<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thank You, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-firewall-mgmt-interface-setup-and-access-issue/m-p/2829870#M916110</link>
    <description>&lt;P&gt;Thank You,&lt;/P&gt;
&lt;P&gt;In the above setup I have assigned SFR IP address as 192.168.1.4 (active) &amp;amp;&amp;nbsp;&lt;SPAN&gt;192.168.1.5 (standby).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Now when I ping from the server 172.16.0.10 to&amp;nbsp;192.168.1.4, how does the traffic reach to it?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;When I do a tracert I see the 2nd hop as 10.10.10.1&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 30 Nov 2015 16:47:01 GMT</pubDate>
    <dc:creator>QUARK TARO</dc:creator>
    <dc:date>2015-11-30T16:47:01Z</dc:date>
    <item>
      <title>ASA Firewall MGMT interface Setup and Access Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-mgmt-interface-setup-and-access-issue/m-p/2829867#M916106</link>
      <description>&lt;P&gt;I have SETUP ASA 5525-X firewalls in a active standby HA pair. It's inside interface (Gi0/0) is terminated on L3 switch (vlan30), firewall will use L3 switch to reach all the inside segments.&lt;/P&gt;
&lt;P&gt;On the inside network we have vlan's for DATA (vlan10), MGMT(vlan20) and INSIDE(vlan30).&lt;/P&gt;
&lt;P&gt;The firewall MGMT interface (Gi0/7 which is used for management only) is also terminated in the MGMT vlan on L2 switch.&lt;/P&gt;
&lt;P&gt;Now I have my server in the DATA vlan which is unable to ping the MGMT interface of the firewalls.&lt;/P&gt;
&lt;P&gt;This is not an ACL issue, my guess is that, the ping request from server to MGMT interface will reach the MGMT interface but the reply will return thru inside interface of the firewall. How can I resolve this issue?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please refer the attached network diagram for more info.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 13:37:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-mgmt-interface-setup-and-access-issue/m-p/2829867#M916106</guid>
      <dc:creator>avilt</dc:creator>
      <dc:date>2020-02-21T13:37:20Z</dc:date>
    </item>
    <item>
      <title>Hello Avilt,</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-mgmt-interface-setup-and-access-issue/m-p/2829868#M916107</link>
      <description>&lt;P&gt;Hello Avilt,&lt;/P&gt;
&lt;P&gt;MGMT interface are bound with separate VRF in ASA, You can only reach MGMT interface via MGMT vlan or either try to drop a default route in MGMT VRF towards MGMT SVI and then check.&lt;/P&gt;
&lt;P&gt;Hope it Helps..&lt;/P&gt;
&lt;P&gt;-GI&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Nov 2015 04:02:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-mgmt-interface-setup-and-access-issue/m-p/2829868#M916107</guid>
      <dc:creator>Ganesh Hariharan</dc:creator>
      <dc:date>2015-11-30T04:02:11Z</dc:date>
    </item>
    <item>
      <title>Ganesh - separate management</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-mgmt-interface-setup-and-access-issue/m-p/2829869#M916108</link>
      <description>&lt;P&gt;Ganesh - separate management VRF is a very new feature only available as of ASA 9.5 software. &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa95/release/notes/asarn95.html"&gt;Reference&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Aviit - any ASA prior to 9.5 uses a single global routing table. Accessing the management interface from any host not on the management subnet would require the "best" (ie. lowest administrative distance and/or most specific match) route be hard coded to the management interface.&lt;/P&gt;
&lt;P&gt;This is often impractical unless you have a dedicated management subnet and all hosts needing to manage the ASA reside on that subnet. For this reason, many customers simply use the inside interface for management.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Nov 2015 16:28:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-mgmt-interface-setup-and-access-issue/m-p/2829869#M916108</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-11-30T16:28:10Z</dc:date>
    </item>
    <item>
      <title>Thank You,</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-mgmt-interface-setup-and-access-issue/m-p/2829870#M916110</link>
