<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: all internal interfaces cannon communicate in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/all-internal-interfaces-cannon-communicate/m-p/1357093#M857660</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My friend I was trying to help, my bad for not reading the whole config and just focusing on the BOLD text, as for your problem, I see that you have a nat applied to the acc-protected interface, having this nat here would require you to have a global on any egress interface, have you tried using a static nat to that server on the acc-protected interface? Can you maybe get some logs that wold reflect what the firewall is doing with the packet? Hope this is not as average as the other..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 09 Dec 2009 17:56:40 GMT</pubDate>
    <dc:creator>Ivan Martinon</dc:creator>
    <dc:date>2009-12-09T17:56:40Z</dc:date>
    <item>
      <title>all internal interfaces cannon communicate</title>
      <link>https://community.cisco.com/t5/network-security/all-internal-interfaces-cannon-communicate/m-p/1357090#M857657</link>
      <description>&lt;P&gt;I need help. I have&amp;nbsp; ASA 55xx with the multiple public IPs setup on outside interface via PPPoE. I have most common activity on all my local interfaces (nated to statics outside) like www, 443, pop3, etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is config (I&amp;nbsp; removed unnecessary)&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;SPAN style="font-family: Arial; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;names &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;name 192.168.2.10 &lt;STRONG&gt;SQL_server&lt;/STRONG&gt; &lt;BR /&gt;! &lt;BR /&gt;interface Vlan1 &lt;BR /&gt;nameif inside &lt;BR /&gt;security-level 100 &lt;BR /&gt;ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;! &lt;BR /&gt;interface Vlan2 &lt;BR /&gt;nameif outside &lt;BR /&gt;security-level 0 &lt;BR /&gt;pppoe client vpdn group ATT &lt;BR /&gt;ip address pppoe &lt;BR /&gt;! &lt;BR /&gt;interface Vlan3 &lt;BR /&gt;nameif sql &lt;BR /&gt;security-level 100 &lt;BR /&gt;ip address 192.168.2.1 255.255.255.0 &lt;BR /&gt;! &lt;BR /&gt;interface Vlan4 &lt;BR /&gt;nameif acc_protected &lt;BR /&gt;security-level 100 &lt;BR /&gt;ip address 192.168.0.1 255.255.255.0 &lt;BR /&gt;! &lt;BR /&gt;! &lt;BR /&gt;same-security-traffic permit inter-interface &lt;BR /&gt;same-security-traffic permit intra-interface &lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq 1433 &lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq ftp &lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq 3001 &lt;BR /&gt;access-list outside-entry extended permit tcp any host xx.xxx.xxx.230 eq 1433 &lt;BR /&gt;access-list inside_mpc extended permit tcp any any eq www inactive &lt;BR /&gt;access-list inside_mpc extended permit tcp any any eq 8080 inactive &lt;BR /&gt;access-list DMZtoInside extended permit tcp host 192.168.0.1 host SQL_server eq 1433 &lt;BR /&gt;access-list DMZtoacc_protected extended permit tcp host SQL_server host 192.168.0.1 eq 1433 &lt;BR /&gt;! &lt;BR /&gt;! &lt;BR /&gt;&lt;STRONG&gt;nat-control &lt;BR /&gt;global (outside) 1 xx.xxx.xxx.227 netmask 255.255.255.255 &lt;BR /&gt;global (outside) 2 xx.xxx.xxx.230 netmask 255.255.255.255 &lt;BR /&gt;global (outside) 3 xx.xxx.xxx.229 netmask 255.255.255.255 &lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0 &lt;BR /&gt;nat (sql) 2 SQL_server 255.255.255.255 &lt;BR /&gt;nat (acc_protected) 3 0.0.0.0 0.0.0.0 &lt;BR /&gt;static (sql,outside) tcp interface 1433 SQL_server 1433 netmask 255.255.255.255 &lt;BR /&gt;static (sql,outside) tcp interface ftp SQL_server ftp netmask 255.255.255.255 &lt;BR /&gt;access-group outside_access_in in interface outside &lt;BR /&gt;route outside xx.xxx.xxx.227 255.255.255.255 192.168.1.1 1 &lt;BR /&gt;route outside xx.xxx.xxx.230 255.255.255.255 192.168.2.1 1 &lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 192.168.1.1 1 &lt;BR /&gt;route outside xx.xxx.xxx.229 255.255.255.255 192.168.0.1 1 &lt;/STRONG&gt;&lt;BR /&gt;! &lt;BR /&gt;! &lt;BR /&gt;policy-map type inspect dns preset_dns_map &lt;BR /&gt;parameters &lt;BR /&gt;message-length maximum 512 &lt;BR /&gt;policy-map type inspect http http_inspection_policy &lt;BR /&gt;parameters &lt;BR /&gt;protocol-violation action drop-connection &lt;BR /&gt;match request method connect &lt;BR /&gt;drop-connection log &lt;BR /&gt;class AppHeaderClass &lt;BR /&gt;drop-connection log &lt;BR /&gt;class BlockDomainClass &lt;BR /&gt;reset log &lt;BR /&gt;class BlockURLsClass &lt;BR /&gt;reset log &lt;BR /&gt;policy-map global_policy &lt;BR /&gt;class inspection_default &lt;BR /&gt;inspect dns preset_dns_map &lt;BR /&gt;inspect ftp &lt;BR /&gt;inspect h323 h225 &lt;BR /&gt;inspect h323 ras &lt;BR /&gt;inspect rsh &lt;BR /&gt;inspect rtsp &lt;BR /&gt;inspect esmtp &lt;BR /&gt;inspect sqlnet &lt;BR /&gt;inspect skinny &lt;BR /&gt;inspect sunrpc &lt;BR /&gt;inspect xdmcp &lt;BR /&gt;inspect sip &lt;BR /&gt;inspect netbios &lt;BR /&gt;inspect tftp &lt;BR /&gt;policy-map inside-policy &lt;BR /&gt;class httptraffic &lt;BR /&gt;inspect http http_inspection_policy &lt;BR /&gt;! &lt;BR /&gt;service-policy global_policy global &lt;BR /&gt;service-policy inside-policy interface inside &lt;BR /&gt;smtp-server xx.xxx.xxx.195 &lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:6ea76e35e66277a1cc48abc1e5bc049b &lt;BR /&gt;: end &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt;Problem:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;all remote clients(from cloud) can contact&amp;nbsp; and communicate with SQL_server (see names). However, there are no communications from acc-protected interface to it.