<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic interface communication issues in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/interface-communication-issues/m-p/1570440#M675349</link>
    <description>&lt;P&gt;I'm still having trouble getting communication between all of my interfaces.&amp;nbsp; With help from this forum, I was able to connect out to the internet and from that I learned how to replicate taht to the third interface.&amp;nbsp; However, I still have not been able to establish bi-directional connectivity.&amp;nbsp; I started all over again, and started working with just the connectivity between the inside interface and the DMZ interface.&amp;nbsp; I am completely unable to ping from the DMZ into the internal interface.&amp;nbsp; I set all the security levels the same, allowed everything in the access lists and still nothing.&amp;nbsp; I've tried dynamic nat rules using PAT, and nothing.&amp;nbsp; The same set up works fine to go the other way, from internal to DMZ, but not vice versa.&amp;nbsp; Static bidirectional NATs have the same problem....they will work one way to ping from inside out, but not back. &lt;/P&gt;&lt;P&gt;I've allowed ICMP through all the interfaces through the command line (which seemed to delte all the other access rules I had in place)&lt;/P&gt;&lt;P&gt;Anyone have any ideas what else I can try?&amp;nbsp; I've tried different switches, and even gone so far as to change around the interface setup, but to no avail.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 18:53:34 GMT</pubDate>
    <dc:creator>heather.burke</dc:creator>
    <dc:date>2019-03-11T18:53:34Z</dc:date>
    <item>
      <title>interface communication issues</title>
      <link>https://community.cisco.com/t5/network-security/interface-communication-issues/m-p/1570440#M675349</link>
      <description>&lt;P&gt;I'm still having trouble getting communication between all of my interfaces.&amp;nbsp; With help from this forum, I was able to connect out to the internet and from that I learned how to replicate taht to the third interface.&amp;nbsp; However, I still have not been able to establish bi-directional connectivity.&amp;nbsp; I started all over again, and started working with just the connectivity between the inside interface and the DMZ interface.&amp;nbsp; I am completely unable to ping from the DMZ into the internal interface.&amp;nbsp; I set all the security levels the same, allowed everything in the access lists and still nothing.&amp;nbsp; I've tried dynamic nat rules using PAT, and nothing.&amp;nbsp; The same set up works fine to go the other way, from internal to DMZ, but not vice versa.&amp;nbsp; Static bidirectional NATs have the same problem....they will work one way to ping from inside out, but not back. &lt;/P&gt;&lt;P&gt;I've allowed ICMP through all the interfaces through the command line (which seemed to delte all the other access rules I had in place)&lt;/P&gt;&lt;P&gt;Anyone have any ideas what else I can try?&amp;nbsp; I've tried different switches, and even gone so far as to change around the interface setup, but to no avail.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:53:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/interface-communication-issues/m-p/1570440#M675349</guid>
      <dc:creator>heather.burke</dc:creator>
      <dc:date>2019-03-11T18:53:34Z</dc:date>
    </item>
    <item>
      <title>Re: interface communication issues</title>
      <link>https://community.cisco.com/t5/network-security/interface-communication-issues/m-p/1570441#M675354</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Heather,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Post the config, we'll have a look &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Btw if you interfaces share same surity level just remember to add "same-security permit inter" command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Marcin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Oct 2010 22:25:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/interface-communication-issues/m-p/1570441#M675354</guid>
      <dc:creator>Marcin Latosiewicz</dc:creator>
      <dc:date>2010-10-12T22:25:50Z</dc:date>
    </item>
    <item>
      <title>Re: interface communication issues</title>
