<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cant pass traffic between interfaces with the same security in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cant-pass-traffic-between-interfaces-with-the-same-security/m-p/1112013#M892599</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, that worked a treat. Just out of interest, would it be easy to restrict Non-Opps-Orgs to a particular IP and protocol on the inside network?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 16 Dec 2008 14:13:53 GMT</pubDate>
    <dc:creator>Rex Biesty</dc:creator>
    <dc:date>2008-12-16T14:13:53Z</dc:date>
    <item>
      <title>Cant pass traffic between interfaces with the same security</title>
      <link>https://community.cisco.com/t5/network-security/cant-pass-traffic-between-interfaces-with-the-same-security/m-p/1112011#M892595</link>
      <description>&lt;P&gt;Hi. We have an ASA5510 firewall and I have 2 inside interfaces (both 100 security) on different subnets, both use NAT to access the internet. I'm trying to enable traffic from one interface (192.168.1.0) to my websense server on the other (172.16.1.8) so websense displays it's blockpage message (currently when users on 192.168.1.0 access a restricted site they're getting either a 'page cannot be displayed' message or a 'Live Search' page).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've tried adding the following commands but just cannot get it to work (not even ping). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 172.16.0.0 255.255.0.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Non-Opps-Orgs_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 172.16.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;nat (Non-Opps-Orgs) 0 access-list Non-Opps-Orgs_nat0_outbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All devices use the firewall as their default gateway and there are no static routes on any on the computers. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas would be greatly appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rex&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:22:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-pass-traffic-between-interfaces-with-the-same-security/m-p/1112011#M892595</guid>
      <dc:creator>Rex Biesty</dc:creator>
      <dc:date>2019-03-11T14:22:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cant pass traffic between interfaces with the same security</title>
      <link>https://community.cisco.com/t5/network-security/cant-pass-traffic-between-interfaces-with-the-same-security/m-p/1112012#M892597</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You're seeing one of the subtleties of the "nat-control" command.  Because you have a nat/global pair configured on the Non-Opps-Orgs interface to the outside, that's blocking the default functionality of the "no nat-control" feature for traffic to other interfaces, such as the inside interface.  This means you either have to configure an explicit nat exemption between the Non-Opps-Orgs and Inside interfaces (in both directions), or just configure static identity NAT between them (in both directions).  Personally, I prefer the old-school static identity NAT, since it's easy and obvious.  For example, if you add these two commands to your config I think it'll work:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,Non-Opps-Orgs) 172.16.1.0 172.16.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Non-Opps-Orgs,inside) 192.168.1.0 192.168.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Dec 2008 18:18:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-pass-traffic-between-interfaces-with-the-same-security/m-p/1112012#M892597</guid>
      <dc:creator>ddawson</dc:creator>
      <dc:date>2008-12-10T18:18:07Z</dc:date>
    </item>
    <item>
      <title>Re: Cant pass traffic between interfaces with the same security</title>
      <link>https://community.cisco.com/t5/network-security/cant-pass-traffic-between-interfaces-with-the-same-security/m-p/1112013#M892599</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, that worked a treat. Just out of interest, would it be easy to restrict Non-Opps-Orgs to a particular IP and protocol on the inside network?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Dec 2008 14:13:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-pass-traffic-between-interfaces-with-the-same-security/m-p/1112013#M892599</guid>
      <dc:creator>Rex Biesty</dc:creator>
      <dc:date>2008-12-16T14:13:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cant pass traffic between interfaces with the same security</title>
      <link>https://community.cisco.com/t5/network-security/cant-pass-traffic-between-interfaces-with-the-same-security/m-p/1112014#M892601</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You could restrict IP addresses by only doing NAT for the address(es) you want to allow, but to restrict by individual ports you'd be better off using access-lists.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Dec 2008 15:01:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-pass-traffic-between-interfaces-with-the-same-security/m-p/1112014#M892601</guid>
      <dc:creator>ddawson</dc:creator>
      <dc:date>2008-12-16T15:01:10Z</dc:date>
    </item>
    <item>
      <title>Re: Cant pass traffic between interfaces with the same security</title>
      <link>https://community.cisco.com/t5/network-security/cant-pass-traffic-between-interfaces-with-the-same-security/m-p/1112015#M892602</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Might be one to research in the new year but thanks for your help anyway, much appreciated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Dec 2008 15:22:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-pass-traffic-between-interfaces-with-the-same-security/m-p/1112015#M892602</guid>
      <dc:creator>Rex Biesty</dc:creator>
      <dc:date>2008-12-16T15:22:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cant pass traffic between interfaces with the same security</title>
      <link>https://community.cisco.com/t5/network-security/cant-pass-traffic-between-interfaces-with-the-same-security/m-p/1112016#M892604</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;question about your answer. Once upon a time wasn't there a limit on how many net statics you could have defined? Let say you had 20 subnets each with 255 addresses?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 21 Dec 2008 22:08:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-pass-traffic-between-interfaces-with-the-same-security/m-p/1112016#M892604</guid>
      <dc:creator>whanson</dc:creator>
      <dc:date>2008-12-21T22:08:50Z</dc:date>
    </item>
    <item>
      <title>Re: Cant pass traffic between interfaces with the same security</title>
      <link>https://community.cisco.com/t5/network-security/cant-pass-traffic-between-interfaces-with-the-same-security/m-p/1112017#M892608</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There's never been a hard limit on the number of static commands you could configure, though there were (and still are) limits on how big your entire configuration could be.  However, there did used to be more restrictions on statics that overlapped (they weren't allowed at all), but now you *can* have overlapping static commands and they are processed in order.  For example, say you have a network static but want to map one of the addresses in the network to some other public address.  This used to not be allowed, but now (as of 7.0) you can get the desired behavior as long as you configure the individual static command(s) before any more general network statics commands that would include the individual inside host(s).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Dec 2008 17:49:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-pass-traffic-between-interfaces-with-the-same-security/m-p/1112017#M892608</guid>
      <dc:creator>ddawson</dc:creator>
      <dc:date>2008-12-22T17:49:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cant pass traffic between interfaces with the same security</title>
      <link>https://community.cisco.com/t5/network-security/cant-pass-traffic-between-interfaces-with-the-same-security/m-p/1112018#M892611</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi DANA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;        I have a query on the ablove question.If we add the following entry&lt;/P&gt;&lt;P&gt; "access-list inside_nat0_outbound extended permit ip 172.16.0.0 255.255.0.0 192.168.1.0 255.255.255.0" will it work?&lt;/P&gt;&lt;P&gt;look for ur valuable answer..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ullas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Dec 2008 19:25:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-pass-traffic-between-interfaces-with-the-same-security/m-p/1112018#M892611</guid>
      <dc:creator>ullasupendran</dc:creator>
      <dc:date>2008-12-22T19:25:17Z</dc:date>
    </item>
    <item>
      <title>Re: Cant pass traffic between interfaces with the same security</title>
      <link>https://community.cisco.com/t5/network-security/cant-pass-traffic-between-interfaces-with-the-same-security/m-p/1112019#M892614</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, that will work too, since the "nat 0 access-list" command *does* have the side effect of creating the necessary xlates for lower-to-higher traffic.  Many people prefer this approach, but I still like the "old way" since it's usually fewer commands.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Dec 2008 20:50:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-pass-traffic-between-interfaces-with-the-same-security/m-p/1112019#M892614</guid>
      <dc:creator>ddawson</dc:creator>
      <dc:date>2008-12-22T20:50:31Z</dc:date>
    </item>
  </channel>
</rss>

