<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5505 Security Plus - interinterface routing in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-security-plus-interinterface-routing/m-p/1556527#M619292</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the quite reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We had it working the way we want.&lt;/P&gt;&lt;P&gt;Below is working configuration for anyone going through the same kind of troubles.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Regards,&lt;/P&gt;&lt;P&gt;JF&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show running-config"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.3(1) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;domain-name default.domain.invalid&lt;BR /&gt;enable password EOaGZ9DJcK985tVO encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.0.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address dhcp setroute &lt;BR /&gt;!&lt;BR /&gt;interface Vlan12&lt;BR /&gt; nameif invite&lt;BR /&gt; security-level 10&lt;BR /&gt; ip address 192.168.12.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan13&lt;BR /&gt; nameif Galerie&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.13.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; switchport access vlan 12&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; switchport access vlan 13&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa831-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name default.domain.invalid&lt;BR /&gt;object network imprimante_1 &lt;BR /&gt; host 192.168.0.206&lt;BR /&gt; description imprimante 1&amp;nbsp;&amp;nbsp; &lt;BR /&gt;object network Acces_internet_anatome &lt;BR /&gt; subnet 192.168.0.0 255.255.255.0&lt;BR /&gt; description acces internet pour anatome&amp;nbsp; &lt;BR /&gt;object network obj_any &lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_invite &lt;BR /&gt; subnet 192.168.12.0 255.255.255.0&lt;BR /&gt;object network obj_galerie &lt;BR /&gt; subnet 192.168.13.0 255.255.255.0&lt;BR /&gt;access-list guest_access_in extended permit ip 192.168.12.0 255.255.255.0 object imprimante_1 &lt;BR /&gt;access-list guest_access_in extended permit ip 192.168.12.0 255.255.255.0 any &lt;BR /&gt;access-list inside_to_ouside extended permit ip any any &lt;BR /&gt;access-list outside_access_in extended permit ip any any inactive &lt;BR /&gt;access-list outside_access_in extended permit icmp any any inactive &lt;BR /&gt;access-list inside_access_in extended permit icmp 192.168.0.0 255.255.255.0 any &lt;BR /&gt;access-list inside_access_in extended permit ip 192.168.0.0 255.255.255.0 any &lt;BR /&gt;access-list Galerie_access_in extended permit ip 192.168.13.0 255.255.255.0 any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu invite 1500&lt;BR /&gt;mtu Galerie 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;icmp permit any invite&lt;BR /&gt;asdm image disk0:/asdm-524.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt;object network obj_invite&lt;BR /&gt; nat (invite,outside) dynamic interface&lt;BR /&gt;object network obj_galerie&lt;BR /&gt; nat (Galerie,outside) dynamic interface&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group guest_access_in in interface invite&lt;BR /&gt;access-group Galerie_access_in in interface Galerie&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication enable console LOCAL &lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;aaa authentication telnet console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.12.0 255.255.255.0 invite&lt;BR /&gt;http 192.168.0.0 255.255.255.0 inside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet 192.168.0.0 255.255.255.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.0.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcp-client client-id interface outside&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.0.33-192.168.0.128 inside&lt;BR /&gt;dhcpd dns 89.2.0.1 89.2.0.2 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.12.100-192.168.12.150 invite&lt;BR /&gt;dhcpd dns 89.2.0.1 89.2.0.2 interface invite&lt;BR /&gt;dhcpd enable invite&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.13.100-192.168.13.150 Galerie&lt;BR /&gt;dhcpd enable Galerie&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;username ***** password ****** encrypted&lt;BR /&gt;username ***** attributes&lt;BR /&gt; service-type nas-prompt&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;call-home&lt;BR /&gt; profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:910861ec3fae1dcc829a0b3e6424ffb1&lt;BR /&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 01 Nov 2010 15:45:41 GMT</pubDate>
    <dc:creator>jfendrody</dc:creator>
    <dc:date>2010-11-01T15:45:41Z</dc:date>
    <item>
      <title>ASA 5505 Security Plus - interinterface routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-security-plus-interinterface-routing/m-p/1556523#M619288</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am stuck with a routing problem on a ASA 5505 Security Plus firewall.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I have two inside networks. One for guests, one for employees. I need guests to be able to print on printers located on the employee (inside) network.&lt;/P&gt;&lt;P&gt;Of course, I do not want guests to access any other resources on the inside network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried to configure objects to allow routing between interfaces and allow printer access unfortunately with no luck so far.&lt;/P&gt;&lt;P&gt;Actually, I can't even ping the inside interface of firewall from the guest network ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any leads on how to proceed would be most welcome.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;JF&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; text-decoration: underline; "&gt;&lt;STRONG&gt;Technical informations &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Firewall firmware :&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 8.3(1)&lt;BR /&gt;Device Manager Version 6.3(1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Interface configuration :&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.0.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address dhcp setroute&lt;BR /&gt;!&lt;BR /&gt;interface Vlan12&lt;BR /&gt; nameif guests&lt;BR /&gt; security-level 10&lt;BR /&gt; ip address 192.168.12.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Last (unsucessful) configuration :&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list guests_access_in extended permit ip any any&lt;BR /&gt; access-group guests_access_in in interface guests&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,guests) 192.168.0.26 192.168.0.26 netmask 255.255.255.255&lt;BR /&gt; static (guests,inside) 192.168.12.0 192.168.12.0 netmask 255.255.255.0&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:02:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-security-plus-interinterface-routing/m-p/1556523#M619288</guid>