      <link>https://community.cisco.com/t5/network-security/interface-communication-issues/m-p/1570442#M675355</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry for the delay.&amp;nbsp; Here is the config (in its recent incarnation, anyway):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; description EXTERNAL&lt;BR /&gt; nameif OUTSIDE&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 10.10.204.99 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; description INTERNAL INTERFACE&lt;BR /&gt; nameif INSIDE&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.2.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; description DMZ INTERFACE&lt;BR /&gt; nameif DMZ&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 172.20.204.99 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; description LAN/STATE Failover Interface&lt;BR /&gt; management-only&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 99&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt; management-only&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;access-list INSIDE_access_in extended permit tcp any any eq www inactive &lt;BR /&gt;access-list INSIDE_access_in extended permit object-group ALLSERVICES 10.10.204.0 255.255.255.0 object 172.20.204.0 &lt;BR /&gt;access-list INSIDE_access_in extended permit udp any any eq domain &lt;BR /&gt;access-list INSIDE_access_in remark ALLOWS ANY INTERNAL HOST TO CONNECT TO INTERNET&lt;BR /&gt;access-list INSIDE_access_in extended permit object-group WebServicePlus 192.168.204.0 255.255.255.0 any &lt;BR /&gt;access-list INSIDE_access_in remark ALLOW ADMINS TO PING, TRACEROUTE, ETC.&amp;nbsp; TO ANY DESTINATION.&lt;BR /&gt;access-list INSIDE_access_in extended permit icmp object-group Admins any &lt;BR /&gt;access-list INSIDE_access_in remark ALLOW INSIDE HOSTS TO ACCESS TRD - HELPSTAR USING SEVERAL SERVICES.&lt;BR /&gt;access-list INSIDE_access_in extended permit object-group HELPSTARGROUP 192.168.204.0 255.255.255.0 object HELPSTAR &lt;BR /&gt;access-list INSIDE_access_in extended permit object-group ALLSERVICES object-group Admins interface management &lt;BR /&gt;access-list INSIDE_access_in remark test rule for web connectivity.&lt;BR /&gt;access-list INSIDE_access_in extended permit object-group WebServicePlus 192.168.2.0 255.255.255.0 any &lt;BR /&gt;access-list INSIDE_access_in remark ALLOWS SMTP OUT&lt;BR /&gt;access-list INSIDE_access_in extended permit object-group MailServices object obj-192.168.204.0 any &lt;BR /&gt;access-list INSIDE_access_in extended permit object-group ALLSERVICES any 172.20.204.0 255.255.255.0 &lt;BR /&gt;access-list INSIDE_access_in extended permit object-group ALLSERVICES any interface DMZ &lt;BR /&gt;access-list INSIDE_access_in extended permit object-group DMZSQLSERVICES 192.168.204.0 255.255.255.0 172.20.204.0 255.255.255.0 &lt;BR /&gt;access-list INSIDE_access_in extended permit object-group ALLSERVICES any any &lt;BR /&gt;access-list OUTSIDE_access_in_1 extended permit object-group HTTPHTTPS 10.10.204.0 255.255.255.0 any &lt;BR /&gt;access-list OUTSIDE_access_in_1 remark ALLOW SLO HOSTS TO ACCESS OHD FOR TESTING&lt;BR /&gt;access-list OUTSIDE_access_in_1 extended permit object-group HTTPHTTPS object-group SLO object OHD &lt;BR /&gt;access-list OUTSIDE_access_in_1 remark ALLOW ACCESS FROM EXTERNAL IP ADDRESS TO INTERNAL IP ADDRESS ON OH&lt;BR /&gt;access-list OUTSIDE_access_in_1 extended permit tcp object OH.US object OH-NIC2 eq www &lt;BR /&gt;access-list OUTSIDE_access_in_1 extended permit icmp host 10.10.7.1 any &lt;BR /&gt;access-list OUTSIDE_access_in_1 extended permit object-group ALLSERVICES object 172.20.204.0 164.64.204.0 255.255.255.0 &lt;BR /&gt;access-list OUTSIDE_access_in_1 extended permit object-group ALLSERVICES any any &lt;BR /&gt;access-list OUTSIDE_access_in remark ALLOW SLO TESTERS TO COMMUNICATE WITH OHD.&lt;BR /&gt;access-list OUTSIDE_access_in remark ALLOW SLO TESTERS TO COMMUNICATE WITH OHD.&lt;BR /&gt;access-list OUTSIDE_access_in extended permit object-group HTTPHTTPS 10.10.204.64 255.255.255.192 host 192.168.204.55 &lt;BR /&gt;access-list DMZ_access_in remark ALLOWS INTERNAL HOSTS TO CONNECT TO MAINFRAME&lt;BR /&gt;access-list DMZ_access_in extended permit object-group MainframeServices 192.168.204.0 255.255.255.0 any &lt;BR /&gt;access-list DMZ_access_in remark ALLOW INTERNAL HOSTS TO CONNECT TO DMZ/PERIMETER&lt;BR /&gt;access-list DMZ_access_in extended permit object-group ALLSERVICES 192.168.204.0 255.255.255.0 172.20.204.0 255.255.255.192 &lt;BR /&gt;access-list DMZ_access_in extended permit object-group ALLSERVICES object-group DMZCOMPUTERS any &lt;BR /&gt;access-list DMZ_access_in remark ALLOW DMZ COMPUTERS TO TALK TO INTERNAL&lt;BR /&gt;access-list DMZ_access_in extended permit object-group INTERNALSERVICES object-group DMZCOMPUTERS 192.168.204.0 255.255.255.0 &lt;BR /&gt;access-list DMZ_access_in remark ALLOWS DMZ SQL SERVERS TO TALK TO INSIDE HOSTS&lt;BR /&gt;access-list DMZ_access_in extended permit object-group DMZSQLSERVICES object-group DMZSQLSERVERS 192.168.204.0 255.255.255.0 &lt;BR /&gt;access-list DMZ_access_in remark ALLOWS ALL DMZ SERVERS TO BE BACKED UP VIA OHBK.