<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA routing in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-routing/m-p/1440005#M733145</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Perhaps when the traffic reaches the ASA, there's a NAT rule and the ASA is expecting a corresponding NAT rule to translate that IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see two options to try:&lt;/P&gt;&lt;P&gt;NAT the traffic, i.e&lt;/P&gt;&lt;P&gt;nat (outside) 1 IP_of_DMZ_server 255.255.255.2555&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or, disable NAT Control?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 03 Jun 2010 20:32:21 GMT</pubDate>
    <dc:creator>Federico Coto Fajardo</dc:creator>
    <dc:date>2010-06-03T20:32:21Z</dc:date>
    <item>
      <title>ASA routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-routing/m-p/1440002#M733111</link>
      <description>&lt;P&gt;I have dual firewalls on either end of my DMZ and would like for my DMZ hosts to serve up content to &lt;SPAN style="text-decoration: underline;"&gt;both&lt;/SPAN&gt; internal and public users. My issue is that I'm not sure how to simplify the routing.&lt;/P&gt;&lt;P&gt;I have my DMZ host with a default gateway of the public firewall (192.168.2.1, per the diagram) which allows it to serve up pages externally. I am currently using static routes defined on the DMZ host (ie. route 192.168.1.0/24 has a gateway of 192.168.2.251) which works fine. I'd like to do away with static routes and have the public firewall reroute the traffic. Traffic from the DMZ host to the internal network should, in my mind, travel:&lt;BR /&gt;DMZ Host (192.168.2.10)&lt;BR /&gt;Default Gateway (192.168.2.1 / public firewall)&lt;/P&gt;&lt;P&gt;Inside firewall (192.168.2.251)&lt;/P&gt;&lt;P&gt;Inside host (192.168.1.x)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How do I go about setting this up?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Greg&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:54:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-routing/m-p/1440002#M733111</guid>
      <dc:creator>gregbeifuss</dc:creator>
      <dc:date>2019-03-11T17:54:38Z</dc:date>
    </item>
    <item>
      <title>Re: ASA routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-routing/m-p/1440003#M733124</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To be able to allow the ASA to reroute traffic backout the same interface in which it received it you need this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If routing is correct, then when the internet-facing firewall receives from the ''inside'' interface traffic intended to the internal LAN, then it will u-turn the traffic and reroute it back to the ''inside'' interface (same interface in which it received the traffic).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this what you're looking for?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jun 2010 19:10:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-routing/m-p/1440003#M733124</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-03T19:10:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-routing/m-p/1440004#M733131</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I should have mentioned that I already have the same-security-traffic permit intra-interface statement in my configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I use the packet tracer, the packet is dropped during a NAT phase by the rpf-check.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jun 2010 20:29:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-routing/m-p/1440004#M733131</guid>
      <dc:creator>gregbeifuss</dc:creator>
      <dc:date>2010-06-03T20:29:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-routing/m-p/1440005#M733145</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Perhaps when the traffic reaches the ASA, there's a NAT rule and the ASA is expecting a corresponding NAT rule to translate that IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see two options to try:&lt;/P&gt;&lt;P&gt;NAT the traffic, i.e&lt;/P&gt;&lt;P&gt;nat (outside) 1 IP_of_DMZ_server 255.255.255.2555&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or, disable NAT Control?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jun 2010 20:32:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-routing/m-p/1440005#M733145</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-03T20:32:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-routing/m-p/1440006#M733158</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also, on previous releases there was a limitation with u-turning the traffic because it was only used on encrypted traffic.&lt;/P&gt;&lt;P&gt;For example, to terminate the VPN tunnel and then redirect it either trough another tunnel (encrypted) or in the clear to the Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have not tested myself if it works now on receiving clear text and sending it back as clear text.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jun 2010 21:02:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-routing/m-p/1440006#M733158</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-03T21:02:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-routing/m-p/1440007#M733179</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your comment on the u-turning not working properly. No matter which NAT rule I write, the rpf-check drops me everytime. I'm using 8.2.2 and I'll just leave in the static route entries for now.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jun 2010 14:41:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-routing/m-p/1440007#M733179</guid>
      <dc:creator>gregbeifuss</dc:creator>
      <dc:date>2010-06-04T14:41:28Z</dc:date>
    </item>
  </channel>
</rss>

