<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA Intra Interface Traffic only allowing ICMP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-intra-interface-traffic-only-allowing-icmp/m-p/1093717#M895002</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;access-list inside_nat0_outbound extended deny ip any 172.30.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended deny ip 172.32.2.0 255.255.255.0 172.32.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 16 Oct 2008 20:42:04 GMT</pubDate>
    <dc:creator>acomiskey</dc:creator>
    <dc:date>2008-10-16T20:42:04Z</dc:date>
    <item>
      <title>ASA Intra Interface Traffic only allowing ICMP</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-traffic-only-allowing-icmp/m-p/1093708#M894993</link>
      <description>&lt;P&gt;I have seen some previous posts regarding this matter but the solution is not quite clear.  Here is my issue:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a ASA 5505 that has 2 conifugred VLAN's; inside and outside.  Outside takes Ethernet 0/0 and inside takkes Ethernet 0/1 - 0/7.  I use outside for VPN connections and inside for internal LAN use.  The inside is on the 172.30.0.0/24 subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to connect another network subnet, 172.30.2.0/24, to the inside 172.30.0.0/24 network.  I have a router at 172.30.0.80 that is set to route between 172.30.0.0/24 and 172.30.2.0/24 and I have set a static route in my ASA to allow traffic headed to 172.30.2.0/24 to use 172.30.0.80 as it's default gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can ping devices on the 172.30.2.0/24 subnet but I cannot establish a TCP connection.  It looks like previous people have mentioned this is because ICMP is using UDP stateless connections while TCP is stateful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Has anyone found a workaround for this problem?  I am running ASA 7.2(4).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks much in advance!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:58:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-traffic-only-allowing-icmp/m-p/1093708#M894993</guid>
      <dc:creator>nsalemme1</dc:creator>
      <dc:date>2019-03-11T13:58:27Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Intra Interface Traffic only allowing ICMP</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-traffic-only-allowing-icmp/m-p/1093709#M894994</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can do either....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (inside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 172.30.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nat0 extended permit ip 172.32.0.0 255.255.255.0 172.32.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nat0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Oct 2008 17:22:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-traffic-only-allowing-icmp/m-p/1093709#M894994</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2008-10-16T17:22:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Intra Interface Traffic only allowing ICMP</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-traffic-only-allowing-icmp/m-p/1093710#M894995</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the quick reply!  So the first set of commands you provided actually returns on error:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;saxton-co-asa(config)# nat (inside) 172.30.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;                                       ^&lt;/P&gt;&lt;P&gt;ERROR: % Invalid input detected at '^' marker.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The second set of commands seems to overwrite existing NAT exempt rules I have set in place.  I believe I have everything on the inside interface to be NAT exempt.  I've pasted parts of my running config below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.30.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list outside_1_cryptomap extended permit ip 172.30.0.0 255.255.255.0 172.30.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list vpns remark &lt;NAME&gt;&lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;access-list vpns standard permit 172.30.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list vpns remark &lt;NAME&gt;&lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;access-list vpns standard permit 172.30.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list vpns remark &lt;BLAH&gt;&lt;/BLAH&gt;&lt;/P&gt;&lt;P&gt;access-list vpns standard permit 10.252.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list vpns remark &lt;BLAH&gt;&lt;/BLAH&gt;&lt;/P&gt;&lt;P&gt;access-list vpns standard permit &lt;BLAH&gt; 255.255.255.0&lt;/BLAH&gt;&lt;/P&gt;&lt;P&gt;access-list outside_2_cryptomap extended permit ip 172.30.0.0 255.255.255.0 10.252.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_3_cryptomap extended permit ip 172.30.0.0 255.255.255.0 &lt;BLAH&gt; 255.255.255.0&lt;/BLAH&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound_1 extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list outside_nat0_outbound extended permit ip any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;ip local pool vpnpool 172.30.0.132-172.30.0.163 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;icmp deny any outside&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-524.