      <dc:creator>jfendrody</dc:creator>
      <dc:date>2019-03-11T19:02:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Security Plus - interinterface routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-security-plus-interinterface-routing/m-p/1556524#M619289</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My name is Mike, I am going to try to help you out over here. Basically what you need to do is to translate (NAT) the higher security level (In order to have control for this). Your version is 8.3 so the static commands that you are using are not going to work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what&amp;nbsp; you do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Object network Printer&lt;/P&gt;&lt;P&gt;&amp;nbsp; host &lt;PRINTER_IP&gt;&lt;/PRINTER_IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,guest) source static Printer Printer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you will need the ACL on the guest interface (the one that you have works fine)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list guests_access_in extended permit ip any any&lt;BR /&gt; access-group guests_access_in in interface guests&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this does not work, please feel free to use the following command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input guest tcp 192.168.12.13 1025 192.168.0.2 40&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once we have traffic flowing we can restrict the traffic to the printer ports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Nov 2010 00:09:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-security-plus-interinterface-routing/m-p/1556524#M619289</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-11-01T00:09:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Security Plus - interinterface routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-security-plus-interinterface-routing/m-p/1556525#M619290</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the support. It really helps !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks to the information provided, we can now connect to the printer but unfortunately we can access the whole inside network.&lt;/P&gt;&lt;P&gt;I suspect we can fix this by replacing "any" by the printer IP in line "access-list guests_access_in extended permit ip any any"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, there is something much more surprising to me. Adding or removing the NAT rule makes no difference, I can still access the whole inside network from the guest network. Did I miss something ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if you need additional information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;JF&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;New Configuration details :&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.3(1)&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;domain-name default.domain.invalid&lt;BR /&gt;enable password gh70cYLmUMHW473x encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.0.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address dhcp setroute&lt;BR /&gt;!&lt;BR /&gt;interface Vlan12&lt;BR /&gt; nameif guest&lt;BR /&gt; security-level 10&lt;BR /&gt; ip address 192.168.12.1 255.255.255.0&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan13&lt;BR /&gt; nameif Galerie&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.13.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; switchport access vlan 12&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; switchport access vlan 13&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;boot system disk0:/asa831-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name default.domain.invalid&lt;BR /&gt;object network Printer_1&lt;BR /&gt; host 192.168.0.206&lt;BR /&gt; description Printer1&lt;BR /&gt;access-list guest_access_in extended permit ip any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu invite 1500&lt;BR /&gt;mtu Galerie 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;icmp permit any invite&lt;BR /&gt;asdm image disk0:/asdm-524.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (inside,invite) source static Printer_1 Printer_1&lt;BR /&gt;access-group guest_access_in in interface guest&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication enable console LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication telnet console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.12.0 255.255.255.0 guest&lt;BR /&gt;http 192.168.0.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet 192.168.0.0 255.255.255.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.0.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.0.33-192.168.0.128 inside&lt;/P&gt;&lt;P&gt;dhcpd dns 89.2.0.1 89.2.0.2 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.12.100-192.168.12.150 guest&lt;BR /&gt;dhcpd enable invite&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.13.100-192.168.13.150 Galerie&lt;BR /&gt;dhcpd enable Galerie&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;username ***** password ***** encrypted&lt;BR /&gt;username ***** attributes&lt;BR /&gt; service-type nas-prompt&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;prompt hostname context&lt;BR /&gt;call-home&lt;BR /&gt; profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:15e997e61f80fc8a69874cfc08d985b1&lt;BR /&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Nov 2010 13:48:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-security-plus-interinterface-routing/m-p/1556525#M619290</guid>
      <dc:creator>jfendrody</dc:creator>