&lt;BR /&gt;access-list DMZ_access_in extended permit object-group BACKUPEXEC object DMZNETWORK 192.168.204.0 255.255.255.0 &lt;BR /&gt;access-list DMZ_access_in remark ALLOW PINGBACK FROM DMZ&lt;BR /&gt;access-list DMZ_access_in extended permit icmp object 172.20.204.0 any &lt;BR /&gt;access-list DMZ_access_in extended permit object-group ALLSERVICES 172.20.204.0 255.255.255.0 192.168.204.0 255.255.255.0 &lt;BR /&gt;access-list DMZ_access_in extended permit object-group DMZSQLSERVICES 172.20.204.0 255.255.255.0 object OH &lt;BR /&gt;access-list DMZ_access_in extended permit object-group ALLSERVICES host 172.20.204.41 object OH-NIC2 &lt;BR /&gt;access-list DMZ_access_in extended permit object-group ALLSERVICES 172.20.204.0 255.255.255.0 192.168.2.0 255.255.255.0 &lt;BR /&gt;access-list INSIDE_nat0_outbound extended permit ip any 192.168.204.240 255.255.255.240 &lt;BR /&gt;access-list global_access extended permit object-group ALLSERVICES any any &lt;BR /&gt;access-list ICMPACL extended permit icmp any any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging console emergencies&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging class auth console errors &lt;BR /&gt;logging class sys console errors &lt;BR /&gt;mtu OUTSIDE 1500&lt;BR /&gt;mtu INSIDE 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;ip local pool VPBNIPPOOL 192.168.204.240-192.168.204.250 mask 255.255.255.0&lt;BR /&gt;ip local pool VPNTESTPOOL 192.168.2.100-192.168.2.114 mask 255.255.255.240&lt;BR /&gt;failover&lt;BR /&gt;failover lan unit primary&lt;BR /&gt;failover lan interface HEARTBEAT Ethernet0/3&lt;BR /&gt;failover link HEARTBEAT Ethernet0/3&lt;BR /&gt;failover interface ip HEARTBEAT 10.1.1.1 255.255.255.0 standby 10.1.1.2&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any OUTSIDE&lt;BR /&gt;icmp permit any echo-reply OUTSIDE&lt;BR /&gt;icmp permit any INSIDE&lt;BR /&gt;icmp permit any echo-reply INSIDE&lt;BR /&gt;icmp permit any DMZ&lt;BR /&gt;icmp permit any echo-reply DMZ&lt;BR /&gt;icmp permit any management&lt;BR /&gt;icmp permit any echo-reply management&lt;BR /&gt;asdm image disk0:/asdm-634.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (INSIDE,DMZ) source static 192.168.2.0 DMZNATPOOL destination static 172.20.204.0 172.20.204.0&lt;BR /&gt;!&lt;BR /&gt;object network OBJ-192.168.204.0&lt;BR /&gt; nat (INSIDE,OUTSIDE) dynamic interface&lt;BR /&gt;object network TESTOBJ-192.168.204.0&lt;BR /&gt; nat (INSIDE,DMZ) dynamic interface&lt;BR /&gt;access-group ICMPACL in interface OUTSIDE&lt;BR /&gt;access-group ICMPACL in interface INSIDE&lt;BR /&gt;access-group ICMPACL in interface DMZ&lt;BR /&gt;access-group ICMPACL in interface management&lt;BR /&gt;access-group global_access global&lt;BR /&gt;route OUTSIDE 0.0.0.0 0.0.0.0 10.10.204.65 1&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Oct 2010 15:07:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/interface-communication-issues/m-p/1570442#M675355</guid>
      <dc:creator>heather.burke</dc:creator>
      <dc:date>2010-10-14T15:07:39Z</dc:date>
    </item>
    <item>
      <title>Re: interface communication issues</title>
      <link>https://community.cisco.com/t5/network-security/interface-communication-issues/m-p/1570443#M675356</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So based on your original post i assume youa re still facing issues between inside to DMZ, that is, pings from inside to DMZ works but not from DMZ to inside. Can you also paste the output of the following packet-tracer when initiating a ping from the DMZ to the inside:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input DMZ icmp &lt;DMZ_HOST_IP_ADDRESS&gt; 8 0 &lt;INSIDE_HOST_IP_ADDRESS&gt; detailed&lt;/INSIDE_HOST_IP_ADDRESS&gt;&lt;/DMZ_HOST_IP_ADDRESS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Oct 2010 15:39:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/interface-communication-issues/m-p/1570443#M675356</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-10-14T15:39:30Z</dc:date>
    </item>
    <item>
      <title>Re: interface communication issues</title>