&amp;nbsp; Also all internal interfaces cannot see each other.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:46:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/all-internal-interfaces-cannon-communicate/m-p/1357090#M857657</guid>
      <dc:creator>evinogradov</dc:creator>
      <dc:date>2019-03-11T16:46:40Z</dc:date>
    </item>
    <item>
      <title>Re: all internal interfaces cannon communicate</title>
      <link>https://community.cisco.com/t5/network-security/all-internal-interfaces-cannon-communicate/m-p/1357091#M857658</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Communication between interfaces with the same security level is blocked by default, you need to enable it with the command "same-security-traffic permit inter-interface" along with the proper nat and access control rules.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Dec 2009 23:38:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/all-internal-interfaces-cannon-communicate/m-p/1357091#M857658</guid>
      <dc:creator>Ivan Martinon</dc:creator>
      <dc:date>2009-12-08T23:38:31Z</dc:date>
    </item>
    <item>
      <title>Re: all internal interfaces cannon communicate</title>
      <link>https://community.cisco.com/t5/network-security/all-internal-interfaces-cannon-communicate/m-p/1357092#M857659</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ivan, did you see my config before posting some average recommendation?&lt;/P&gt;&lt;P&gt;Isn't it enough:&amp;nbsp; "same-security-traffic permit inter-interface". Do I need it double? &lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Dec 2009 17:47:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/all-internal-interfaces-cannon-communicate/m-p/1357092#M857659</guid>
      <dc:creator>evinogradov</dc:creator>
      <dc:date>2009-12-09T17:47:14Z</dc:date>
    </item>
    <item>
      <title>Re: all internal interfaces cannon communicate</title>
      <link>https://community.cisco.com/t5/network-security/all-internal-interfaces-cannon-communicate/m-p/1357093#M857660</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My friend I was trying to help, my bad for not reading the whole config and just focusing on the BOLD text, as for your problem, I see that you have a nat applied to the acc-protected interface, having this nat here would require you to have a global on any egress interface, have you tried using a static nat to that server on the acc-protected interface? Can you maybe get some logs that wold reflect what the firewall is doing with the packet? Hope this is not as average as the other..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Dec 2009 17:56:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/all-internal-interfaces-cannon-communicate/m-p/1357093#M857660</guid>
      <dc:creator>Ivan Martinon</dc:creator>
      <dc:date>2009-12-09T17:56:40Z</dc:date>
    </item>
    <item>
      <title>Re: all internal interfaces cannon communicate</title>
      <link>https://community.cisco.com/t5/network-security/all-internal-interfaces-cannon-communicate/m-p/1357094#M857661</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ivan, I appriciate for such a quick response. Exactly, there are no visible issues with nat. I tried everithing: static on sql server, static to domain controller on inside interface instead of global. Could just suprise me with someting that I didn't try. I think that, IMHO, the problem related to ppp outside. First, it's obtaining xx.xxx.xxx.230 public IP by pppoe&lt;/P&gt;&lt;P&gt;ciscoasa#sh interface outside&lt;/P&gt;&lt;P&gt;Interface Vlan2 "outside", is up, line protocol is up&lt;BR /&gt;&amp;nbsp; Hardware is EtherSVI&lt;BR /&gt; MAC address 0024.14f3.9a66, MTU 1492&lt;BR /&gt; IP address xx.xxx.xxx.230, subnet mask 255.255.255.255&lt;BR /&gt;&amp;nbsp; Traffic Statistics for "outside":&lt;BR /&gt; 10532229 packets input, 8427437415 bytes&lt;BR /&gt; 4093500 packets output, 1009222741 bytes&lt;BR /&gt; 280315 packets dropped&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 minute input rate 13 pkts/sec,&amp;nbsp; 12924 bytes/sec&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 minute output rate 5 pkts/sec,&amp;nbsp; 1830 bytes/sec&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 minute drop rate, 0 pkts/sec&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5 minute input rate 17 pkts/sec,&amp;nbsp; 14808 bytes/sec&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5 minute output rate 7 pkts/sec,&amp;nbsp; 2070 bytes/sec&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5 minute drop rate, 0 pkts/sec&lt;BR /&gt;This static IP belongs to outside interface. All other statics outside I get manually by the global pools. After, I can't apply any static nat to the global pools. It's working but under global rules. So, kind of confising for myself.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Dec 2009 19:00:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/all-internal-interfaces-cannon-communicate/m-p/1357094#M857661</guid>
