<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA interfaces in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-interfaces/m-p/1077893#M892819</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks John..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But why is this NAT command required though the interfaces are in the same security level and implicitly the traffic should be allowed between the 2 interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 03 Dec 2008 15:35:47 GMT</pubDate>
    <dc:creator>veena_kompal</dc:creator>
    <dc:date>2008-12-03T15:35:47Z</dc:date>
    <item>
      <title>ASA interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-interfaces/m-p/1077891#M892815</link>
      <description>&lt;P&gt;Hi there..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are 2 interfaces configured on ASA, where one is connected to 10.x.x.x and the other connected to 192.x.x.x ..the problem is there seems to be no communication between these two..any suggestions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FYI: they hav the same security level and the command to same-security-traffic permit inter-interface but still doesnt work..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:20:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-interfaces/m-p/1077891#M892815</guid>
      <dc:creator>veena_kompal</dc:creator>
      <dc:date>2019-03-11T14:20:32Z</dc:date>
    </item>
    <item>
      <title>Re: ASA interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-interfaces/m-p/1077892#M892817</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you ping the interface from the ASA itself, or are you trying to ping from a device in 10.x.x.x to a device in 192.x.x.x?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the latter, try this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Say you have 192.168.1.0 in a DMZ and 10.0.0.0 on your inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) 10.0.0.0 10.0.0.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clear xlate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See if you can ping the device now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Dec 2008 14:52:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-interfaces/m-p/1077892#M892817</guid>
      <dc:creator>John Blakley</dc:creator>
      <dc:date>2008-12-03T14:52:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-interfaces/m-p/1077893#M892819</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks John..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But why is this NAT command required though the interfaces are in the same security level and implicitly the traffic should be allowed between the 2 interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Dec 2008 15:35:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-interfaces/m-p/1077893#M892819</guid>
      <dc:creator>veena_kompal</dc:creator>
      <dc:date>2008-12-03T15:35:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-interfaces/m-p/1077894#M892822</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It shouldn't be required. Can you post your config?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Dec 2008 15:40:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-interfaces/m-p/1077894#M892822</guid>
      <dc:creator>John Blakley</dc:creator>
      <dc:date>2008-12-03T15:40:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASA interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-interfaces/m-p/1077895#M892824</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;please find the attached file..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Dec 2008 15:51:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-interfaces/m-p/1077895#M892824</guid>
      <dc:creator>veena_kompal</dc:creator>
      <dc:date>2008-12-03T15:51:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-interfaces/m-p/1077896#M892825</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm a little confused as to what you're trying to do. You have both vlan interfaces with the same security level, but you have only one of your ethernet ports in vlan2. Are you trying to not NAT between the interfaces at all, and make this a transparent firewall? You also have a global statement, which if you want to turn natting off, you need to remove. Your default gateway is .254 and it's on the inside of your network. Is this a proxy server? I've only seen same security levels between dmz and inside, but I've never seen it from out to in, so I may not be the best to answer how you have this configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Dec 2008 16:01:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-interfaces/m-p/1077896#M892825</guid>
      <dc:creator>John Blakley</dc:creator>
      <dc:date>2008-12-03T16:01:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-interfaces/m-p/1077897#M892826</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi John,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have two networks 10.x.x.x and 192.x.x.x .The firewal is used between these two networks and the 10.x.x.x should be able to access the 192.x.x.x. Apart from this there is no other specifications/requirments..but I will have to establish communication between 10.x.x.x to 192.x.x.x &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So any suggestions are welcome..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Dec 2008 16:10:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-interfaces/m-p/1077897#M892826</guid>
      <dc:creator>veena_kompal</dc:creator>
      <dc:date>2008-12-03T16:10:50Z</dc:date>
    </item>
    <item>
      <title>Re: ASA interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-interfaces/m-p/1077898#M892827</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Veena&lt;/P&gt;&lt;P&gt;as far as IM aware ping is disabled on the interfaces by default, try this command &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;icmp permit network add interface inside&lt;/P&gt;&lt;P&gt;icmp permit network add interface inside&lt;/P&gt;&lt;P&gt;icmp permit network add interface dmz&lt;/P&gt;&lt;P&gt;icmp permit network add interface dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Like John, Im confused as to you end goal, please care to elaborate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sol&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Dec 2008 16:11:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-interfaces/m-p/1077898#M892827</guid>
      <dc:creator>SOL10</dc:creator>
      <dc:date>2008-12-03T16:11:28Z</dc:date>
    </item>
    <item>
      <title>Re: ASA interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-interfaces/m-p/1077899#M892828</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Change the security level for vlan 2 to 0&lt;/P&gt;&lt;P&gt;2. Remove the global (inside) 1 interface command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After doing this, see if you can ping from the 10.x.x.x network to a device on the 192.x.x.x network. (Of course, it has to be a device in one of your ACLs.) You could remove the ACL from the inside interface just to test.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Dec 2008 16:16:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-interfaces/m-p/1077899#M892828</guid>
      <dc:creator>John Blakley</dc:creator>
      <dc:date>2008-12-03T16:16:32Z</dc:date>
    </item>
    <item>
      <title>Re: ASA interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-interfaces/m-p/1077900#M892830</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;John,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I change the security-level of vlan 2 to 0 then it would be considered as lower level though these 2 networks are trusted ones with in the organistaion.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is no dmz required..so basically its just that the firewall placed between two different internal networks..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Dec 2008 16:33:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-interfaces/m-p/1077900#M892830</guid>
      <dc:creator>veena_kompal</dc:creator>
      <dc:date>2008-12-03T16:33:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-interfaces/m-p/1077901#M892831</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You may need to enable nat to do what you want then. try this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.x.x.x 10.x.x.x netmask 255.255.255.0 &amp;lt;--whatever your mask is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See if that helps, but don't change your security levels on any of the interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Dec 2008 16:49:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-interfaces/m-p/1077901#M892831</guid>
      <dc:creator>John Blakley</dc:creator>
      <dc:date>2008-12-03T16:49:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-interfaces/m-p/1077902#M892832</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi John..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for the response..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did try to enter the above commands but I got error when I tried to configure the nat (inside)command..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyways..thanks for your help..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Dec 2008 11:24:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-interfaces/m-p/1077902#M892832</guid>
      <dc:creator>veena_kompal</dc:creator>
      <dc:date>2008-12-04T11:24:54Z</dc:date>
    </item>
  </channel>
</rss>

