<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA intra-interface communication in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470772#M614587</link>
    <description>&lt;P&gt;I have three interfaces configured, outside, inside and dhcp.&amp;nbsp; The IP for the inside is 10.10.220.101 and dhcp is 10.10.230.1, with same−security−traffic permit intra−interface configured but still not able to communicate between interfaces.&amp;nbsp; The error I receive from packet-tracer is (acl-drop) flow is denied by configured rule.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 18:24:48 GMT</pubDate>
    <dc:creator>stephilewis</dc:creator>
    <dc:date>2019-03-11T18:24:48Z</dc:date>
    <item>
      <title>ASA intra-interface communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470772#M614587</link>
      <description>&lt;P&gt;I have three interfaces configured, outside, inside and dhcp.&amp;nbsp; The IP for the inside is 10.10.220.101 and dhcp is 10.10.230.1, with same−security−traffic permit intra−interface configured but still not able to communicate between interfaces.&amp;nbsp; The error I receive from packet-tracer is (acl-drop) flow is denied by configured rule.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:24:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470772#M614587</guid>
      <dc:creator>stephilewis</dc:creator>
      <dc:date>2019-03-11T18:24:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA intra-interface communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470773#M614588</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The flow drop usually means a NAT is missing. You need NAT when you go from a lower security interface to a higher one. The &lt;STRONG&gt;same−security−traffic permit intra−interface&lt;/STRONG&gt; command is used when two interfaces have the same security level. Here's a helpful link.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807fc191.shtml#Same"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807fc191.shtml#Same&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Aug 2010 15:47:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470773#M614588</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2010-08-12T15:47:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA intra-interface communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470774#M614589</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;both interfaces have security level 100&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Aug 2010 15:55:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470774#M614589</guid>
      <dc:creator>stephilewis</dc:creator>
      <dc:date>2010-08-12T15:55:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA intra-interface communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470775#M614590</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What do your logs say?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Aug 2010 16:02:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470775#M614590</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2010-08-12T16:02:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA intra-interface communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470776#M614591</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you will need same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;intra interface is used when the traffic is entering and exiting from the same interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here you have 2 different interfaces so you will need inter interface which mean traffic between same security level but on different interfaces&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;also what code are you running and lastly paste the output of packet tracer if it still doesnt work&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Aug 2010 17:21:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470776#M614591</guid>
      <dc:creator>Jitendriya Athavale</dc:creator>
      <dc:date>2010-08-12T17:21:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA intra-interface communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470777#M614592</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes you are correct I did change from intra to inter, using 7.2.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Aug 2010 18:05:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470777#M614592</guid>
      <dc:creator>stephilewis</dc:creator>
      <dc:date>2010-08-12T18:05:03Z</dc:date>
    </item>
    <item>
      <title>Re: ASA intra-interface communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470778#M614593</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt; &lt;o:DocumentProperties&gt; &lt;o:Template&gt;Normal.dotm&lt;/o:Template&gt; &lt;o:Revision&gt;0&lt;/o:Revision&gt; &lt;o:TotalTime&gt;0&lt;/o:TotalTime&gt; &lt;o:Pages&gt;1&lt;/o:Pages&gt; &lt;o:Words&gt;186&lt;/o:Words&gt; &lt;o:Characters&gt;1065&lt;/o:Characters&gt; &lt;o:Company&gt;Benetech&lt;/o:Company&gt; &lt;o:Lines&gt;8&lt;/o:Lines&gt; &lt;o:Paragraphs&gt;2&lt;/o:Paragraphs&gt; &lt;o:CharactersWithSpaces&gt;1307&lt;/o:CharactersWithSpaces&gt; &lt;o:Version&gt;12.0&lt;/o:Version&gt; &lt;/o:DocumentProperties&gt; &lt;o:OfficeDocumentSettings&gt; &lt;o:AllowPNG&gt;&lt;/o:AllowPNG&gt; &lt;/o:OfficeDocumentSettings&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:12.0pt;
	font-family:"Times New Roman";
	mso-ascii-font-family:Cambria;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"Times New Roman";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Cambria;
	mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt; &lt;!--StartFragment--&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;edge# packet-tracer input inside icmp 10.10.220.101 8 0 10.10.230.101 detailed&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Phase: 1&lt;/P&gt;&lt;P class="MsoNormal"&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P class="MsoNormal"&gt;Subtype:&lt;/P&gt;&lt;P class="MsoNormal"&gt;Result: ALLOW&lt;/P&gt;&lt;P class="MsoNormal"&gt;Config:&lt;/P&gt;&lt;P class="MsoNormal"&gt;Implicit Rule&lt;/P&gt;&lt;P class="MsoNormal"&gt;Additional Information:&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;in&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;id=0x37f0288, priority=1, domain=permit, deny=false&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;hits=2085041387, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;dst mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Phase: 2&lt;/P&gt;&lt;P class="MsoNormal"&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P class="MsoNormal"&gt;Subtype:&lt;/P&gt;&lt;P class="MsoNormal"&gt;Result: ALLOW&lt;/P&gt;&lt;P class="MsoNormal"&gt;Config:&lt;/P&gt;&lt;P class="MsoNormal"&gt;Additional Information:&lt;/P&gt;&lt;P class="MsoNormal"&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Phase: 3&lt;/P&gt;&lt;P class="MsoNormal"&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P class="MsoNormal"&gt;Subtype: input&lt;/P&gt;&lt;P class="MsoNormal"&gt;Result: ALLOW&lt;/P&gt;&lt;P class="MsoNormal"&gt;Config:&lt;/P&gt;&lt;P class="MsoNormal"&gt;Additional Information:&lt;/P&gt;&lt;P class="MsoNormal"&gt;in&lt;SPAN&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;10.10.230.101&lt;SPAN&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;255.255.255.255 identity&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Phase: 4&lt;/P&gt;&lt;P class="MsoNormal"&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P class="MsoNormal"&gt;Subtype:&lt;/P&gt;&lt;P class="MsoNormal"&gt;Result: DROP&lt;/P&gt;&lt;P class="MsoNormal"&gt;Config:&lt;/P&gt;&lt;P class="MsoNormal"&gt;Implicit Rule&lt;/P&gt;&lt;P class="MsoNormal"&gt;Additional Information:&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;in&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;id=0x3802b20, priority=500, domain=permit, deny=true&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;hits=1, user_data=0x6, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;src ip=10.10.220.101, mask=255.255.255.255, port=0&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Result:&lt;/P&gt;&lt;P class="MsoNormal"&gt;input-interface: inside&lt;/P&gt;&lt;P class="MsoNormal"&gt;input-status: up&lt;/P&gt;&lt;P class="MsoNormal"&gt;input-line-status: up&lt;/P&gt;&lt;P class="MsoNormal"&gt;output-interface: NP Identity Ifc&lt;/P&gt;&lt;P class="MsoNormal"&gt;output-status: up&lt;/P&gt;&lt;P class="MsoNormal"&gt;output-line-status: up&lt;/P&gt;&lt;P class="MsoNormal"&gt;Action: drop&lt;/P&gt;&lt;SPAN style="font-size: 12pt; font-family: Cambria;"&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/SPAN&gt;&lt;!--EndFragment--&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Aug 2010 18:29:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470778#M614593</guid>
      <dc:creator>stephilewis</dc:creator>
      <dc:date>2010-08-12T18:29:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA intra-interface communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470779#M614594</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you post the ACL and the access group?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Aug 2010 18:34:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470779#M614594</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2010-08-12T18:34:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA intra-interface communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470780#M614595</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt; &lt;o:DocumentProperties&gt; &lt;o:Template&gt;Normal.dotm&lt;/o:Template&gt; &lt;o:Revision&gt;0&lt;/o:Revision&gt; &lt;o:TotalTime&gt;0&lt;/o:TotalTime&gt; &lt;o:Pages&gt;1&lt;/o:Pages&gt; &lt;o:Words&gt;1310&lt;/o:Words&gt; &lt;o:Characters&gt;7467&lt;/o:Characters&gt; &lt;o:Company&gt;Benetech&lt;/o:Company&gt; &lt;o:Lines&gt;62&lt;/o:Lines&gt; &lt;o:Paragraphs&gt;14&lt;/o:Paragraphs&gt; &lt;o:CharactersWithSpaces&gt;9170&lt;/o:CharactersWithSpaces&gt; &lt;o:Version&gt;12.0&lt;/o:Version&gt; &lt;/o:DocumentProperties&gt; &lt;o:OfficeDocumentSettings&gt; &lt;o:AllowPNG&gt;&lt;/o:AllowPNG&gt; &lt;/o:OfficeDocumentSettings&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:12.0pt;
	font-family:"Times New Roman";
	mso-ascii-font-family:Cambria;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"Times New Roman";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Cambria;
	mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;!--StartFragment--&gt;&lt;P class="MsoNormal"&gt; heres my running&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;edge(config-if)# show run&lt;/P&gt;&lt;P class="MsoNormal"&gt;: Saved&lt;/P&gt;&lt;P class="MsoNormal"&gt;:&lt;/P&gt;&lt;P class="MsoNormal"&gt;ASA Version 7.2(3)&lt;/P&gt;&lt;P class="MsoNormal"&gt;!&lt;/P&gt;&lt;P class="MsoNormal"&gt;hostname edge&lt;/P&gt;&lt;P class="MsoNormal"&gt;domain-name xxxxxx&lt;/P&gt;&lt;P class="MsoNormal"&gt;enable password sh3Lt8bNBi5BmLfG encrypted&lt;/P&gt;&lt;P class="MsoNormal"&gt;names&lt;/P&gt;&lt;P class="MsoNormal"&gt;!&lt;/P&gt;&lt;P class="MsoNormal"&gt;interface Vlan1&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;nameif inside&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;security-level 100&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;ip address 10.10.220.101 255.255.255.0&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;ospf cost 10&lt;/P&gt;&lt;P class="MsoNormal"&gt;!&lt;/P&gt;&lt;P class="MsoNormal"&gt;interface Vlan2&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;nameif outside&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;security-level 0&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;ip address xx.xx.xx.xx 255.255.255.240&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;ospf cost 10&lt;/P&gt;&lt;P class="MsoNormal"&gt;!&lt;/P&gt;&lt;P class="MsoNormal"&gt;interface Vlan4&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;nameif LANDHCP&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;security-level 100&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;ip address 10.10.230.1 255.255.255.0&lt;/P&gt;&lt;P class="MsoNormal"&gt;!&lt;/P&gt;&lt;P class="MsoNormal"&gt;interface Vlan22&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;description LAN Failover Interface&lt;/P&gt;&lt;P class="MsoNormal"&gt;!&lt;/P&gt;&lt;P class="MsoNormal"&gt;interface Ethernet0/0&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;switchport access vlan 2&lt;/P&gt;&lt;P class="MsoNormal"&gt;!&lt;/P&gt;&lt;P class="MsoNormal"&gt;interface Ethernet0/1&lt;/P&gt;&lt;P class="MsoNormal"&gt;!&lt;/P&gt;&lt;P class="MsoNormal"&gt;interface Ethernet0/2&lt;/P&gt;&lt;P class="MsoNormal"&gt;!&lt;/P&gt;&lt;P class="MsoNormal"&gt;interface Ethernet0/3&lt;/P&gt;&lt;P class="MsoNormal"&gt;!&lt;/P&gt;&lt;P class="MsoNormal"&gt;interface Ethernet0/4&lt;/P&gt;&lt;P class="MsoNormal"&gt;!&lt;/P&gt;&lt;P class="MsoNormal"&gt;interface Ethernet0/5&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;switchport access vlan 4&lt;/P&gt;&lt;P class="MsoNormal"&gt;!&lt;/P&gt;&lt;P class="MsoNormal"&gt;interface Ethernet0/6&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;switchport access vlan 3&lt;/P&gt;&lt;P class="MsoNormal"&gt;!&lt;/P&gt;&lt;P class="MsoNormal"&gt;interface Ethernet0/7&lt;/P&gt;&lt;P class="MsoNormal"&gt;!&lt;/P&gt;&lt;P class="MsoNormal"&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P class="MsoNormal"&gt;ftp mode passive&lt;/P&gt;&lt;P class="MsoNormal"&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;domain-name benetech.org&lt;/P&gt;&lt;P class="MsoNormal"&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-list outside_access_in extended permit tcp any host xx.xx.xx.xx&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-list outside_access_in extended permit tcp any host xx.xx.xx.xx&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-list outside_access_in extended permit gre any any&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-list outside_access_in extended permit tcp any interface outside eq smtp log debugging&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-list outside_access_in extended permit tcp any interface outside eq https&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-list outside_access_in extended permit tcp any interface outside eq pptp log warnings&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-list outside_access_in extended permit tcp any interface outside eq 99&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-list outside_access_in extended permit tcp any interface outside eq 722 log&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-list outside_access_in extended permit tcp any interface outside eq 822 log&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-list outside_access_in extended permit tcp any interface outside eq 922 log&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-list outside_access_in extended permit tcp any interface outside eq www inactive&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-list outside_access_in extended permit tcp any interface outside eq ftp&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-list outside_access_in extended permit tcp any interface outside eq ftp-data&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-list outside_access_in extended permit tcp any interface outside eq 622&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-list outside_access_in extended permit icmp any interface outside&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-list LAN_access_in extended permit ip any any&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-list inside_access_out extended deny tcp 10.10.220.128 255.255.255.128 any eq smtp log warnings&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-list inside_access_out extended deny udp any eq 4000 any log warnings&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-list inside_access_out extended permit ip any any&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-list WLAN extended permit ip any any&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-list WLAN_access_in extended permit ip any any&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-list WLAN_access_in extended permit udp any any&lt;/P&gt;&lt;P class="MsoNormal"&gt;pager lines 24&lt;/P&gt;&lt;P class="MsoNormal"&gt;logging enable&lt;/P&gt;&lt;P class="MsoNormal"&gt;logging emblem&lt;/P&gt;&lt;P class="MsoNormal"&gt;logging asdm-buffer-size 512&lt;/P&gt;&lt;P class="MsoNormal"&gt;logging buffered informational&lt;/P&gt;&lt;P class="MsoNormal"&gt;logging trap informational&lt;/P&gt;&lt;P class="MsoNormal"&gt;logging asdm informational&lt;/P&gt;&lt;P class="MsoNormal"&gt;logging mail informational&lt;/P&gt;&lt;P