<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Hosts between two sub-interfaces that is using one physical interface of Cisco ASA cannot ping each other. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/hosts-between-two-sub-interfaces-that-is-using-one-physical/m-p/3804679#M6922</link>
    <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;Try adding the following commands:&lt;/P&gt;
&lt;PRE&gt;!
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
!&lt;/PRE&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/S/cmdref3/s1.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/S/cmdref3/s1.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 19 Feb 2019 08:13:58 GMT</pubDate>
    <dc:creator>Seb Rupik</dc:creator>
    <dc:date>2019-02-19T08:13:58Z</dc:date>
    <item>
      <title>Hosts between two sub-interfaces that is using one physical interface of Cisco ASA cannot ping each other.</title>
      <link>https://community.cisco.com/t5/network-security/hosts-between-two-sub-interfaces-that-is-using-one-physical/m-p/3804657#M6918</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How can i permit ping between two hosts on a different subinterface using the same physical interface on cisco ASA? It is also using the same ACL.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;FW/pri/act# sh ip&lt;BR /&gt;System IP Addresses:&lt;BR /&gt;Interface Name IP address Subnet mask Method &lt;BR /&gt;GigabitEthernet0/1.16 zon_ves 10.165.16.1 255.255.255.0 CONFIG&lt;BR /&gt;GigabitEthernet0/1.28 zon_ves_2 10.165.28.1 255.255.255.0 manual&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet0/1&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet0/1.16&lt;BR /&gt; vlan 16&lt;BR /&gt; nameif zon_ves&lt;BR /&gt; security-level 90&lt;BR /&gt; ip address 10.165.16.1 255.255.255.0 standby 10.165.16.2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet0/1.28&lt;BR /&gt; vlan 28&lt;BR /&gt; nameif zon_ves_2&lt;BR /&gt; security-level 90&lt;BR /&gt; ip address 10.165.28.1 255.255.255.0 standby 10.165.28.2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-group zon_ves_in in interface zon_ves&lt;/P&gt;
&lt;P&gt;access-group zon_ves_in in interface zon_ves_2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;FW# sh access-list zon_ves_in | i icmp&lt;BR /&gt;access-list zon_ves_in line 1 extended permit icmp any any (hitcnt=13248083)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;FW# packet-tracer input zon_ves icmp 10.165.16.10 1 1 10.165.28.10&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 10.165.28.10 using egress ifc zon_ves_2&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; &lt;BR /&gt;Result:&lt;BR /&gt;input-interface: zon_ves&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: zon_ves_2&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:49:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hosts-between-two-sub-interfaces-that-is-using-one-physical/m-p/3804657#M6918</guid>
      <dc:creator>drlbaluyut</dc:creator>
      <dc:date>2020-02-21T16:49:57Z</dc:date>
    </item>
    <item>
      <title>Re: Hosts between two sub-interfaces that is using one physical interface of Cisco ASA cannot ping each other.</title>
      <link>https://community.cisco.com/t5/network-security/hosts-between-two-sub-interfaces-that-is-using-one-physical/m-p/3804679#M6922</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;Try adding the following commands:&lt;/P&gt;
&lt;PRE&gt;!
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
!&lt;/PRE&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/S/cmdref3/s1.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/S/cmdref3/s1.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Feb 2019 08:13:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hosts-between-two-sub-interfaces-that-is-using-one-physical/m-p/3804679#M6922</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2019-02-19T08:13:58Z</dc:date>
    </item>
  </channel>
</rss>

