<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA5505 and multiple internal networks in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5505-and-multiple-internal-networks/m-p/1398601#M798926</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I decided to run the Packet Tracer utiltiy against DNS on the inside interface.&amp;nbsp; The Packet Tracer showed the DNS packet was dropped and the error message was 'inspect-invalid-dns-pak'.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once I had this error message I did a search for this text.&amp;nbsp; The issue is tied into the inspection policies in this part of the configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN style="color: #ff0000;"&gt;inspect dns preset_dns_map&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem area is the inspect dns entry.&amp;nbsp; As a test I removed the 'inspect dns preset_dns_map' from the inspection_default class.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Internal DNS resolution now works.&amp;nbsp;&amp;nbsp; However, I suspect this is not the best approach, so does anyone have some ideas regarding how to fix this and still have dns inspection?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 17 Dec 2009 00:36:48 GMT</pubDate>
    <dc:creator>lusbyr</dc:creator>
    <dc:date>2009-12-17T00:36:48Z</dc:date>
    <item>
      <title>ASA5505 and multiple internal networks</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-and-multiple-internal-networks/m-p/1398597#M798922</link>
      <description>&lt;P&gt;I have an ASA5505 with the base license.&amp;nbsp; It is connected to a Cisco 1760 router with multple internal networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have setup RIP between the ASA and the 1760, the ASA is properly feeding a default route to the 1760.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA5505 has an internal IP of 192.168.1.1 and is being assigned an external IP via DHCP from the ISP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is odd is about this is clients on any of the other internal networks, can access the internet via a web browser.&amp;nbsp; For example a client with an IP address of 192.168.2.59 can access the internet.&amp;nbsp; However DNS and HTTP connections internally do not work.&amp;nbsp; I can ping my internal DNS server with an IP address, but cannot ping it or any other internal clients by name.&amp;nbsp; Nslookup only looks at the external DNS server (208.67.220.220) for name resolution requests.&amp;nbsp; Even though there are two internal DNS servers defined.&amp;nbsp; Any HTTP requests to servers on the 192.168.1.x subnet timeout using either IP address or DNS names.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am aware of NAT exemption and I think I have properly configured it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have been working on this for a number of weeks, performing searches on CCO, scanning this Forum and the web and I cannot find an explanation for what is going on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am running version 7.2 of the ASA software.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would be greatly appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have attached a diagram of the network.&amp;nbsp; Hopefully someone has configured this kind of setup before and will be able to give me an idea of what I am missing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have the same-security-traffic permit inter-interface and intra-interface commands in the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:49:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-and-multiple-internal-networks/m-p/1398597#M798922</guid>
      <dc:creator>lusbyr</dc:creator>
      <dc:date>2019-03-11T16:49:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 and multiple internal networks</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-and-multiple-internal-networks/m-p/1398598#M798923</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your efforts to search the forum to find a solution yourself is much appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe you need the following along with the same security intra that you have configured:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,inside) 192.168.1.0 192.168.1.0 net 255.255.255.0&lt;/P&gt;&lt;P&gt;sysopt noproxyarp&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Give that a shot and let us know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Dec 2009 02:46:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-and-multiple-internal-networks/m-p/1398598#M798923</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2009-12-16T02:46:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 and multiple internal networks</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-and-multiple-internal-networks/m-p/1398599#M798924</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Buddy,&lt;/P&gt;&lt;P&gt;I think you'd better paste configuration of ASA ,router and IP configuration of client.&lt;/P&gt;&lt;P&gt;Where are your internal DNS server? Who is the DHCP server or using dedicated IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THX&lt;/P&gt;&lt;P&gt;Keisikka&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Dec 2009 08:35:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-and-multiple-internal-networks/m-p/1398599#M798924</guid>
      <dc:creator>keisikka</dc:creator>
      <dc:date>2009-12-16T08:35:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 and multiple internal networks</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-and-multiple-internal-networks/m-p/1398600#M798925</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;KS,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No that did not work.&amp;nbsp; In fact when I put in the static command, all clients on the other subnets lost internet access.&amp;nbsp; Still no internal DNS resolution for clients on networks other than 192.168.1.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As requested I am posting the configs of the ASA and Router and the resolv.conf file of a Unix host I have on the 192.168.128.0 subnet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;root@anniv-solaris /etc&amp;gt; cat resolv.conf&lt;BR /&gt;domain&amp;nbsp; nw.practice.com&lt;BR /&gt;search&amp;nbsp; nw.practice.com&lt;BR /&gt;nameserver&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.10&lt;BR /&gt;nameserver&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.35&lt;BR /&gt;nameserver&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 208.67.220.220&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;One other thing I should mention is that before I installed the ASA 5505, everything was working perfectly.&amp;nbsp; I was using a Linksys WRT54G.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know this issue has something to do with the ASA.&amp;nbsp; It is doing something with DNS requests on the internal network that is not expected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Dec 2009 18:24:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-and-multiple-internal-networks/m-p/1398600#M798925</guid>
      <dc:creator>lusbyr</dc:creator>