class="MsoNormal"&gt;logging from-address asa5505@xxxx&lt;/P&gt;&lt;P class="MsoNormal"&gt;logging recipient-address xxxx level errors&lt;/P&gt;&lt;P class="MsoNormal"&gt;logging recipient-address xxxx level errors&lt;/P&gt;&lt;P class="MsoNormal"&gt;logging recipient-address xxxx level errors&lt;/P&gt;&lt;P class="MsoNormal"&gt;logging host inside 10.10.220.69 17/1470 format emblem&lt;/P&gt;&lt;P class="MsoNormal"&gt;logging permit-hostdown&lt;/P&gt;&lt;P class="MsoNormal"&gt;mtu inside 1500&lt;/P&gt;&lt;P class="MsoNormal"&gt;mtu outside 1500&lt;/P&gt;&lt;P class="MsoNormal"&gt;mtu LANDHCP 1500&lt;/P&gt;&lt;P class="MsoNormal"&gt;no failover&lt;/P&gt;&lt;P class="MsoNormal"&gt;failover lan unit primary&lt;/P&gt;&lt;P class="MsoNormal"&gt;failover lan interface BFailover Vlan22&lt;/P&gt;&lt;P class="MsoNormal"&gt;failover key *****&lt;/P&gt;&lt;P class="MsoNormal"&gt;failover interface ip BFailover 172.1.1.1 255.255.255.0 standby 172.1.1.2&lt;/P&gt;&lt;P class="MsoNormal"&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P class="MsoNormal"&gt;asdm image disk0:/asdm-523.bin&lt;/P&gt;&lt;P class="MsoNormal"&gt;no asdm history enable&lt;/P&gt;&lt;P class="MsoNormal"&gt;arp timeout 14400&lt;/P&gt;&lt;P class="MsoNormal"&gt;global (inside) 1 interface&lt;/P&gt;&lt;P class="MsoNormal"&gt;global (outside) 1 interface&lt;/P&gt;&lt;P class="MsoNormal"&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P class="MsoNormal"&gt;static (inside,outside) tcp interface 822 10.10.220.21 822 netmask 255.255.255.255&lt;/P&gt;&lt;P class="MsoNormal"&gt;static (inside,outside) tcp interface 722 10.10.220.18 722 netmask 255.255.255.255&lt;/P&gt;&lt;P class="MsoNormal"&gt;static (inside,outside) tcp interface 922 10.10.220.29 922 netmask 255.255.255.255&lt;/P&gt;&lt;P class="MsoNormal"&gt;static (inside,outside) tcp interface www 10.10.220.19 www netmask 255.255.255.255&lt;/P&gt;&lt;P class="MsoNormal"&gt;static (inside,outside) tcp xx.xx.xx.xx ftp-data 10.10.220.67 ftp-data netmask 255.255.255.255&lt;/P&gt;&lt;P class="MsoNormal"&gt;static (inside,outside) tcp interface ftp 10.10.220.67 ftp netmask 255.255.255.255&lt;/P&gt;&lt;P class="MsoNormal"&gt;static (inside,outside) tcp interface 622 10.10.220.21 622 netmask 255.255.255.255&lt;/P&gt;&lt;P class="MsoNormal"&gt;static (inside,outside) tcp interface 99 10.10.220.24 99 netmask 255.255.255.255&lt;/P&gt;&lt;P class="MsoNormal"&gt;static (inside,outside) xx.xx.xx.xx 10.10.220.4 netmask 255.255.255.255&lt;/P&gt;&lt;P class="MsoNormal"&gt;static (inside,outside) xx.xx.xx.xx 10.10.220.23 netmask 255.255.255.255&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-group inside_access_out out interface inside&lt;/P&gt;&lt;P class="MsoNormal"&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P class="MsoNormal"&gt;route outside 0.0.0.0 0.0.0.0 xx.xx.xx.xx 1&lt;/P&gt;&lt;P class="MsoNormal"&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P class="MsoNormal"&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P class="MsoNormal"&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P class="MsoNormal"&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P class="MsoNormal"&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P class="MsoNormal"&gt;http server enable&lt;/P&gt;&lt;P class="MsoNormal"&gt;http 10.10.220.0 255.255.255.0 inside&lt;/P&gt;&lt;P class="MsoNormal"&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P class="MsoNormal"&gt;no snmp-server location&lt;/P&gt;&lt;P class="MsoNormal"&gt;no snmp-server contact&lt;/P&gt;&lt;P class="MsoNormal"&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P class="MsoNormal"&gt;crypto ca trustpoint newbroot&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;crl configure&lt;/P&gt;&lt;P class="MsoNormal"&gt;telnet timeout 5&lt;/P&gt;&lt;P class="MsoNormal"&gt;ssh timeout 5&lt;/P&gt;&lt;P class="MsoNormal"&gt;ssh version 2&lt;/P&gt;&lt;P class="MsoNormal"&gt;console timeout 0&lt;/P&gt;&lt;P class="MsoNormal"&gt;dhcpd dns 10.10.220.23&lt;/P&gt;&lt;P class="MsoNormal"&gt;dhcpd domain benetech.local&lt;/P&gt;&lt;P class="MsoNormal"&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P class="MsoNormal"&gt;dhcpd option 3 ip 172.16.30.100&lt;/P&gt;&lt;P class="MsoNormal"&gt;!&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;!&lt;/P&gt;&lt;P class="MsoNormal"&gt;class-map inspection_default&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;match default-inspection-traffic&lt;/P&gt;&lt;P class="MsoNormal"&gt;class-map pptp-port&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;match port tcp eq pptp&lt;/P&gt;&lt;P class="MsoNormal"&gt;!&lt;/P&gt;&lt;P class="MsoNormal"&gt;!&lt;/P&gt;&lt;P class="MsoNormal"&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;parameters&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;message-length maximum 512&lt;/P&gt;&lt;P class="MsoNormal"&gt;policy-map type inspect dns benetech_dns_map&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;description Remove 512 byte size restriction&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;parameters&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;message-length maximum 1024&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;no protocol-enforcement&lt;/P&gt;&lt;P class="MsoNormal"&gt;policy-map global_policy&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;class inspection_default&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect dns preset_dns_map&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect ftp&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect h323 h225&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect h323 