      <link>https://community.cisco.com/t5/network-security/interface-communication-issues/m-p/1570444#M675359</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Heather,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There's a mix of different NATs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What would you like to achieve in the end?&lt;/P&gt;&lt;P&gt;Do you want to NAT or PAT users going from inside to dmz or the other way around?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't see same-security permit inter-interface in configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Marcin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Oct 2010 15:49:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/interface-communication-issues/m-p/1570444#M675359</guid>
      <dc:creator>Marcin Latosiewicz</dc:creator>
      <dc:date>2010-10-14T15:49:35Z</dc:date>
    </item>
    <item>
      <title>Re: interface communication issues</title>
      <link>https://community.cisco.com/t5/network-security/interface-communication-issues/m-p/1570445#M675361</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When I do the packet tracer via ASDM it says that the packet is successful....however, the reality is that it is not.&amp;nbsp; (I'm not sure if that's true with this config itself, since I've changed it so many times lately!)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will go do a CLI one and post it for you&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Oct 2010 16:03:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/interface-communication-issues/m-p/1570445#M675361</guid>
      <dc:creator>heather.burke</dc:creator>
      <dc:date>2010-10-14T16:03:22Z</dc:date>
    </item>
    <item>
      <title>Re: interface communication issues</title>
      <link>https://community.cisco.com/t5/network-security/interface-communication-issues/m-p/1570446#M675362</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ultimately, we want the inside to&amp;nbsp; get out to the Internet, the outside to get inside to one specific server, and the DMZ and Inside to communicate both ways.&amp;nbsp; Sadly, the person who set up this network left the web server inside and put its database server in the DMZ...&amp;nbsp; My plan is to eventually get these put correctly, but that changeover will be a bit complicated, so first I am trying to get the new ASA to work as it is. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The way I understand it, PAT is fickle for bidirectional traffic, so static NAT seems to be what you would need to use for that.&amp;nbsp; Is that correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe that the same security box is checked in the ASDM, though it has never made any difference.&amp;nbsp; Ultimately, the DMZ SHOULD be a different security level (were it truly a DMZ, anyway)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Oct 2010 16:10:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/interface-communication-issues/m-p/1570446#M675362</guid>
      <dc:creator>heather.burke</dc:creator>
      <dc:date>2010-10-14T16:10:34Z</dc:date>
    </item>
    <item>
      <title>Re: interface communication issues</title>
      <link>https://community.cisco.com/t5/network-security/interface-communication-issues/m-p/1570447#M675363</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;here is the result of the trace.&amp;nbsp; I changed around teh existing NAT to go the other direction (nat (DMZ,INSIDE) source static 172.20.204.0 TESTNETNATPOOL destination static 192.168.2.0 192.168.2.0) to demonstrate what I was talking about.&amp;nbsp; The packet tracer says successful, but it is not in RL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 192.168.2.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; INSIDE&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group ICMPACL in interface DMZ&lt;BR /&gt;access-list ICMPACL extended permit icmp any any&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (DMZ,INSIDE) source static 172.20.204.0 TESTNETNATPOOL destination static 192.168.2.0 192.168.2.0&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate ONGARDDBC1/0 to 192.168.2.55/0&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 1024, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: DMZ&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: INSIDE&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Oct 2010 16:36:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/interface-communication-issues/m-p/1570447#M675363</guid>
      <dc:creator>heather.burke</dc:creator>
      <dc:date>2010-10-14T16:36:20Z</dc:date>
    </item>
    <item>
