<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5510 Routing in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-routing/m-p/3761662#M8473</link>
    <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for reply. I also read that during google search and i have configure the security level, access list and assign to the interface.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;description WAN_Interface&lt;/P&gt;&lt;P&gt;nameif WAN&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 129.126.183.228 255.255.255.248&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;description LAN_Interface&lt;/P&gt;&lt;P&gt;nameif LAN&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 172.31.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list WAN_access_in extended permit ip any any log&lt;/P&gt;&lt;P&gt;access-list LAN_access_in extended permit ip any any log&lt;/P&gt;&lt;P&gt;access-group WAN_access_in in interface WAN&lt;/P&gt;&lt;P&gt;access-group LAN_access_in in interface LAN&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, both pc still cannot ping to each other.&lt;/P&gt;</description>
    <pubDate>Wed, 12 Dec 2018 03:23:38 GMT</pubDate>
    <dc:creator>zheepern0826</dc:creator>
    <dc:date>2018-12-12T03:23:38Z</dc:date>
    <item>
      <title>ASA 5510 Routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-routing/m-p/3761647#M8468</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;I just got a ASA 5510 and have some problem during setup.&lt;BR /&gt;Below is my sample diagram:&lt;/P&gt;&lt;P&gt;PC(10.126.183.225) ----- ASA e0/0 (10.126.183.228/29) ---- ASA e0/1 (172.16.0.1/24) ---- PC(172.16.0.50)&lt;/P&gt;&lt;P&gt;Both pc can ping to the gateway interface at ASA but they are unable to ping to each other.&lt;BR /&gt;Below is my config.&lt;/P&gt;&lt;P&gt;FW1# sh run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(5)13&lt;BR /&gt;!&lt;BR /&gt;hostname FW1&lt;BR /&gt;domain-name test.sg&lt;BR /&gt;enable password 9jNfZuG3TC5tCVH0 encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;description WAN_Interface&lt;BR /&gt;nameif WAN&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.126.183.228 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;description LAN_Interface&lt;BR /&gt;nameif LAN&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 172.16.0.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;nameif Mgmt&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;banner motd "Test."&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone SGP 8&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;domain-name test.sg&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging standby&lt;BR /&gt;logging buffer-size 65536&lt;BR /&gt;logging console critical&lt;BR /&gt;logging buffered informational&lt;BR /&gt;logging trap informational&lt;BR /&gt;logging history informational&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging facility 17&lt;BR /&gt;mtu WAN 1500&lt;BR /&gt;mtu LAN 1500&lt;BR /&gt;mtu Mgmt 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any WAN&lt;BR /&gt;icmp permit any echo WAN&lt;BR /&gt;icmp permit any LAN&lt;BR /&gt;icmp permit any echo LAN&lt;BR /&gt;asdm image disk0:/asdm-645-206.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;route WAN 0.0.0.0 0.0.0.0 10.126.183.225 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication serial console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http server session-timeout 5&lt;BR /&gt;http 192.168.1.0 255.255.255.0 Mgmt&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 15&lt;BR /&gt;ssh version 2&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 216.239.35.4&lt;BR /&gt;webvpn&lt;BR /&gt;username admin password e1z89R3cZe9Kt6Ib encrypted privilege 15&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;no active&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination address email callhome@cisco.com&lt;BR /&gt;destination transport-method http&lt;BR /&gt;subscribe-to-alert-group diagnostic&lt;BR /&gt;subscribe-to-alert-group environment&lt;BR /&gt;subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:5be53063e364c0996b7c846a0907d315&lt;BR /&gt;: end&lt;BR /&gt;FW1#&lt;/P&gt;&lt;P&gt;When i check the route, routing is exist but both PC unable to ping.&lt;BR /&gt;FW1# sh route&lt;/P&gt;&lt;P&gt;Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP&lt;BR /&gt;D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;BR /&gt;N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;BR /&gt;E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP&lt;BR /&gt;i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area&lt;BR /&gt;* - candidate default, U - per-user static route, o - ODR&lt;BR /&gt;P - periodic downloaded static route&lt;/P&gt;&lt;P&gt;Gateway of last resort is 129.126.183.225 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;C 172.31.0.0 255.255.255.0 is directly connected, LAN&lt;BR /&gt;C 129.126.183.224 255.255.255.248 is directly connected, WAN&lt;BR /&gt;S* 0.0.0.0 0.0.0.0 [1/0] via 129.126.183.225, WAN&lt;BR /&gt;FW1#&lt;/P&gt;&lt;P&gt;Possible to advise what i have missed out ?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:33:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-routing/m-p/3761647#M8468</guid>
      <dc:creator>zheepern0826</dc:creator>
      <dc:date>2020-02-21T16:33:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-routing/m-p/3761650#M8471</link>
      <description>&lt;P&gt;You need NAT rules between the two interfaces as they have the same security level.&amp;nbsp; If one interface had a higher security level than the other, you would also need to add an access-list and an access-group applying it to allow the traffic from the lower security level interface.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Dec 2018 01:45:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-routing/m-p/3761650#M8471</guid>
      <dc:creator>cmgossett1983</dc:creator>
      <dc:date>2018-12-12T01:45:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-routing/m-p/3761662#M8473</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for reply. I also read that during google search and i have configure the security level, access list and assign to the interface.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;description WAN_Interface&lt;/P&gt;&lt;P&gt;nameif WAN&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 129.126.183.228 255.255.255.248&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;description LAN_Interface&lt;/P&gt;&lt;P&gt;nameif LAN&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 172.31.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list WAN_access_in extended permit ip any any log&lt;/P&gt;&lt;P&gt;access-list LAN_access_in extended permit ip any any log&lt;/P&gt;&lt;P&gt;access-group WAN_access_in in interface WAN&lt;/P&gt;&lt;P&gt;access-group LAN_access_in in interface LAN&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, both pc still cannot ping to each other.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Dec 2018 03:23:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-routing/m-p/3761662#M8473</guid>
      <dc:creator>zheepern0826</dc:creator>
      <dc:date>2018-12-12T03:23:38Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-routing/m-p/3761668#M8475</link>
      <description>&lt;P&gt;instead of ip, allow icmp on your access list as its different&lt;/P&gt;</description>
      <pubDate>Wed, 12 Dec 2018 03:25:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-routing/m-p/3761668#M8475</guid>
      <dc:creator>Dennis Mink</dc:creator>
      <dc:date>2018-12-12T03:25:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-routing/m-p/3761687#M8477</link>
      <description>&lt;P&gt;Hi Dennis,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have create a object group with icmp services and include in the acl.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object-group service PING&lt;BR /&gt;service-object ip&lt;BR /&gt;service-object icmp&lt;BR /&gt;service-object icmp echo&lt;BR /&gt;service-object icmp echo-reply&lt;BR /&gt;service-object icmp traceroute&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list WAN_access_in extended permit object-group PING any any log&lt;BR /&gt;access-list LAN_access_in extended permit object-group PING any any log&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-group WAN_access_in in interface WAN&lt;BR /&gt;access-group WAN_access_in out interface WAN&lt;BR /&gt;access-group LAN_access_in in interface LAN&lt;BR /&gt;access-group LAN_access_in out interface LAN&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;***EDITED*****&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I&amp;nbsp; able to ping from both PC now.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you very much&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Dec 2018 05:10:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-routing/m-p/3761687#M8477</guid>
      <dc:creator>zheepern0826</dc:creator>
      <dc:date>2018-12-12T05:10:09Z</dc:date>
    </item>
  </channel>
</rss>