ras&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect rsh&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect rtsp&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;inspect sqlnet&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect skinny&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect sunrpc&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect xdmcp&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect sip&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect netbios&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect tftp&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect pptp&lt;/P&gt;&lt;P class="MsoNormal"&gt;policy-map pptp_policy&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;class pptp-port&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;inspect pptp&lt;/P&gt;&lt;P class="MsoNormal"&gt;!&lt;/P&gt;&lt;P class="MsoNormal"&gt;service-policy global_policy global&lt;/P&gt;&lt;P class="MsoNormal"&gt;service-policy pptp_policy interface outside&lt;/P&gt;&lt;P class="MsoNormal"&gt;ntp server xx.xx.xx.xx source outside&lt;/P&gt;&lt;P class="MsoNormal"&gt;ntp server xx.xx.xx.xx source outside&lt;/P&gt;&lt;P class="MsoNormal"&gt;tftp-server inside 10.10.220.69 asa-5505-primary.conf&lt;/P&gt;&lt;P class="MsoNormal"&gt;webvpn&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;csd image disk0:/securedesktop-asa-3.1.1.29-k9.pkg&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;csd enable&lt;/P&gt;&lt;P class="MsoNormal"&gt;username scott password rj0sFMSN.wCXUz0C encrypted privilege 15&lt;/P&gt;&lt;P class="MsoNormal"&gt;username ryan password esjVcPBkxKv5/kd4 encrypted privilege 15&lt;/P&gt;&lt;P class="MsoNormal"&gt;smtp-server 10.10.220.50 10.10.220.12&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege cmd level 3 mode exec command perfmon&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege cmd level 3 mode exec command ping&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege cmd level 3 mode exec command who&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege cmd level 3 mode exec command logging&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege cmd level 3 mode exec command failover&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 5 mode exec command running-config&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode exec command reload&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode exec command mode&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode exec command firewall&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode exec command interface&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode exec command clock&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode exec command dns-hosts&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode exec command access-list&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode exec command logging&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode exec command ip&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode exec command failover&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode exec command asdm&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode exec command arp&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode exec command route&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode exec command ospf&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode exec command aaa-server&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode exec command aaa&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode exec command crypto&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode exec command vpn-sessiondb&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode exec command ssh&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode exec command dhcpd&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode exec command vpn&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode exec command blocks&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode exec command uauth&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode configure command interface&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode configure command clock&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode configure command access-list&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode configure command logging&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode configure command ip&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode configure command failover&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 5 mode configure command asdm&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode configure command arp&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode configure command route&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode configure command aaa-server&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode configure command aaa&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode configure command crypto&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode configure command ssh&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 3 mode configure command dhcpd&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege show level 5 mode configure command privilege&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege clear level 3 mode exec command dns-hosts&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege clear level 3 mode exec command logging&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege clear level 3 mode exec command