<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Classification of traffic for multiple contexts on ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/classification-of-traffic-for-multiple-contexts-on-asa/m-p/1319725#M786710</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need some clarification on the classification criteria on multiple contexts. As mentioned in the documents there are 3 different methods which are&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Unique MAC&lt;/P&gt;&lt;P&gt;2. Unique Interfaces&lt;/P&gt;&lt;P&gt;3. NAT Config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In Unique Interfaces, as per the document &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"If only one context is associated with the ingress interface, the security appliance classifies the packet&lt;/P&gt;&lt;P&gt;into that context"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In which case would i need to use this topology? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to Unique MAC Address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In which scenario would multiple contexts share a single Interface. Does ACE allocate MAC addresses to contexts?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 16:32:37 GMT</pubDate>
    <dc:creator>sidcracker</dc:creator>
    <dc:date>2019-03-11T16:32:37Z</dc:date>
    <item>
      <title>Classification of traffic for multiple contexts on ASA</title>
      <link>https://community.cisco.com/t5/network-security/classification-of-traffic-for-multiple-contexts-on-asa/m-p/1319725#M786710</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need some clarification on the classification criteria on multiple contexts. As mentioned in the documents there are 3 different methods which are&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Unique MAC&lt;/P&gt;&lt;P&gt;2. Unique Interfaces&lt;/P&gt;&lt;P&gt;3. NAT Config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In Unique Interfaces, as per the document &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"If only one context is associated with the ingress interface, the security appliance classifies the packet&lt;/P&gt;&lt;P&gt;into that context"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In which case would i need to use this topology? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to Unique MAC Address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In which scenario would multiple contexts share a single Interface. Does ACE allocate MAC addresses to contexts?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:32:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/classification-of-traffic-for-multiple-contexts-on-asa/m-p/1319725#M786710</guid>
      <dc:creator>sidcracker</dc:creator>
      <dc:date>2019-03-11T16:32:37Z</dc:date>
    </item>
    <item>
      <title>Re: Classification of traffic for multiple contexts on ASA</title>
      <link>https://community.cisco.com/t5/network-security/classification-of-traffic-for-multiple-contexts-on-asa/m-p/1319726#M786711</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;"In which case would i need to use this topology?"&lt;/P&gt;&lt;P&gt;For instance, If you have enough interfaces in your security appliance and/or don't have multiple context in the same network segment, you can choose to allocate different interfaces to each  context, so no interface is shared. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"With regards to Unique MAC Address"&lt;/P&gt;&lt;P&gt;If you have for instance just one interface to connect all context to Internet.&lt;/P&gt;&lt;P&gt;with the command "mac-address auto" the security appliance assign unique MAC to each shared context interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Oct 2009 19:33:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/classification-of-traffic-for-multiple-contexts-on-asa/m-p/1319726#M786711</guid>
      <dc:creator>Amadou TOURE</dc:creator>
      <dc:date>2009-10-29T19:33:15Z</dc:date>
    </item>
    <item>
      <title>Re: Classification of traffic for multiple contexts on ASA</title>
      <link>https://community.cisco.com/t5/network-security/classification-of-traffic-for-multiple-contexts-on-asa/m-p/1319727#M786712</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;"In which case would i need to use this topology?"&lt;/P&gt;&lt;P&gt;For instance, If you have enough interfaces in your security appliance and/or don't have multiple context in the same network segment, you can choose to allocate different interfaces to each  context, so no interface is shared. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"With regards to Unique MAC Address"&lt;/P&gt;&lt;P&gt;If you have for instance just one interface to connect all context to Internet.&lt;/P&gt;&lt;P&gt;with the command "mac-address auto" the security appliance assign unique MAC to each shared context interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Oct 2009 19:46:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/classification-of-traffic-for-multiple-contexts-on-asa/m-p/1319727#M786712</guid>
      <dc:creator>Amadou TOURE</dc:creator>
      <dc:date>2009-10-29T19:46:02Z</dc:date>
    </item>
  </channel>
</rss>

