared interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When unique MACs ARE allowed (ASA)&lt;/P&gt;&lt;P&gt;1) The router receives a frame destined for a host on that shared network, which is actually an inside global address on the ASA.&lt;/P&gt;&lt;P&gt;2) The router performs the ARP and gets the MAC address for that IP, which is actually the custom MAC, and sends the frame toward the ASA&lt;/P&gt;&lt;P&gt;3) The classifier receives and then passes the frame to the appropriate context based on the MAC address&lt;/P&gt;&lt;P&gt;4) From there the CONTEXT instance references it's NAT config and ACL rules to identify and allow/disallow the traffic to pass into the network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When unique MAC addresses can't be used and we have to classify based on destination IP address (e.g. with the FWSM),&lt;/P&gt;&lt;P&gt;1) The router receives a frame destined for a host on that shared network, which is actually an inside global address on the ASA.&lt;/P&gt;&lt;P&gt;2) The router performs the ARP and gets the MAC address for that IP, which is physical interface BIA, and sends the frame toward the ASA&lt;/P&gt;&lt;P&gt;3) The classifier receives the frame and then has to look at each context's configuration to find a matching static or global command. Once it finds that, it passes the frame/packet to the appropriate context&lt;/P&gt;&lt;P&gt;4) From there the CONTEXT instance references it's NAT config and ACL rules to identify and allow/disallow the traffic to pass into the network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the big difference in the two (mac-address destination versus ip address destination) is that the classifier has to look further into each context configuration to figure out which context gets the packet/frame when a unique MAC can't be used. (additional question : Is it safe to consider the classifier in this case as the admin context or the system space when it's performing this search for a matching NAT statement...is it a system process or a context process?)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jim&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:36:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-multi-context-shared-interface-packet-classifier/m-p/1559639#M612247</guid>
      <dc:creator>riedmueller</dc:creator>
      <dc:date>2019-03-11T18:36:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA- Multi-Context Shared Interface Packet Classifier</title>
      <link>https://community.cisco.com/t5/network-security/asa-multi-context-shared-interface-packet-classifier/m-p/1559640#M612249</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;Hi jim,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;There are two ways to set up multiple security contexts:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;Multiple contexts in Routed mode (supports Shared Interface)&lt;BR /&gt;Multiple contexts in Transparent mode (does not support Shared Interface) &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;Each packet that enters the security appliance must be classified, so that the security appliance can determine to which context to send a packet. It is very important in case two security contexts share one physical interface.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL start="1"&gt;&lt;LI&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;&lt;STRONG&gt;&lt;EM&gt;Unique Interfaces&lt;/EM&gt;&lt;/STRONG&gt; &lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;If only one context is associated with the ingress interface, the security appliance classifies the packet into that context. &lt;STRONG&gt;In transparent firewall mode, unique interfaces for contexts are required&lt;/STRONG&gt;, so this method is used to classify packets at all times.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL start="1"&gt;&lt;LI&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;&lt;STRONG&gt;&lt;EM&gt;Unique MAC Addresses&lt;/EM&gt;&lt;/STRONG&gt; &lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;&lt;STRONG&gt;If multiple contexts share an interface, then the classifier uses the interface MAC address.&lt;/STRONG&gt; The security appliance lets you assign a different MAC address in each context to the same shared interface, whether it is a shared physical interface or a shared subinterface. By default, shared interfaces do not have unique MAC addresses; the interface uses the physical interface burned-in MAC address in every context. An upstream router cannot route directly to a context without unique MAC addresses. You can set the MAC addresses manually when you configure each interface, or you can automatically generate MAC addresses using &lt;STRONG&gt;mac-address auto&lt;/STRONG&gt; command.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL start="1"&gt;&lt;LI&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;&lt;STRONG&gt;&lt;EM&gt;NAT Configuration&lt;/EM&gt;&lt;/STRONG&gt; &lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;If you do not have unique MAC addresses, then the classifier intercepts the packet and performs a destination IP address lookup. All other fields are ignored; only the destination IP address is used. To use the destination address for classification, the classifier must have knowledge about the subnets located behind each security context. The classifier relies on the NAT configuration to determine the subnets in each context. The classifier matches the destination IP address to either a &lt;STRONG&gt;static&lt;/STRONG&gt; command or a &lt;STRONG&gt;global&lt;/STRONG&gt; command. In the case of the &lt;STRONG&gt;global&lt;/STRONG&gt; command, the classifier does not need a matching &lt;STRONG&gt;nat&lt;/STRONG&gt; command or an active NAT session to classify the packet. Whether the packet can communicate with the destination IP address after classification depends on how you configure NAT and NAT control.