<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA configuration for internal routing in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935581#M918597</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Chris thanks for posting brief topology description this helps understand better.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do not meant to contradict Farrukh post in any shape or form, but the topology is clear. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do not believe &lt;B&gt;same-security-traffic permit intra-interface&lt;/B&gt; applies in this scenario because 192.168.0.0 is not on another interface in the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since you have a [ROUTER] connected to the inside network as 10.0.0.10 and behind that router you have 192.168.0.0/24 network, this network is considered a trusted network hanging off the inside subnet 10.0.0.0/24 by [ROUTER]-10.0.0.10.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is no access lists required to allow 192.168.0.0/24 to talk to 10.0.0/.24 but there are some routes that need to be taking place.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On your [ROUTER] 10.0.0.10 you must have a route pointing to to 10.0.0.1 in order for 192.168.0.0/24 network to communicate to ASA5510 inside network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i.e&lt;/P&gt;&lt;P&gt;ip route 10.0.0.0 255.255.255.0 10.0.0.1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if you need to have 192.168.0.0/24 use internet access through asa5510 place a default route in [ROUTER].&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 10.0.0.1  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for the ASA5510 :&lt;/P&gt;&lt;P&gt;you already have a route for 192.168.0.0/24&lt;/P&gt;&lt;P&gt;route inside 192.168.0.0 255.255.255.0 10.0.0.10 , configure firewall to make it aware that 192.168.0.0/24 is a trusted network and coming from inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ie. &lt;/P&gt;&lt;P&gt;asdm location 192.168.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.0.0  255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bst Rgds&lt;/P&gt;&lt;P&gt;-Jorge&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 11 Jun 2008 17:19:12 GMT</pubDate>
    <dc:creator>JORGE RODRIGUEZ</dc:creator>
    <dc:date>2008-06-11T17:19:12Z</dc:date>
    <item>
      <title>ASA configuration for internal routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935572#M918583</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've got an ASA5510 (10.0.0.1) which is the gateway for the internal network (10.0.0.0/24). In addition, I've got an additional local network (192.168.0.0/24) which I need to route my internal clients (10.0.0.0/24) to.  The local gateway for the 192.168.0.0/24 network is 10.0.0.10, but my ASA device keeps dropping all connections to the 192.168.0.0 network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've configured the ASA with the following options:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route inside 192.168.0.0 255.255.255.0 10.0.0.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside-access-in extended permit ip 10.0.0.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list inside-access-in extended permit icmp 10.0.0.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-group inside-access-in in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've also got my standard NAT commands, which I don't think are necessary to post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is how can I force the ASA appliance to forward packets to the 192.168.0.0 network?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If any nat commands are required, please include them in your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 12:57:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935572#M918583</guid>
      <dc:creator>cpartsenidis</dc:creator>
      <dc:date>2019-03-11T12:57:50Z</dc:date>
    </item>
    <item>
      <title>Re: ASA configuration for internal routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935573#M918584</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Where is this 192.168.0.0/24 network terminating?  On the ASA itself?  If so you, and you don't want to NAT traffic between the two networks, you will need a 'nat 0' statement for those networks and the appropriate ACL's for traffic between those two interfaces both inbound and outbound.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What are the security levels on each of those interfaces? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2008 11:58:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935573#M918584</guid>
      <dc:creator>noran01</dc:creator>
      <dc:date>2008-06-11T11:58:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA configuration for internal routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935574#M918586</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need to add the "same-security-traffic permit intra-interface" command and you need to be running at least ASA 7.2.x for this to work. Also (if you have dynamic NAT configured) or "nat-control" enabled, some NAT rules might need changing like adding the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (inside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a look at:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080734db7.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080734db7.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2008 12:14:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935574#M918586</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-11T12:14:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA configuration for internal routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935575#M918588</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It seems as though Chris's ASA5510 inside network or inside interface is 10.0.0.1 based on his description, it looks as the 192.168.0.0 is routed through 10.0.0.10 by looking at the route statement which is probably an interface on a router having the network 192.168.0.0/24, if this  is the case the 192.168.0.0/24 is consider an inside network, but if this is not the case and the 192.168.0.0/24 is another interface with same sec level Farrukh gave you the answer. Otherwise Chris could possibly  provide ASA5510 interfaces configuration to understand a bit the topology.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rgds&lt;/P&gt;&lt;P&gt;-Jorge&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2008 12:47:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935575#M918588</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2008-06-11T12:47:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA configuration for internal routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935576#M918590</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Many thanks for your replies guys. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the situation:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Internet-----[ASA5510]10.0.0.1----LAN---10.0.0.10[ROUTER]--192.168.0.0--&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All workstations on the LAN use 10.0.0.1 as a gateway. I've also got a new network (192.168.0.0) that's accessible via 10.0.0.10.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'd like the ASA to route to the 192.168.0.0 network via 10.0.0.10.