      <dc:date>2009-12-16T18:24:54Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 and multiple internal networks</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-and-multiple-internal-networks/m-p/1398601#M798926</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I decided to run the Packet Tracer utiltiy against DNS on the inside interface.&amp;nbsp; The Packet Tracer showed the DNS packet was dropped and the error message was 'inspect-invalid-dns-pak'.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once I had this error message I did a search for this text.&amp;nbsp; The issue is tied into the inspection policies in this part of the configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;SPAN style="color: #ff0000;"&gt;inspect dns preset_dns_map&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem area is the inspect dns entry.&amp;nbsp; As a test I removed the 'inspect dns preset_dns_map' from the inspection_default class.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Internal DNS resolution now works.&amp;nbsp;&amp;nbsp; However, I suspect this is not the best approach, so does anyone have some ideas regarding how to fix this and still have dns inspection?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Dec 2009 00:36:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-and-multiple-internal-networks/m-p/1398601#M798926</guid>
      <dc:creator>lusbyr</dc:creator>
      <dc:date>2009-12-17T00:36:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 and multiple internal networks</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-and-multiple-internal-networks/m-p/1398602#M798927</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Buddy,&lt;/P&gt;&lt;P&gt;I find you lost default route on ASA.&lt;/P&gt;&lt;P&gt;And I am wondering what is the function of your Exemption NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THX&lt;/P&gt;&lt;P&gt;Keisikka&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Dec 2009 03:14:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-and-multiple-internal-networks/m-p/1398602#M798927</guid>
      <dc:creator>keisikka</dc:creator>
      <dc:date>2009-12-17T03:14:03Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 and multiple internal networks</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-and-multiple-internal-networks/m-p/1398603#M798928</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Support Community,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I still need some help.&amp;nbsp; Access to external websites (those on the outside interface) works fine.&amp;nbsp; However, clients on the inside network cannot access web servers on the internal network.&amp;nbsp; The connection times out.&amp;nbsp; This is with http or https.&amp;nbsp; I cannot figure out why.&amp;nbsp; I thought there might be an &lt;SPAN style="color: #ff0000;"&gt;inspect http&lt;/SPAN&gt; parameter in the policy map.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I should also point out that SIP connections between internal networks 192.168.2.0 and 192.168.1.0 do not work anymore either.&amp;nbsp; I have a test IP telephony network setup and it is using Exchange 2007 as the voice mail service.&amp;nbsp; It worked before I installed the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried to remove the &lt;SPAN style="color: #ff0000;"&gt;'inspect sip'&lt;/SPAN&gt; from the policy map thinking that it might fix the issue, like removing the 'inspect dns preset_dns_map' did, but no luck.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for helping me solve this issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Dec 2009 00:28:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-and-multiple-internal-networks/m-p/1398603#M798928</guid>
      <dc:creator>lusbyr</dc:creator>
      <dc:date>2009-12-18T00:28:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 and multiple internal networks</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-and-multiple-internal-networks/m-p/1398604#M798929</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;lusbyr,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We need to see what the logs show when 192.168.1.0/24 tries to talk to 192.168.2.0/24. Enable logging on the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;loggin enable&lt;/P&gt;&lt;P&gt;loggin buffered 7&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh logg | i 192.168.1.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pls. confirm the gateway IP that the 192.168.1.0/24 network is using, whether it is the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sure that when the internal networks talk to each other the traffic does not come to the firewall (it shouldn't).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Dec 2009 01:44:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-and-multiple-internal-networks/m-p/1398604#M798929</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2009-12-18T01:44:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 and multiple internal networks</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-and-multiple-internal-networks/m-p/1398605#M798930</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess the default gateway for Vlan1 is ASA but not Router.&lt;/P&gt;&lt;P&gt;So the traffic between vlan1 and vlans will through ASA, that is why the exemption resides.&lt;/P&gt;&lt;P&gt;If the traffic internal (from vlans to vlan1) is trusted, I think the default gateway for vlan1 will be the router and can resolve the problems.&lt;/P&gt;&lt;P&gt;Maybe can creat a new vlan for the link between the ASA and the router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THX&lt;/P&gt;&lt;P&gt;Keisikka&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Dec 2009 03:08:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-and-multiple-internal-networks/m-p/1398605#M798930</guid>
      <dc:creator>keisikka</dc:creator>
      <dc:date>2009-12-18T03:08:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 and multiple internal networks</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-and-multiple-internal-networks/m-p/1398606#M798931</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Support Community,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OK,&amp;nbsp; after some more searching online I found a post that indicated that a static route had to be setup on a server in order to get this to work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I setup a static route on the SIP voice messaging server and pointed it to the loopback address space of the CME router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;command was:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;STRONG&gt;route add -p 192.168.20.0 mask 255.255.255.0 192.168.1.2 metric 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After I did this the SIP communication between CME and Exchange 2007 worked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So to summarize the solution so far (2 of 3 issues have been solved)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.&amp;nbsp; No DNS name resolution from internal networks to primary internal network 192.168.1.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;Solution:&amp;nbsp; remove &lt;STRONG style="font-family: courier new,courier; "&gt;inspect dns dns_preset_map&lt;/STRONG&gt; from the policy-map class inspection_default on the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. No SIP communication between CME router and Exchange 2007&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;Solution:&amp;nbsp; Add static route on the Exchange 2007 server pointing to the CME server:&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; route add command on Windows&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3.&amp;nbsp; No communication (except ping) between other internal networks and the primary network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;Solution:&amp;nbsp; none at this point, but I am thinking it has something to do with routing issues&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So this is what I did next, as an experiment I have a web server on the primary network.