arp&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege clear level 3 mode exec command aaa-server&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege clear level 3 mode exec command crypto&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege cmd level 3 mode configure command failover&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege clear level 3 mode configure command logging&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege clear level 3 mode configure command arp&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege clear level 3 mode configure command crypto&lt;/P&gt;&lt;P class="MsoNormal"&gt;privilege clear level 3 mode configure command aaa-server&lt;/P&gt;&lt;P class="MsoNormal"&gt;prompt hostname context&lt;/P&gt;&lt;P class="MsoNormal"&gt;Cryptochecksum:08ce842567f3902a3dd22fe93b0ddc0d&lt;/P&gt;&lt;P class="MsoNormal"&gt;: end&lt;/P&gt;&lt;P class="MsoNormal"&gt;edge(config-if)#&lt;/P&gt;&lt;!--EndFragment--&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Aug 2010 18:58:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470780#M614595</guid>
      <dc:creator>stephilewis</dc:creator>
      <dc:date>2010-08-12T18:58:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASA intra-interface communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470781#M614596</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you create an ACL with permit ip any any and apply it to the dhcp interface? I don't remember if an ACL is needed between same security interfaces. This will just be a quick test.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dhcp_access extended permit ip any any&lt;/P&gt;&lt;P&gt;access-group dhcp_access in interface LANDHCP&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Aug 2010 21:13:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470781#M614596</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2010-08-12T21:13:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASA intra-interface communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470782#M614597</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;what is dhcp_access&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Aug 2010 21:19:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470782#M614597</guid>
      <dc:creator>stephilewis</dc:creator>
      <dc:date>2010-08-12T21:19:44Z</dc:date>
    </item>
    <item>
      <title>Re: ASA intra-interface communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470783#M614598</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I take it you ment landhcp_access&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Aug 2010 21:25:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470783#M614598</guid>
      <dc:creator>stephilewis</dc:creator>
      <dc:date>2010-08-12T21:25:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA intra-interface communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470784#M614599</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can name the access list anything you like, I just named it dhcp_access.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Aug 2010 21:28:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470784#M614599</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2010-08-12T21:28:10Z</dc:date>
    </item>
    <item>
      <title>Re: ASA intra-interface communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470785#M614600</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok i completed the task i am permitting all ip traffic both ways without success, oddly enough from the workstation i cannot ping the gateway which is the landhcp interface.&amp;nbsp; from the console i can ping the landhcp but not past this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Aug 2010 21:32:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470785#M614600</guid>
      <dc:creator>stephilewis</dc:creator>
      <dc:date>2010-08-12T21:32:07Z</dc:date>
    </item>
    <item>
      <title>Re: ASA intra-interface communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470786#M614601</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you run the packet trace with the ACL applied and post the results?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Aug 2010 21:34:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470786#M614601</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2010-08-12T21:34:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA intra-interface communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470787#M614602</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am heading out for the day but will run one tomorrow and post&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Aug 2010 21:46:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470787#M614602</guid>
      <dc:creator>stephilewis</dc:creator>