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even thought I've added all the necessary access lists on the inside interface of the 5510, to ensure packets are not  dropped, they are still being denied. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's part of the configuration on the asa:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.0.0.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list inside-access-in extended permit ip 10.0.0.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list inside-access-in extended permit icmp 10.0.0.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;global (outside) 1 &lt;REALIP&gt;&lt;/REALIP&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound &lt;/P&gt;&lt;P&gt;nat (inside) 1 10.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) &lt;ANOTHER realip=""&gt; 10.0.0.76 netmask 255.255.255.255 &lt;/ANOTHER&gt;&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group inside-access-in in interface inside&lt;/P&gt;&lt;P&gt;access-group dmz_access_in in interface dmz&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 &lt;REALIP&gt;&lt;/REALIP&gt;&lt;/P&gt;&lt;P&gt;route inside 192.168.0.0 255.255.255.0 10.0.0.10 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2008 14:53:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935576#M918590</guid>
      <dc:creator>cpartsenidis</dc:creator>
      <dc:date>2008-06-11T14:53:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA configuration for internal routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935577#M918592</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you provide the inside_nat0_outbound  access-list &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to allow replies from 192.168.0.0 in inside-access-in access-list or add a inspect icmp in your defaut policy-map for icmp stateful inspection.&lt;/P&gt;&lt;P&gt;Do you have logs for denied packets ?&lt;/P&gt;&lt;P&gt;Depending if nat-control is enabled or not, you'll need to add a the network 192.168.0.0 in your inside_nat0_outbound access-list&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2008 15:12:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935577#M918592</guid>
      <dc:creator>Amadou TOURE</dc:creator>
      <dc:date>2008-06-11T15:12:09Z</dc:date>
    </item>
    <item>
      <title>Re: ASA configuration for internal routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935578#M918594</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you put the two commands I suggested in my earlier post?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2008 15:57:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935578#M918594</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-11T15:57:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASA configuration for internal routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935579#M918595</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Farrukh ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm offsite at the moment, but I think your suggested commands will fix the issue. I'll give it a try as soon as I can and update this post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On another note, the ASA is running 7.0(7), but the command is available. Is that okay ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding the "nat (inside) 0 access-list inside_nat0_outbound", its only used for the VPN clients, so we can leave it as is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2008 16:37:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935579#M918595</guid>
      <dc:creator>cpartsenidis</dc:creator>
      <dc:date>2008-06-11T16:37:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA configuration for internal routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935580#M918596</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm afraid that will not be OK, the second line of the link I posted earlier reads:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Software release 7.2 includes the capability to route clear text data in and out of the same interface. "&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Before that this command was only applicable if ONE leg of the flow was encrypted (as in one side of the hair-pin).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have to upgrade the software or redesign your network to change the user's default gateway to the router, or any other solution.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2008 16:56:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935580#M918596</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-11T16:56:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA configuration for internal routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935581#M918597</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Chris thanks for posting brief topology description this helps understand better.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do not meant to contradict Farrukh post in any shape or form, but the topology is clear. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do not believe &lt;B&gt;same-security-traffic permit intra-interface&lt;/B&gt; applies in this scenario because 192.168.0.0 is not on another interface in the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since you have a [ROUTER] connected to the inside network as 10.0.0.10 and behind that router you have 192.168.0.0/24 network, this network is considered a trusted network hanging off the inside subnet 10.0.0.0/24 by [ROUTER]-10.0.0.10.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is no access lists required to allow 192.168.0.0/24 to talk to 10.0.0/.24 but there are some routes that need to be taking place.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On your [ROUTER] 10.0.0.10 you must have a route pointing to to 10.0.0.1 in order for 192.168.0.0/24 network to communicate to ASA5510 inside network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i.e&lt;/P&gt;&lt;P&gt;ip route 10.0.0.0 255.255.255.0 10.0.0.1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if you need to have 192.168.0.0/24 use internet access through asa5510 place a default route in [ROUTER].&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 10.0.0.1  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for the ASA5510 :&lt;/P&gt;&lt;P&gt;you already have a route for 192.168.0.0/24&lt;/P&gt;&lt;P&gt;route inside 192.168.0.0 255.255.255.0 10.0.0.10 , configure firewall to make it aware that 192.168.0.0/24 is a trusted network and coming from inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ie. &lt;/P&gt;&lt;P&gt;asdm location 192.168.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.0.0  255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bst Rgds&lt;/P&gt;&lt;P&gt;-Jorge&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2008 17:19:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935581#M918597</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2008-06-11T17:19:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA configuration for internal routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935582#M918598</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jorge,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Keep in mind that by default with ASA, same traffic can't come in a interface and get out through the same interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So same-security-traffic intra-interface is relevant to authorized this in/out traffic flow through the inside interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2008 17:28:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935582#M918598</guid>