&amp;nbsp; I added a static route on that web server pointing to one of the other internal networks.&amp;nbsp; I opened a browser up on the client on the other internal network.&amp;nbsp; The internal website came up instantly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So this seems a bit odd to me, why would I have to add static routes on all the web servers on the primary internal network pointing to all the other internal networks?&amp;nbsp; I did not have to do this with the WRT54G.&amp;nbsp; I just had the WRT54G in gateway mode and placed static routes on it to the internal networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is not a solution that is going to work very well for me, since I have some devices that use web servers to configure them and I cannot set static routes on them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why would ping work and no other protocols, like http or ftp for communication between hosts on the internal network?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Dec 2009 19:10:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-and-multiple-internal-networks/m-p/1398606#M798931</guid>
      <dc:creator>lusbyr</dc:creator>
      <dc:date>2009-12-18T19:10:32Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 and multiple internal networks</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-and-multiple-internal-networks/m-p/1398607#M798932</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You haven't answered the question regarding GW used by the VLAN1 hosts.&amp;nbsp; It should not be pointing at the firewall. I assumed that was the case and that is the reason I provided U-Turn translation wtih proxy arp disabled on the inside along with the same security intra that you had configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All internal network traffic should not arrive on the firewall. If you can accomplish this you will be fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sure all the hosts in all networks are pointing the FW at the corresponding VLAN interface IP on the router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Router should route traffic between the internal network and only send the traffic if it doesn't know where the destination lives - which is only for the hosts that live on the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Dec 2009 19:17:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-and-multiple-internal-networks/m-p/1398607#M798932</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2009-12-18T19:17:10Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 and multiple internal networks</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-and-multiple-internal-networks/m-p/1398608#M798933</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;KS,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for not understanding what you were asking.&amp;nbsp; Are you saying that all hosts (on every internal network) should be pointing to the internal Cisco 1760 router as their gateway and NOT the firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this is the case the default gateway should be 192.168.1.2 instead of 192.168.1.1?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Dec 2009 19:26:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-and-multiple-internal-networks/m-p/1398608#M798933</guid>
      <dc:creator>lusbyr</dc:creator>
      <dc:date>2009-12-18T19:26:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 and multiple internal networks</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-and-multiple-internal-networks/m-p/1398609#M798934</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes that is eaxctly what I mean.&amp;nbsp; No host should point to the FW for the default GW especially when there are other inside networks that they need to get to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let the router do its job - which is routing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any network that the router does not know should come to the firewall.&amp;nbsp; Configure the default gateway on the router to point to the FW.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, yes, change the GW on the hosts in VLAN1 to point to the router's interface IP and let me know how it goes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Dec 2009 19:32:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-and-multiple-internal-networks/m-p/1398609#M798934</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2009-12-18T19:32:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 and multiple internal networks</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-and-multiple-internal-networks/m-p/1398610#M798935</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;KS,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I works now!&amp;nbsp;&amp;nbsp; Thanks a bunch for your help....&amp;nbsp;&amp;nbsp; &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The operation of ASAs is somewhat new to me, but I am beginning to get the impression that the ASA is not a router, even though it can run the RIP routing protocol and its Firewall mode is called 'Routed'.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By just changing all the clients on the 192.168.1.x subnet to a new default gateway of 192.168.1.2 seemed to fix all the connectivity problems for the other subnets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did not have to put the command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;STRONG&gt;static (inside,inside) 192.168.1.0 192.168.1.0 netmask 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In to get it to work.&amp;nbsp;&amp;nbsp; What does this U-turn, as you called it command do?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Should I put the inspect dns preset_dns_map back into the global policy map?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Dec 2009 23:28:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-and-multiple-internal-networks/m-p/1398610#M798935</guid>
      <dc:creator>lusbyr</dc:creator>
      <dc:date>2009-12-18T23:28:01Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 and multiple internal networks</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-and-multiple-internal-networks/m-p/1398611#M798936</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Very glad to hear.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You do not need the U-Turn statics any more. Stati(inside,inside) is to U-Turn a packet off the same interface it arrived. Like your 192.168.1.0/24 host with the FW as the gateway that wanted to reach 192.168.2.0/24 network.&amp;nbsp; The FW has to send it right back out the same interface right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I gave you those commands to fix the problem when you had everything broken - Gateway pointing the FW instead of the router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, I have asked you to fix it the right way.&amp;nbsp; So, you do not need those U-Turn translations or that sysopt command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can put back dns inspection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Dec 2009 00:00:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-and-multiple-internal-networks/m-p/1398611#M798936</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2009-12-19T00:00:44Z</dc:date>
    </item>
  </channel>
</rss>