      <description>&lt;P&gt;Thank You,&lt;/P&gt;
&lt;P&gt;In the above setup I have assigned SFR IP address as 192.168.1.4 (active) &amp;amp;&amp;nbsp;&lt;SPAN&gt;192.168.1.5 (standby).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Now when I ping from the server 172.16.0.10 to&amp;nbsp;192.168.1.4, how does the traffic reach to it?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;When I do a tracert I see the 2nd hop as 10.10.10.1&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Nov 2015 16:47:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-mgmt-interface-setup-and-access-issue/m-p/2829870#M916110</guid>
      <dc:creator>QUARK TARO</dc:creator>
      <dc:date>2015-11-30T16:47:01Z</dc:date>
    </item>
    <item>
      <title>You didn't initially mention</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-mgmt-interface-setup-and-access-issue/m-p/2829871#M916111</link>
      <description>&lt;P&gt;You didn't initially mention using the sfr (FirePOWER Service module).&lt;/P&gt;
&lt;P&gt;The sfr essentially runs as a separate "VM" on the ASA. As such, it has its own dedicated default gateway set. It shares the physical management interface with the ASA software. You can use that physical interface for sfr management only and manage the ASA via its inside interface.&lt;/P&gt;
&lt;P&gt;Your core L3 switch should have an interface on the VLAN associated with 192.168.1.x so that it knows there's a connected route for that subnet. (Connected routes have the least cost, all other things being equal.)&lt;/P&gt;</description>
      <pubDate>Mon, 30 Nov 2015 17:00:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-mgmt-interface-setup-and-access-issue/m-p/2829871#M916111</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-11-30T17:00:57Z</dc:date>
    </item>
    <item>
      <title>In the above diagram, the</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-mgmt-interface-setup-and-access-issue/m-p/2829872#M916112</link>
      <description>&lt;P&gt;In the above diagram, the MGMT interface Gi0/7 is defined as management only with IP address 192.168.1.1/24&lt;/P&gt;
&lt;P&gt;Now the SFR IP address is&amp;nbsp;&lt;SPAN&gt;192.168.1.4/24 and Firesight IP is&amp;nbsp;192.168.1.3/24&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;But I am using the firewall inside interface 10.10.10.1 for ASDM management.&lt;/P&gt;
&lt;P&gt;Now Am I right in saying Firesight reaches SFR thru MGMT interface?&lt;/P&gt;</description>
      <pubDate>Mon, 30 Nov 2015 17:30:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-mgmt-interface-setup-and-access-issue/m-p/2829872#M916112</guid>
      <dc:creator>QUARK TARO</dc:creator>
      <dc:date>2015-11-30T17:30:30Z</dc:date>
    </item>
    <item>
      <title>Yes - FireSIGHT / FirePOWER</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-mgmt-interface-setup-and-access-issue/m-p/2829873#M916113</link>
      <description>&lt;P&gt;Yes - FireSIGHT / FirePOWER Management Center communicates with the sfr module via the ASA management interface only.&lt;/P&gt;
&lt;P&gt;However, it &lt;STRONG&gt;must&lt;/STRONG&gt; be the ASA's dedicated management interface - Management 0/0.&lt;/P&gt;
&lt;P&gt;You cannot use any other interface for sfr module communications to its manager - even ones that you have defined as "management only" in the ASA configuration.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Nov 2015 17:41:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-mgmt-interface-setup-and-access-issue/m-p/2829873#M916113</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-11-30T17:41:06Z</dc:date>
    </item>
    <item>
      <title>Thanks Marvin for</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-mgmt-interface-setup-and-access-issue/m-p/2829874#M916114</link>
      <description>&lt;P&gt;Thanks Marvin for clarification , My mistake ..You are right we implemented in latest relase n our DC ..&lt;/P&gt;
&lt;P&gt;-GI&lt;/P&gt;</description>
      <pubDate>Tue, 01 Dec 2015 15:56:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-mgmt-interface-setup-and-access-issue/m-p/2829874#M916114</guid>
      <dc:creator>Ganesh Hariharan</dc:creator>
      <dc:date>2015-12-01T15:56:30Z</dc:date>
    </item>
  </channel>
</rss>