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound_1 outside&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (outside) 0 access-list outside_nat0_outbound&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;route inside 172.30.2.0 255.255.255.0 172.30.0.80 1&lt;/P&gt;&lt;P&gt;route inside 172.30.3.0 255.255.255.0 172.30.0.80 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry about all the access lists.  Those are there for several VPN connections coming into the ASA.  So how exactly should I be changing my inside interface NAT rules?  Do I want to be NATing from 172.30.0.0 to 172.30.2.0 or do I want to be excluding it?  Right now I have everything setup to exclude.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the error I get in the logs...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Built inbound TCP connection 24559 for inside:172.30.0.2/58202 (172.30.0.2/58202) to inside:172.30.2.2/22 (172.30.2.2/22)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Teardown TCP connection 24559 for inside:172.30.0.2/58202 to inside:172.30.2.2/22 duration 0:00:00 bytes 0 TCP Reset-O&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Deny TCP (no connection) from 172.30.0.2/58202 to 172.30.2.2/22 flags RST  on interface inside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Oct 2008 18:01:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-traffic-only-allowing-icmp/m-p/1093710#M894995</guid>
      <dc:creator>nsalemme1</dc:creator>
      <dc:date>2008-10-16T18:01:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Intra Interface Traffic only allowing ICMP</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-traffic-only-allowing-icmp/m-p/1093711#M894996</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, I missed a "1".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.30.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would do this...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended deny ip any 172.30.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any any &lt;/P&gt;&lt;P&gt;global (inside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Oct 2008 18:09:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-traffic-only-allowing-icmp/m-p/1093711#M894996</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2008-10-16T18:09:28Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Intra Interface Traffic only allowing ICMP</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-traffic-only-allowing-icmp/m-p/1093712#M894997</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unfortunately still no luck.  I am getting the Deny TCP connection in the ASA logs still.  Very aggravating...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Oct 2008 18:33:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-traffic-only-allowing-icmp/m-p/1093712#M894997</guid>
      <dc:creator>nsalemme1</dc:creator>
      <dc:date>2008-10-16T18:33:07Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Intra Interface Traffic only allowing ICMP</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-traffic-only-allowing-icmp/m-p/1093713#M894998</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could you post your new config?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Oct 2008 18:36:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-traffic-only-allowing-icmp/m-p/1093713#M894998</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2008-10-16T18:36:42Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Intra Interface Traffic only allowing ICMP</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-traffic-only-allowing-icmp/m-p/1093714#M894999</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is it.  I've ommitted all IP sensitive information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 7.2(4)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.30.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address &lt;OMITTED&gt;&lt;/OMITTED&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no forward interface Vlan1&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; &lt;OMMITED&gt;&lt;/OMMITED&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list outside_1_cryptomap extended permit ip 172.30.0.0 255.255.255.0 172.30.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended deny ip any 172.30.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list vpns remark &lt;OMMITED&gt;&lt;/OMMITED&gt;&lt;/P&gt;&lt;P&gt;access-list vpns standard permit 172.30.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list vpns remark townshend-bts&lt;/P&gt;&lt;P&gt;access-list vpns standard permit 172.30.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list vpns remark &lt;OMMITED&gt;&lt;/OMMITED&gt;&lt;/P&gt;&lt;P&gt;access-list vpns standard permit 10.252.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list vpns remark &lt;OMMITED&gt;&lt;/OMMITED&gt;&lt;/P&gt;&lt;P&gt;access-list vpns standard permit &lt;OMMITED&gt; 255.255.255.0&lt;/OMMITED&gt;&lt;/P&gt;&lt;P&gt;access-list outside_2_cryptomap extended permit ip 172.30.0.0 255.255.255.0 10.252.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_3_cryptomap extended permit ip 172.30.0.0 255.255.255.0 &lt;OMMITED&gt; 255.255.255.0&lt;/OMMITED&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound_1 extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list outside_nat0_outbound extended permit ip any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;ip local pool vpnpool 172.30.0.132-172.30.0.163 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;icmp deny any outside&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-524.