      <title>Re: interface communication issues</title>
      <link>https://community.cisco.com/t5/network-security/interface-communication-issues/m-p/1570448#M675364</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hmmm.. That's interesting.. Can you post the output of "show run object" and "show run object-group". To be specific, I just would like to know what IP addresses are configured under the two groups &lt;STRONG&gt;TESTNETNATPOOL &lt;/STRONG&gt;and &lt;STRONG&gt;DMZNATPOOL&lt;/STRONG&gt;? Also, what IP address does the name &lt;STRONG&gt;ONGARDDBC1&lt;/STRONG&gt; represent?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Oct 2010 17:07:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/interface-communication-issues/m-p/1570448#M675364</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-10-14T17:07:09Z</dc:date>
    </item>
    <item>
      <title>Re: interface communication issues</title>
      <link>https://community.cisco.com/t5/network-security/interface-communication-issues/m-p/1570449#M675365</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok both of those pools are just a group of about 5 addresses on each of the subnets.&amp;nbsp; I had tried doing a static using the interface address, but got warning messages.&amp;nbsp; I wasn't sure if I should be assigning a one to one address, from the old subnet to the new subnet.&amp;nbsp; I worried that doing this might cause issues if more than one connection was established at once, but I am not sure if that is true.&amp;nbsp; ( When I do a pool or just one address, the result is the same, though.)&amp;nbsp; DBC1 is the translation of 172.20.204.41.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Oct 2010 17:37:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/interface-communication-issues/m-p/1570449#M675365</guid>
      <dc:creator>heather.burke</dc:creator>
      <dc:date>2010-10-14T17:37:04Z</dc:date>
    </item>
    <item>
      <title>Re: interface communication issues</title>
      <link>https://community.cisco.com/t5/network-security/interface-communication-issues/m-p/1570450#M675366</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apologies for the late response. Hmmm that's interesting. So the object named 172.20.204.0 specifies the entire DMZ subnet right? In that case, you are trying create a static NAT for the entire DMZ subnet to a pool of 5 IP addresses on the Inside. That unfortunately, will not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In general, when we perform a static translation for an entore subnet, we generally create a mapped subnet of &lt;STRONG&gt;equal size&lt;/STRONG&gt;, that is, in our case it will be 172.20.204.0/24 will mapped to x.x.x.0/24 while in our case instead of an entore /24 subnet, we just have a pool of 5 IP addresses. I am not really sure of the packet-tracer output in this case over here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any particular reason you are performing that NAT? Instead, if it's alright, why don't you just map the DMZ subnet to itself by having the below command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (DMZ,INSIDE) source static 172.20.204.0 172.20.204.0 destination&amp;nbsp; static 192.168.2.0 192.168.2.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Oct 2010 15:26:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/interface-communication-issues/m-p/1570450#M675366</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-10-15T15:26:20Z</dc:date>
    </item>
    <item>
      <title>Re: interface communication issues</title>
      <link>https://community.cisco.com/t5/network-security/interface-communication-issues/m-p/1570451#M675367</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, there is no particular reason.&amp;nbsp; It has just been part of my troubleshooting process.&amp;nbsp; I will give your suggestion a try.&amp;nbsp; I thought that I had tried soemthing like it, and got an error message or had it not work, but at this point I've started duplicating my efforts out of frustration anyway! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok, I tried it and it won't allow the whole netwrok because of some addresses assigned to a VPN pool that was set up by another agency yesterday (too many chefs)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, I just think I learned something.&amp;nbsp; This whole time I have been operating on a test net, to configure the firewall before taking it live, and enable me to run tests without having to stay late every night.