      <dc:creator>Amadou TOURE</dc:creator>
      <dc:date>2008-06-11T17:28:07Z</dc:date>
    </item>
    <item>
      <title>Re: ASA configuration for internal routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935583#M918599</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please don't confuse the "same-security-traffic intra-interface" with the 'inter-interface' command. In this scenario 'intra-interface' will be required IF the firewall is the default gateway of end hosts. I set this up for one customer, and since he was running 7.0.x at the time, I had to place a router behind the firewall. 7.2.x was not available or too new to be deployed in production back then.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2008 17:33:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935583#M918599</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-11T17:33:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA configuration for internal routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935584#M918600</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Amadou, thanks for the post,I still disagree.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you look at same-security-traffic intra-interface effect is when you have two physical interfaces or subinterfaces on the same firewall with same security levels  and need to allow traffic between them without the use of ACLs. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is not the case, Chris has a [ROUTER] in the inside interface subnet 10.0.0.0/24,  think of the router being a PC for sake of imagination that has for IP 10.0.0.10.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now if 192.168.0.0 was on a different interface configured in the firewall with Sec level 0 as the inside interface then same sec traffic applies. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rgds&lt;/P&gt;&lt;P&gt;-Jorge&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2008 17:42:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935584#M918600</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2008-06-11T17:42:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA configuration for internal routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935585#M918601</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi jorge,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As Farrukh said, there're two different commands :&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface introduced in release 7.0(1) available when you have two different interfaces and same-security-traffic permit intra-interface introduced in release 7.2(1) which is applicable if you're using the same interface for in/out traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please refer to the ASA command reference software version 7.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2008 17:53:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935585#M918601</guid>
      <dc:creator>Amadou TOURE</dc:creator>
      <dc:date>2008-06-11T17:53:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA configuration for internal routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935586#M918603</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I do appologize ,  same-secuirty-traffic permit inter-interface allows traffic  between different interfaces that have same sec level, and intra-interface in/out traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;None of the two applies in Chris's scenario, I have simulated Chris's topology in our production LAB, One 3550 L3 switch  two VLANs one for 192.168.0.1 and 10.0.0.10 for another VLAN, One ASA5505 inside interface as 10.0.0.1.  &lt;/P&gt;&lt;P&gt;Simple routing between the two devices without any intra or inter commands, routing between the two network by static routes, PAT 192.168.0.0/24 and works as expected. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even gave it public IP address of 63.107.220.60 for RDP mapped to a test server 192.168.0.100 on L3 3550 switch and works great. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BTW, don't care whoever rdps to pub IP this is isolated production LAB, and yes, I get all the cisco toys I ask for.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Rgds&lt;/P&gt;&lt;P&gt;Jorge &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2008 18:23:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935586#M918603</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2008-06-11T18:23:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASA configuration for internal routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935587#M918604</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;as others have stated, the OP needs to upgrade to 7.2(x) or later.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2008 18:37:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935587#M918604</guid>
      <dc:creator>srue</dc:creator>
      <dc:date>2008-06-11T18:37:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASA configuration for internal routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935588#M918605</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The response to this thread has been great and I really appreciate the effort and time spent by everyone.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From what I conclude Jorge, according to your test, the scenario should work 'as is' without the need of additional commands. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, Farrukh supports that the 'intra-interface' command for my situation is required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately, I haven't got access to the equipment right now so I can try it, but I do remember the scenario didn't work using the configuration I posted. If I remember correctly, the syslog messages mentioned my packets heading from the internal lan 10.0.0.0 towards the 192.168.0.0 network, were denied by the inside-access-in list:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside-access-in extended permit ip 10.0.0.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list inside-access-in extended permit icmp 10.0.0.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-group inside-access-in in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All I was doing is trying to access a network share on a computer in the 192.168.0.0 network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Closing, quoting Farrukh's recommendation:&lt;/P&gt;&lt;P&gt;'please don't confuse the "same-security-traffic intra-interface" with the 'inter-interface' command. In this scenario 'intra-interface' will be required IF the firewall is the default gateway of end hosts' , Yes, all internal 10.0.0.0 hosts do in fact have the ASA (10.0.0.1) as their gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I sometimes fail to see why such 'simple' routing requirements can sometimes become a big headache &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers guys,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2008 21:13:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-configuration-for-internal-routing/m-p/935588#M918605</guid>
      <dc:creator>cpartsenidis</dc:creator>
      <dc:date>2008-06-11T21:13:58Z</dc:date>
    </item>
  </channel>
</rss>