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (inside) 1 interface&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound_1 outside&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.30.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (outside) 0 access-list outside_nat0_outbound&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;route inside 172.30.2.0 255.255.255.0 172.30.0.80 1&lt;/P&gt;&lt;P&gt;route inside 172.30.3.0 255.255.255.0 172.30.0.80 1&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 216.66.108.41 1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;router ospf 5&lt;/P&gt;&lt;P&gt; network 172.30.0.0 255.255.255.0 area 3&lt;/P&gt;&lt;P&gt; area 3&lt;/P&gt;&lt;P&gt; log-adj-changes&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;router rip&lt;/P&gt;&lt;P&gt; network 172.30.0.0&lt;/P&gt;&lt;P&gt; passive-interface inside&lt;/P&gt;&lt;P&gt; passive-interface outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;  inspect ftp&lt;/P&gt;&lt;P&gt;  inspect h323 h225&lt;/P&gt;&lt;P&gt;  inspect h323 ras&lt;/P&gt;&lt;P&gt;  inspect rsh&lt;/P&gt;&lt;P&gt;  inspect rtsp&lt;/P&gt;&lt;P&gt;  inspect esmtp&lt;/P&gt;&lt;P&gt;  inspect sqlnet&lt;/P&gt;&lt;P&gt;  inspect skinny&lt;/P&gt;&lt;P&gt;  inspect sunrpc&lt;/P&gt;&lt;P&gt;  inspect xdmcp&lt;/P&gt;&lt;P&gt;  inspect sip&lt;/P&gt;&lt;P&gt;  inspect netbios&lt;/P&gt;&lt;P&gt;  inspect tftp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Oct 2008 18:46:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-traffic-only-allowing-icmp/m-p/1093714#M894999</guid>
      <dc:creator>nsalemme1</dc:creator>
      <dc:date>2008-10-16T18:46:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Intra Interface Traffic only allowing ICMP</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-traffic-only-allowing-icmp/m-p/1093715#M895000</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1. The "deny" line in your acl needs to be before the permit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended deny ip any 172.30.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. You should not need this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no nat (inside) 0 access-list inside_nat0_outbound_1 outside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Oct 2008 18:51:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-traffic-only-allowing-icmp/m-p/1093715#M895000</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2008-10-16T18:51:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Intra Interface Traffic only allowing ICMP</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-traffic-only-allowing-icmp/m-p/1093716#M895001</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great, that did it!  I am now able to go from the 172.30.0.0 network to the 172.30.2.0 network.  Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However when I try and go in the reverse direction, 172.30.2.0 --&amp;gt; 172.30.0.0 it seems to  have trouble.  Here is the error:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3	Oct 16 2008	13:34:21	305006	172.30.2.2		 regular translation creation failed for icmp src inside:172.30.0.3 dst inside:172.30.2.2 (type 0, code 0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Almost there!  I've pasted the latest running-config below.  Perhaps I need to add a new NAT rule for inbound?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list outside_1_cryptomap extended permit ip 172.30.0.0 255.255.255.0 172.30.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended deny ip any 172.30.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list vpns remark saxton-river-co&lt;/P&gt;&lt;P&gt;access-list vpns standard permit 172.30.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list vpns remark townshend-bts&lt;/P&gt;&lt;P&gt;access-list vpns standard permit 172.30.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list vpns remark vanu monitoring&lt;/P&gt;&lt;P&gt;access-list vpns standard permit 10.252.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list vpns remark midtex bypass net&lt;/P&gt;&lt;P&gt;access-list vpns standard permit midtex-msc 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_2_cryptomap extended permit ip 172.30.0.0 255.255.255.0 10.252.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_3_cryptomap extended permit ip 172.30.0.0 255.255.255.0 midtex-msc 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list outside_nat0_outbound extended permit ip any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;ip local pool vpnpool 172.30.0.132-172.30.0.163 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;icmp deny any outside&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-524.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (inside) 1 interface&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (outside) 0 access-list outside_nat0_outbound&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;route inside 172.30.2.0 255.255.255.0 172.30.0.80 1&lt;/P&gt;&lt;P&gt;route inside 172.30.3.0 255.255.255.0 172.30.0.80 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks so much acomiskey.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Oct 2008 19:47:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-traffic-only-allowing-icmp/m-p/1093716#M895001</guid>
