<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Forward traffics between two security contexts in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/forward-traffics-between-two-security-contexts/m-p/1427773#M851500</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Happy to be of help to you.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 19 Jun 2010 01:45:04 GMT</pubDate>
    <dc:creator>edadios</dc:creator>
    <dc:date>2010-06-19T01:45:04Z</dc:date>
    <item>
      <title>Forward traffics between two security contexts</title>
      <link>https://community.cisco.com/t5/network-security/forward-traffics-between-two-security-contexts/m-p/1427768#M851495</link>
      <description>&lt;P&gt;Hi experts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have 5510 ASA with security plus license and can support two security contexts. In my case, I will share E0/0 as the outside interface to Internet. I will have VLANs on E0/1 (sub-interfaces) and I don't know if I should share them all between two contexts or assign half to one context and rest to another. Please note that I will have inter VLAN traffic between any two VLANs and the ASA needs to do inter-vlan routing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I actually never really want to partition the firewall. The only reason is that I want to run active/active failover with another ASA5510. Do you think I should configure the failover this way or it will better just to keep it simple and run Active/Standby? Can anybody please provide me an example config?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;Difan&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:00:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/forward-traffics-between-two-security-contexts/m-p/1427768#M851495</guid>
      <dc:creator>Difan Zhao</dc:creator>
      <dc:date>2019-03-11T18:00:01Z</dc:date>
    </item>
    <item>
      <title>Re: Forward traffics between two security contexts</title>
      <link>https://community.cisco.com/t5/network-security/forward-traffics-between-two-security-contexts/m-p/1427769#M851496</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It will be best to set interfaces independently of contexts, specially if you plan to do active active.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If still sharing the outside, please note that you need to ensure you create the translations for the devices behind specific context, as this is the way for the firewall to determine which context traffic should be forward to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/customer/docs/security/asa/asa82/configuration/guide/contexts.html#wp1146806"&gt;http://www.cisco.com/en/US/customer/docs/security/asa/asa82/configuration/guide/contexts.html#wp1146806&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Active active failover configuration guide is here :&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/customer/docs/security/asa/asa82/configuration/guide/ha_active_active.html"&gt;http://www.cisco.com/en/US/customer/docs/security/asa/asa82/configuration/guide/ha_active_active.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you will be sharing interfaces and active active setup, the more you will need to be carefull about routing, and making sure you have classification of traffic for specific context defined.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you need the badwidth then doing active active will help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do remeber that setting up for multicontext, and active active, will not support features like vpn termination among others.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/customer/docs/security/asa/asa82/configuration/guide/contexts.html#wp1146747"&gt;http://www.cisco.com/en/US/customer/docs/security/asa/asa82/configuration/guide/contexts.html#wp1146747&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to make it simple, do subinterface on e0/0 too, do not share outside interfaces, and do active stand by setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jun 2010 06:48:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/forward-traffics-between-two-security-contexts/m-p/1427769#M851496</guid>
      <dc:creator>edadios</dc:creator>
      <dc:date>2010-06-16T06:48:08Z</dc:date>
    </item>
    <item>
      <title>Re: Forward traffics between two security contexts</title>
      <link>https://community.cisco.com/t5/network-security/forward-traffics-between-two-security-contexts/m-p/1427770#M851497</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Edadios,&lt;/P&gt;&lt;P&gt;Thanks for reply! K let's forget about the failover for now. Just two contexts (admin and Context1) and I want VLAN100 of admin be able to talk to VLAN20 of Context1. Here is my current config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;=========== sysetm ===============&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.20&lt;BR /&gt; vlan 20&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1.100&lt;BR /&gt; vlan 100&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;admin-context admin&lt;BR /&gt;context admin&lt;BR /&gt;&amp;nbsp; allocate-interface Ethernet0/0&lt;BR /&gt;&amp;nbsp; allocate-interface Ethernet0/1.100&lt;BR /&gt;&amp;nbsp; allocate-interface Management0/0&lt;BR /&gt;&amp;nbsp; config-url disk0:/admin.cfg&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;context Context1&lt;BR /&gt;&amp;nbsp; description Test Context&lt;BR /&gt;&amp;nbsp; allocate-interface Ethernet0/0 visible&lt;BR /&gt;&amp;nbsp; allocate-interface Ethernet0/1.20 visible&lt;BR /&gt;&amp;nbsp; config-url disk0:/Context1.cfg&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;===========&amp;nbsp; admin&amp;nbsp; ==============&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 1.1.1.2 255.255.255.128&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1.100&lt;BR /&gt; nameif vlan100&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.1.100.