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;If you share an &lt;STRONG&gt;&lt;EM&gt;inside&lt;/EM&gt;&lt;/STRONG&gt; interface and do not use unique MAC addresses, the classifier imposes some major restrictions. The classifier relies on the address translation configuration to classify the packet within a context, and you must translate the destination addresses of the traffic. Because you do not usually perform NAT on outside addresses, sending packets from inside to outside on a shared interface is not always possible; the outside network is large, (the Web, for example), and addresses are not predictable for an outside NAT configuration. &lt;STRONG&gt;If you share an inside interface, I suggest you to use unique MAC addresses.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;&lt;STRONG style=": ; font-family: georgia,palatino; text-decoration: underline; "&gt;Enabling Multiple Context Mode&lt;/STRONG&gt;&lt;/DIV&gt;&lt;P&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;The context mode (single or multiple) is not stored in the configuration file, even though it does endure reboots. If you need to copy your configuration to another device, set the mode on the new device to match using the mode command.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;When you convert from single mode to multiple mode, the security appliance converts the running configuration into two files: a new startup configuration that comprises the system configuration, and &lt;STRONG&gt;&lt;EM style="color: #0000ff; "&gt;admin.cfg&lt;/EM&gt;&lt;/STRONG&gt; that comprises the admin context (in the root directory of the internal Flash memory). The original running configuration is saved as &lt;STRONG&gt;&lt;EM style="color: #339966; "&gt;old_running.cfg&lt;/EM&gt;&lt;/STRONG&gt; (in the root directory of the internal Flash memory). The original startup configuration is not saved. The security appliance automatically adds an entry for the admin context to the system configuration with the name &lt;STRONG&gt;admin&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;To enable multiple mode, enter command &lt;STRONG&gt;mode multiple&lt;/STRONG&gt;. You are prompted to reboot the security appliance.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;&lt;STRONG style=": ; font-family: georgia,palatino; text-decoration: underline; "&gt;VLAN Interfaces&lt;/STRONG&gt;&lt;/DIV&gt;&lt;P&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;For each VLAN to pass traffic, you need to configure an interface name (the &lt;STRONG&gt;nameif&lt;/STRONG&gt; command), and for routed mode, an IP address. You should also change the security level from the default, which is 0. If you name an interface &lt;STRONG&gt;&lt;EM&gt;inside&lt;/EM&gt;&lt;/STRONG&gt; and you do not set the security level explicitly, then the adaptive security appliance sets the security level to 100.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;To configure a VLAN interface, specify the VLAN ID on the subinterface (ex. f0/0.1) using command &lt;STRONG&gt;vlan &lt;EM&gt;number&lt;/EM&gt;&lt;/STRONG&gt;, where the number is between 1 and 1001.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;For further reading in this regard:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://etherealmind.com/cisco-fwsm-configuration-design-trap-advice-help/"&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;http://etherealmind.com/cisco-fwsm-configuration-design-trap-advice-help/&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://learningnetwork.cisco.com/thread/9864"&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;https://learningnetwork.cisco.com/thread/9864&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.ciscopress.com/articles/article.asp?p=426641"&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;http://www.ciscopress.com/articles/article.asp?p=426641&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa71/configuration/guide/contexts.html"&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;http://www.cisco.com/en/US/docs/security/asa/asa71/configuration/guide/contexts.html&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.mail-archive.com/ccie_security@onlinestudylist.com/msg02474.html"&gt;&lt;SPAN style="font-family: georgia,palatino;"&gt;http://www.mail-archive.com/ccie_security@onlinestudylist.com/msg02474.html&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Georgia;"&gt;HTH&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Georgia;"&gt;Sachin Garg&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: sachinga.hcl&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Sep 2010 20:16:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-multi-context-shared-interface-packet-classifier/m-p/1559640#M612249</guid>
      <dc:creator>sachinga.hcl</dc:creator>
      <dc:date>2010-09-07T20:16:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA- Multi-Context Shared Interface Packet Classifier</title>
      <link>https://community.cisco.com/t5/network-security/asa-multi-context-shared-interface-packet-classifier/m-p/1559641#M612253</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Sep 2010 12:08:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-multi-context-shared-interface-packet-classifier/m-p/1559641#M612253</guid>
      <dc:creator>riedmueller</dc:creator>
      <dc:date>2010-09-08T12:08:39Z</dc:date>
    </item>
    <item>
      <title>I'm in an opposite situation,</title>
      <link>https://community.cisco.com/t5/network-security/asa-multi-context-shared-interface-packet-classifier/m-p/1559642#M612255</link>
      <description>&lt;P&gt;I'm in an opposite situation, where I need to share an "inside" interface on a ASA5520.&lt;/P&gt;&lt;P&gt;Security context 1 + Security Context 2 =&amp;gt; shared interface ge0/0 =&amp;gt; LAN with a bigip cluster using auto-last-hop for retrun traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Obviously I need to set different MAC addresses for each context, and different IP adresses also.&lt;/P&gt;&lt;P&gt;Is it supported to use a shared interface for the inside connection ?&lt;/P&gt;&lt;P&gt;Is my&amp;nbsp; "projected" configuration correct (different MAC and IP @ for each context ??).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Pascal&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2015 09:14:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-multi-context-shared-interface-packet-classifier/m-p/1559642#M612255</guid>
      <dc:creator>pascalfr0</dc:creator>
      <dc:date>2015-08-24T09:14:07Z</dc:date>
    </item>
  </channel>
</rss>