      <dc:creator>nsalemme1</dc:creator>
      <dc:date>2008-10-16T19:47:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Intra Interface Traffic only allowing ICMP</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-traffic-only-allowing-icmp/m-p/1093717#M895002</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;access-list inside_nat0_outbound extended deny ip any 172.30.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended deny ip 172.32.2.0 255.255.255.0 172.32.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Oct 2008 20:42:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-traffic-only-allowing-icmp/m-p/1093717#M895002</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2008-10-16T20:42:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Intra Interface Traffic only allowing ICMP</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-traffic-only-allowing-icmp/m-p/1093718#M895003</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Actually, the traffic initiated from 172.32.2.x to 172.32.0.x shouldn't even be hitting the firewall.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Oct 2008 00:21:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-traffic-only-allowing-icmp/m-p/1093718#M895003</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2008-10-17T00:21:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Intra Interface Traffic only allowing ICMP</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-traffic-only-allowing-icmp/m-p/1093719#M895004</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tried adding the lines you mentioned above, no luck.  The traffic initiated from 172.30.2.x must be hitting the firewall if I am receiving messages from the ASA logs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am going to look into what the "Regular translation creation failed" error means.  That is the error I get in the ASA logs when I try and ping.  There is a pretty extensive writeup about what this error means in the log details:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(apoligies for length)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A protocol (UDP, TCP, or ICMP) failed to create a translation through the security appliance. This message appears as a fix to caveat CSCdr0063 that requested that security appliance not allow packets that are destined for network or broadcast addresses. The security appliance provides this checking for addresses that are explicitly identified with static command statements. With the change, for inbound traffic, the security appliance denies translations for a destined IP address identified as a network or broadcast address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The security appliance does not apply PAT to all ICMP message types; it only applies PAT ICMP echo and echo-reply packets (types 8 and 0). Specifically, only ICMP echo or echo-reply packets create a PAT xlate. So, when the other ICMP messages types are dropped, system log message 305006 (on the security appliance) is generated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The security appliance utilizes the global IP and mask from configured static command statements to differ regular IP addresses from network or broadcast IP addresses. If the global IP address is a valid network address with a matching network mask, then the security appliance does not create a translation for network or broadcast IP addresses with inbound packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.2.2.128 10.1.1.128 netmask 255.255.255.128&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Global address 10.2.2.128 is responded to as a network address and 10.2.2.255 is responded to as the broadcast address. Without an existing translation, security appliance denies inbound packets destined for 10.2.2.128 or 10.2.2.255, and logs this system log message.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the suspected IP is a host IP, configure a separated static command statement with a host mask in front of the subnet static (first match rule for static command statements). The following static causes the security appliance to respond to 10.2.2.128 as a host address:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.2.2.128 10.2.2.128 netmask 255.255.255.255 static (inside,outside) 10.2.2.128 10.2.2.128 netmask 255.255.255.128&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The translation may be created by traffic started with the inside host with the questioned IP address. Because the security appliance views a network or broadcast IP address as a host IP address with overlapped subnet static configuration, the network address translation for both static command statements must be the same.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Oct 2008 14:17:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-traffic-only-allowing-icmp/m-p/1093719#M895004</guid>
      <dc:creator>nsalemme1</dc:creator>