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;BR /&gt;nat (vlan100) 1 10.1.100.0 255.255.255.0&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 1.1.1.1 1&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;route outside 10.1.20.0 255.255.255.0 1.1.1.3 1&lt;/SPAN&gt;&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;============= Context1 ==============&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 1.1.1.3 255.255.255.128&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1.20&lt;BR /&gt; nameif vlan20&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.1.20.1 255.255.255.0&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;access-list ACL_outside extended permit icmp any any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;access-group ACL_outside in interface outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;BR /&gt;nat (vlan20) 1 10.1.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;static (vlan20,outside) 10.1.20.0 10.1.20.0 netmask 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #333333;"&gt;route outside 0.0.0.0 0.0.0.0 1.1.1.1 1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;route outside 10.1.100.0 255.255.255.0 1.1.1.2 1&lt;/SPAN&gt;&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above configs (especially the ones in red) are required for a PC (10.1.100.100 of admin context) to ping another PC (10.1.20.100 of Context1). However in this case the PC 10.1.20.100 can't browse Internet anymore because of the "static ()" command... There is no easier way of doing this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jun 2010 23:08:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/forward-traffics-between-two-security-contexts/m-p/1427770#M851497</guid>
      <dc:creator>Difan Zhao</dc:creator>
      <dc:date>2010-06-16T23:08:30Z</dc:date>
    </item>
    <item>
      <title>Re: Forward traffics between two security contexts</title>
      <link>https://community.cisco.com/t5/network-security/forward-traffics-between-two-security-contexts/m-p/1427771#M851498</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Remove the static you configured for Context1&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;no static (vlan20,outside) 10.1.20.0&amp;nbsp; 10.1.20.0 netmask 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configure this in Context1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;################&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 10.1.20.0 255.255.255.0 10.1.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (vlan20,outside) 10.1.20.0 access-list 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clear xlate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clear local-host&lt;/P&gt;&lt;P&gt;################&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Last two lines will clear connections, and rebuild when traffic passes&amp;nbsp; again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the documentation for you:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/s8.html#wp1414075"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/s8.html#wp1414075&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Jun 2010 03:08:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/forward-traffics-between-two-security-contexts/m-p/1427771#M851498</guid>
      <dc:creator>edadios</dc:creator>
      <dc:date>2010-06-17T03:08:13Z</dc:date>
    </item>
    <item>
      <title>Re: Forward traffics between two security contexts</title>
      <link>https://community.cisco.com/t5/network-security/forward-traffics-between-two-security-contexts/m-p/1427772#M851499</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The command works! Now traffic can pass between two contexts. However I also find out that the number of configs will increase exponentially if I have more than one VLAN that I want traffic to pass through... So I decide to give up the active/active failover setup... Thanks a lot for your help! &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Jun 2010 22:46:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/forward-traffics-between-two-security-contexts/m-p/1427772#M851499</guid>
      <dc:creator>Difan Zhao</dc:creator>
      <dc:date>2010-06-18T22:46:07Z</dc:date>
    </item>
    <item>
      <title>Re: Forward traffics between two security contexts</title>
      <link>https://community.cisco.com/t5/network-security/forward-traffics-between-two-security-contexts/m-p/1427773#M851500</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Happy to be of help to you.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Jun 2010 01:45:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/forward-traffics-between-two-security-contexts/m-p/1427773#M851500</guid>
      <dc:creator>edadios</dc:creator>
      <dc:date>2010-06-19T01:45:04Z</dc:date>
    </item>
    <item>
      <title>Re: Forward traffics between two security contexts</title>
      <link>https://community.cisco.com/t5/network-security/forward-traffics-between-two-security-contexts/m-p/1427774#M851501</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great solution.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jun 2010 06:40:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/forward-traffics-between-two-security-contexts/m-p/1427774#M851501</guid>
      <dc:creator>game123</dc:creator>
      <dc:date>2010-06-22T06:40:29Z</dc:date>
    </item>
  </channel>
</rss>