      <dc:creator>evinogradov</dc:creator>
      <dc:date>2009-12-09T19:00:29Z</dc:date>
    </item>
    <item>
      <title>Re: all internal interfaces cannon communicate</title>
      <link>https://community.cisco.com/t5/network-security/all-internal-interfaces-cannon-communicate/m-p/1357095#M857662</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well first of all we need to find out how are those hosts looking for this server, what IP address are they using to reach it? Can you ping this ip address? try turning on logs on the ASA when pinging this ip address and let me know what is the message you get there my point is first we need to confirm if it is due to a missing translation or something else but for that we need the logs and find out what is the correct symptom.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As for the nat I meant something like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (sql,acc-protected) tcp interface 1433 SQL_server 1433 netmask 255.255.255.255 &lt;BR /&gt;static (sql,acc-protected) tcp interface ftp SQL_server ftp netmask 255.255.255.255 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Has this been applied?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As well please go ahead and try this command on the ASA and paste the output here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input interface acc-protected tcp &lt;HOST on="" the="" acc-protected="" interface=""&gt; 1024 192.168.2.10 1433 detailed&lt;/HOST&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Dec 2009 19:09:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/all-internal-interfaces-cannon-communicate/m-p/1357095#M857662</guid>
      <dc:creator>Ivan Martinon</dc:creator>
      <dc:date>2009-12-09T19:09:43Z</dc:date>
    </item>
    <item>
      <title>Re: all internal interfaces cannon communicate</title>
      <link>https://community.cisco.com/t5/network-security/all-internal-interfaces-cannon-communicate/m-p/1357096#M857663</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ivan, here is my likely message for the last few days after&lt;/P&gt;&lt;P&gt;static (sql,acc_protected) tcp interface 1433 SQL_server 1433 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;P.S. I dont need FTP here&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;#packet-tracer input acc_protected tcp 192.168.0.1 1024 192.168.2.10 1433 detailed&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 192.168.2.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; sql&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x41c9930, priority=500, domain=permit, deny=true&lt;BR /&gt; hits=11, user_data=0x6, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip=192.168.0.1, mask=255.255.255.255, port=0&lt;BR /&gt; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: acc_protected&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: sql&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or with&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip verify reverse-path interface acc_protected&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 192.168.2.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; sql&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 192.168.0.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.255 identity&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: acc_protected&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (rpf-violated) Reverse-path verify failed&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Dec 2009 20:06:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/all-internal-interfaces-cannon-communicate/m-p/1357096#M857663</guid>
      <dc:creator>evinogradov</dc:creator>
      <dc:date>2009-12-09T20:06:57Z</dc:date>
    </item>
    <item>
      <title>Re: all internal interfaces cannon communicate</title>
      <link>https://community.cisco.com/t5/network-security/all-internal-interfaces-cannon-communicate/m-p/1357097#M857664</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;resolved.&lt;/P&gt;&lt;P&gt;! &lt;BR /&gt;interface Vlan2 &lt;BR /&gt;nameif outside &lt;BR /&gt;security-level 0 &lt;BR /&gt;pppoe client vpdn group ATT &lt;BR /&gt;ip address pppoe &lt;STRONG&gt;setroute&lt;/STRONG&gt;&lt;SPAN style="text-decoration: underline;"&gt; - default route from ISP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ivan, thanks for participation.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 13 Dec 2009 02:54:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/all-internal-interfaces-cannon-communicate/m-p/1357097#M857664</guid>
      <dc:creator>evinogradov</dc:creator>
      <dc:date>2009-12-13T02:54:52Z</dc:date>
    </item>
  </channel>
</rss>