      <dc:date>2008-10-17T14:17:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Intra Interface Traffic only allowing ICMP</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-traffic-only-allowing-icmp/m-p/1093720#M895005</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've posted a similar issue.&amp;nbsp; The link is here.&amp;nbsp; Hopefully someone can help us.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-message-small" href="https://community.cisco.com/message/2014927#2014927"&gt;https://supportforums.cisco.com/message/2014927&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jan 2010 23:28:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-traffic-only-allowing-icmp/m-p/1093720#M895005</guid>
      <dc:creator>ian.wills</dc:creator>
      <dc:date>2010-01-08T23:28:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Intra Interface Traffic only allowing ICMP</title>
      <link>https://community.cisco.com/t5/network-security/asa-intra-interface-traffic-only-allowing-icmp/m-p/1093721#M895006</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV class="jive-rendered-content"&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;EM&gt;I have seen some previous posts regarding this matter but the solution is not quite clear.&amp;nbsp; Here is my issue:&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding: 0px; min-height: 8pt; height: 8pt;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;EM&gt;I have a ASA 5505 that has 2 conifugred VLAN's; inside and outside.&amp;nbsp; Outside takes Ethernet 0/0 and inside takkes Ethernet 0/1 - 0/7.&amp;nbsp; I use outside for VPN connections and inside for internal LAN use.&amp;nbsp; The inside is on the 172.30.0.0/24 subnet.&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding: 0px; min-height: 8pt; height: 8pt;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;EM&gt;I want to connect another network subnet, 172.30.2.0/24, to the inside 172.30.0.0/24 network.&amp;nbsp; I have a router at 172.30.0.80 that is set to route between 172.30.0.0/24 and 172.30.2.0/24 and I have set a static route in my ASA to allow traffic headed to 172.30.2.0/24 to use 172.30.0.80 as it's default gateway.&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding: 0px; min-height: 8pt; height: 8pt;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;EM&gt;I can ping devices the 172.30.2.0/24 subnet but I cannot establish a TCP connection.&amp;nbsp; It looks like previous people have mentioned this is because ICMP is using UDP stateless connections while TCP is stateful.&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding: 0px; min-height: 8pt; height: 8pt;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;EM&gt;Has anyone found a workaround for this problem?&amp;nbsp; I am running ASA 7.2(4).&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding: 0px; min-height: 8pt; height: 8pt;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;EM&gt;Thanks much in advance!&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;So, you are running into &lt;SPAN style="text-decoration: underline;"&gt;assymetric routing&lt;/SPAN&gt; issues in your network, where you can ONLY establish successful UDP/Stateless communication from one inside subnet to another&amp;nbsp; and NOT TCP/Stateful communications.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are &lt;STRONG&gt;three workarounds&lt;/STRONG&gt; in such scenarios :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Easiest is to use the new tcp-state-bypass mechnaism in the 8.1(x) code. But you need to upgrade you can also use our firewall to use it as you are at 7.2 now.&lt;/P&gt;&lt;P&gt;Here is&amp;nbsp; a link to help you :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://cisco.com/en/US/docs/security/asa/asa82/configuration/guide/conns_tcpstatebypass.html"&gt;http://cisco.com/en/US/docs/security/asa/asa82/configuration/guide/conns_tcpstatebypass.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Scene 1 : when all the users in both subnets behind your firewall HAVE THEIR DEFAULT GATEWAY SET AS INSIDE IP OF FIREWALL.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. You can&amp;nbsp; use nat (inside) 1 0 0 and global (inside) 1 interface and then use&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,inside) x.x.x.0 y.y.y.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,inside) y.y.y.0 x.x.x.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where x.x.x.0 is one of the inside subnets and y.y.y.0 is another inside subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this wrorkaround, you may be able to open connections only one way, i.e. from x.x.x.0 to y.y.y.0. and not vice versa.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Scene 1 : when all the users in both subnets behind your firewall HAVE THEIR DEFAULT GATEWAY SET AS ROUTER's IP address.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. Here you can let the inter subnet routing being taken care of by the router and then set a default route on router which points to ASA's inside ifc.&lt;/P&gt;&lt;P&gt;This will make sure that all internet traffic of all inside subnets go THROUGH the firewall, and as long as TWO WAY inter subnet communication is concerned, router will take care of it just fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vijaya&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Jan 2010 20:28:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-intra-interface-traffic-only-allowing-icmp/m-p/1093721#M895006</guid>
      <dc:creator>vilaxmi</dc:creator>
      <dc:date>2010-01-09T20:28:42Z</dc:date>
    </item>
  </channel>
</rss>