&amp;nbsp; However, I had elected to plug into the actual switch that is really hosting the current DMZ.&amp;nbsp; (Assuming that it would know to route the traffic from it's source back through the test firewall Whixh was the case going out, but never coming back in)&amp;nbsp; However, I am starting to believe that it is just too confusing for it.&amp;nbsp; We just experienced a hiccup in our normal communication with those servers (not related to these tests) and during that hiccup, I was able to ping from the DMZ into my test net.&amp;nbsp; (using a dynamic PAT I had just set up for the hundreth time)&amp;nbsp; However, as quickly as it worked, it stopped working. (and that moment coincided exactly with the production issue)&amp;nbsp; I am going to try seeing if I can configure a wholly seperate test DMZ subnet and see if I can confirm this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this sound to you like it could be causing the communication issue?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Oct 2010 17:25:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/interface-communication-issues/m-p/1570451#M675367</guid>
      <dc:creator>heather.burke</dc:creator>
      <dc:date>2010-10-15T17:25:10Z</dc:date>
    </item>
    <item>
      <title>Re: interface communication issues</title>
      <link>https://community.cisco.com/t5/network-security/interface-communication-issues/m-p/1570452#M675368</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hmm well that has not ended up being the silver bullet that I hoped.&amp;nbsp; I still can't ping out of my test DMZ net.&amp;nbsp; (I can't ping all the way in yet either, just to the test switch, but for now that will have to do) &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Oct 2010 19:22:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/interface-communication-issues/m-p/1570452#M675368</guid>
      <dc:creator>heather.burke</dc:creator>
      <dc:date>2010-10-15T19:22:15Z</dc:date>
    </item>
    <item>
      <title>Re: interface communication issues</title>
      <link>https://community.cisco.com/t5/network-security/interface-communication-issues/m-p/1570453#M675369</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you draw out a line topology for us? it is a little confusing with the switch now. I am not really sure where the switch is and from where to where pings are working or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, i think it's high time we started using captures on the DMZ and inside interfaces. Please do apply those and let me know how it looks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-1222"&gt;https://supportforums.cisco.com/docs/DOC-1222&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Oct 2010 14:55:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/interface-communication-issues/m-p/1570453#M675369</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-10-16T14:55:20Z</dc:date>
    </item>
    <item>
      <title>Re: interface communication issues</title>
      <link>https://community.cisco.com/t5/network-security/interface-communication-issues/m-p/1570454#M675370</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Heather&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is Mike, Please take a look below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NAT sould look like this&lt;/P&gt;&lt;P&gt;Object Internal-Net&lt;BR /&gt;&amp;nbsp; subnet 192.168.2.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Object DMZ-Net&lt;BR /&gt;&amp;nbsp; Subnet 172.20.204.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;On global configuration mode &lt;BR /&gt; nat (inside,dmz) source static Internal-Net Internal-Net destination&amp;nbsp; DMZ-Net DMZ-Net&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try that and then send us the packet tracer from inside to the DMZ and then from the DMZ to the inside. Dynamic nat is not quite the scenario that you need, I guess you will need to see the real IP of the servers located on the DMZ and the DMZ servers should be able to see the real IP of the Inside hosts. So No nat seems like the best practice here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have attached a quick drawing of what I think is the current scenario, please let us know if that is correct&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Oct 2010 19:05:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/interface-communication-issues/m-p/1570454#M675370</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-10-16T19:05:48Z</dc:date>
    </item>
  </channel>
</rss>