      <dc:date>2010-08-12T21:46:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA intra-interface communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470788#M614603</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;BR /&gt;edge(config)# packet-tracer input inside icmp 10.10.220.101 8 0 10.10.200.105 $&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 10.10.200.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; LANDHCP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x3802b20, priority=500, domain=permit, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=6, user_data=0x6, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=10.10.220.101, mask=255.255.255.255, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: LANDHCP&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;edge(config)#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0x3802b20, priority=500, domain=permit, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=6, user_data=0x6, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=10.10.220.101, mask=255.255.255.255, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: LANDHCP&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;edge(config)# packet-tracer input inside icmp 10.10.220.101 8 0 10.10.200.1 de$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 10.10.200.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.255 identity&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x3802b20, priority=500, domain=permit, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=7, user_data=0x6, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=10.10.220.101, mask=255.255.255.255, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;edge(config)# packet-tracer input inside icmp 10.10.200.1 8 0 10.10.200.105 de$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 10.10.200.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; LANDHCP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x4273218, priority=2, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=0, user_data=0x0, cs_id=0x0, flags=0x3000, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x37f35b0, priority=0, domain=permit-ip-option, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=37898762, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x37f5180, priority=66, domain=inspect-icmp-error, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=196678, user_data=0x37f50b0, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;&amp;nbsp; match ip inside any LANDHCP any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x42cb620, priority=1, domain=nat, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=0, user_data=0x426a0e8, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: LANDHCP&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Aug 2010 18:06:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470788#M614603</guid>
      <dc:creator>stephilewis</dc:creator>
      <dc:date>2010-08-13T18:06:32Z</dc:date>
    </item>
    <item>
      <title>Re: ASA intra-interface communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470789#M614604</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are missing NAT statements between inside and LANDHP. Please configure&lt;/P&gt;&lt;P&gt;identity NAT between the interfaces:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,LANDHCP) 10.10.220.0 10.10.220.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (LANDHCP,inside) 10.10.230.0 10.10.230.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should allow communication between the inside and LANDHCP interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Aug 2010 19:08:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470789#M614604</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-08-13T19:08:37Z</dc:date>
    </item>
    <item>
      <title>Re: ASA intra-interface communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470790#M614605</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am still getting the following, also I cannot ping from a node on the 10.10.220.0 network to 10.10.200.1 which is the interface on the asa.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input inside icmp 10.10.220.101 8 0 10.10.200.1 de$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: UN-NAT&lt;/P&gt;&lt;P&gt;Subtype: static&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (LANDHCP,inside) 10.10.200.0 10.10.200.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip LANDHCP 10.10.200.0 255.255.255.0 inside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 10.10.200.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 3, untranslate_hits = 34&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;NAT divert to egress interface LANDHCP&lt;/P&gt;&lt;P&gt;Untranslate 10.10.200.0/0 to 10.10.200.0/0 using netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0x3802b20, priority=500, domain=permit, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=10, user_data=0x6, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=10.10.220.101, mask=255.255.255.255, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: LANDHCP&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;edge(config)#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Aug 2010 19:32:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470790#M614605</guid>
      <dc:creator>stephilewis</dc:creator>
      <dc:date>2010-08-13T19:32:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASA intra-interface communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470791#M614606</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First of all, you cannot ping an interface IP from workstations connected to&lt;/P&gt;&lt;P&gt;a different interface. The firewall natively blocks that traffic for&lt;/P&gt;&lt;P&gt;security reasons. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see from your packet tracer that you are trying to ping 10.10.200.1 IP. I&lt;/P&gt;&lt;P&gt;am not seeing that IP in your configuration (may be I am missing something).&lt;/P&gt;&lt;P&gt;Can you please post your current running configuration here?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Aug 2010 19:38:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-communication/m-p/1470791#M614606</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-08-13T19:38:37Z</dc:date>
    </item>
  </channel>
</rss>