      <dc:date>2010-11-01T13:48:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Security Plus - interinterface routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-security-plus-interinterface-routing/m-p/1556526#M619291</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jean,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is true, it is because 8.3 does not have Nat-control anymore, so it is not necessary to have the traffic being natted. You are completely right. The ACL permit ip any any is the one that is giving you access to the entire internal network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you rightly pointed, you can change the permit ip any any for the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list guests_access_in extended permit ip any &lt;PRINTER_IP&gt;&lt;/PRINTER_IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and then remove the line that you have&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no access-list guests_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Nov 2010 14:00:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-security-plus-interinterface-routing/m-p/1556526#M619291</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-11-01T14:00:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Security Plus - interinterface routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-security-plus-interinterface-routing/m-p/1556527#M619292</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the quite reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We had it working the way we want.&lt;/P&gt;&lt;P&gt;Below is working configuration for anyone going through the same kind of troubles.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Regards,&lt;/P&gt;&lt;P&gt;JF&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show running-config"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.3(1) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;domain-name default.domain.invalid&lt;BR /&gt;enable password EOaGZ9DJcK985tVO encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.0.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address dhcp setroute &lt;BR /&gt;!&lt;BR /&gt;interface Vlan12&lt;BR /&gt; nameif invite&lt;BR /&gt; security-level 10&lt;BR /&gt; ip address 192.168.12.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan13&lt;BR /&gt; nameif Galerie&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.13.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; switchport access vlan 12&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; switchport access vlan 13&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa831-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name default.domain.invalid&lt;BR /&gt;object network imprimante_1 &lt;BR /&gt; host 192.168.0.206&lt;BR /&gt; description imprimante 1&amp;nbsp;&amp;nbsp; &lt;BR /&gt;object network Acces_internet_anatome &lt;BR /&gt; subnet 192.168.0.0 255.255.255.0&lt;BR /&gt; description acces internet pour anatome&amp;nbsp; &lt;BR /&gt;object network obj_any &lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_invite &lt;BR /&gt; subnet 192.168.12.0 255.255.255.0&lt;BR /&gt;object network obj_galerie &lt;BR /&gt; subnet 192.168.13.0 255.255.255.0&lt;BR /&gt;access-list guest_access_in extended permit ip 192.168.12.0 255.255.255.0 object imprimante_1 &lt;BR /&gt;access-list guest_access_in extended permit ip 192.168.12.0 255.255.255.0 any &lt;BR /&gt;access-list inside_to_ouside extended permit ip any any &lt;BR /&gt;access-list outside_access_in extended permit ip any any inactive &lt;BR /&gt;access-list outside_access_in extended permit icmp any any inactive &lt;BR /&gt;access-list inside_access_in extended permit icmp 192.168.0.0 255.255.255.0 any &lt;BR /&gt;access-list inside_access_in extended permit ip 192.168.0.0 255.255.255.0 any &lt;BR /&gt;access-list Galerie_access_in extended permit ip 192.168.13.0 255.255.255.0 any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu invite 1500&lt;BR /&gt;mtu Galerie 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;icmp permit any invite&lt;BR /&gt;asdm image disk0:/asdm-524.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt;object network obj_invite&lt;BR /&gt; nat (invite,outside) dynamic interface&lt;BR /&gt;object network obj_galerie&lt;BR /&gt; nat (Galerie,outside) dynamic interface&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group guest_access_in in interface invite&lt;BR /&gt;access-group Galerie_access_in in interface Galerie&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication enable console LOCAL &lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;aaa authentication telnet console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.12.0 255.255.255.0 invite&lt;BR /&gt;http 192.168.0.0 255.255.255.0 inside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet 192.168.0.0 255.255.255.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.0.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcp-client client-id interface outside&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.0.33-192.168.0.128 inside&lt;BR /&gt;dhcpd dns 89.2.0.1 89.2.0.2 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.12.100-192.168.12.150 invite&lt;BR /&gt;dhcpd dns 89.2.0.1 89.2.0.2 interface invite&lt;BR /&gt;dhcpd enable invite&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.13.100-192.168.13.150 Galerie&lt;BR /&gt;dhcpd enable Galerie&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;username ***** password ****** encrypted&lt;BR /&gt;username ***** attributes&lt;BR /&gt; service-type nas-prompt&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;call-home&lt;BR /&gt; profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:910861ec3fae1dcc829a0b3e6424ffb1&lt;BR /&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Nov 2010 15:45:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-security-plus-interinterface-routing/m-p/1556527#M619292</guid>
      <dc:creator>jfendrody</dc:creator>
      <dc:date>2010-11-01T15:45:41Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Security Plus - interinterface routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-security-plus-interinterface-routing/m-p/1556528#M619293</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Excellent, would you please mark this question as resolve so other people can take it as reference?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Nov 2010 16:05:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-security-plus-interinterface-routing/m-p/1556528#M619293</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-11-01T16:05:35Z</dc:date>
    </item>
  </channel>
</rss>

