<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: same-security-traffic permit inter-interface not working in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002664#M918866</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is what I think &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;  If you have an exempt NAT statement applied to interface inside and contains source as inside and destination as dmz, this effects traffic originated from both inside and dmz. I mean once you apply correct exempt NAT to inside that will take care of bot inside-&amp;gt;dmz and dmz-&amp;gt;inside. You dont need one applied to dmz. &lt;/P&gt;&lt;P&gt;  Then how did it resolve the issue? Here are my theories.&lt;/P&gt;&lt;P&gt;  1) Brian was testing the connectivity with ping which is not a good way when it is a firewall device that sees ICMP a possible dos attack and denies by default. And brian's outside_access_in ACL which permits ICMP was not applied to outside interface with access-group command. ICMP inspection did the trick. But this theory can not explain the translation error logs&lt;/P&gt;&lt;P&gt;   2) Brian was hitting CSCsd90140 or another one which prevented inside exempt nat to operate correctly. An exempt nat applied to dmz interface, which is actually not necessary under normal circumstances, did operate normally and did what inside exempt nat couldnt.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any thoughts?&lt;/P&gt;&lt;P&gt;But glad that issue is resolved.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 06 Jun 2008 14:10:03 GMT</pubDate>
    <dc:creator>Alan Huseyin Kayahan</dc:creator>
    <dc:date>2008-06-06T14:10:03Z</dc:date>
    <item>
      <title>same-security-traffic permit inter-interface not working</title>
      <link>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002636#M918838</link>
      <description>&lt;P&gt;Guys, need help to allow traffic between two interfaces that have the same security level. I have already enabled the "same-security-traffic permit inter-interface" command but still i cant ping my switch or server on the other vlan...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what else do i need to do to accomplish this task? ACL are on defaults as of now...&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 12:55:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002636#M918838</guid>
      <dc:creator>brianbono</dc:creator>
      <dc:date>2019-03-11T12:55:51Z</dc:date>
    </item>
    <item>
      <title>Re: same-security-traffic permit inter-interface not working</title>
      <link>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002637#M918839</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Which version are you running, is nat-control off or on?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run nat-control&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2008 18:12:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002637#M918839</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-05T18:12:06Z</dc:date>
    </item>
    <item>
      <title>Re: same-security-traffic permit inter-interface not working</title>
      <link>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002638#M918840</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;nat-control is not enabled and I am running 7.0 (7)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what could be missing?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2008 18:18:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002638#M918840</guid>
      <dc:creator>brianbono</dc:creator>
      <dc:date>2008-06-05T18:18:22Z</dc:date>
    </item>
    <item>
      <title>Re: same-security-traffic permit inter-interface not working</title>
      <link>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002639#M918841</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have any nat statements (dynamic or static) between those two interfaces?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2008 18:25:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002639#M918841</guid>
      <dc:creator>srue</dc:creator>
      <dc:date>2008-06-05T18:25:44Z</dc:date>
    </item>
    <item>
      <title>Re: same-security-traffic permit inter-interface not working</title>
      <link>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002640#M918842</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just run the packet-tracer command, it should tell you whats going wrong. If possible post the output here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;assuming you are going from inside1 to inside2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inside1 = 136.1.1.0 /25&lt;/P&gt;&lt;P&gt;inside2 = 136.1.2.0 /25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input inside1 tcp 136.1.1.3&lt;/P&gt;&lt;P&gt;11005 136.1.2.100 80 detailed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2008 18:28:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002640#M918842</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-05T18:28:30Z</dc:date>
    </item>
    <item>
      <title>Re: same-security-traffic permit inter-interface not working</title>
      <link>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002641#M918843</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;part of my config below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 123.123.123.2 255.255.255.24&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.19.20.40 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; nameif insidevoice&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.19.21.40 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list outside_access_in_V1 extended permit icmp any 172.19.21.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (insidevoice) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;access-group outside_access_in_V1 in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 123.123.123.1 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;also, im confused because I cant seem to connect to the internet if I am on the insidevoice network. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2008 18:39:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002641#M918843</guid>
      <dc:creator>brianbono</dc:creator>
      <dc:date>2008-06-05T18:39:22Z</dc:date>
    </item>
    <item>
      <title>Re: same-security-traffic permit inter-interface not working</title>
      <link>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002642#M918844</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you also post the 'nonat' access-list?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2008 18:48:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002642#M918844</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-05T18:48:15Z</dc:date>
    </item>
    <item>
      <title>Re: same-security-traffic permit inter-interface not working</title>
      <link>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002643#M918845</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;access-list nonat extended permit ip 172.19.20.0 255.255.255.0 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 172.19.20.0 255.255.255.0 172.25.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 172.19.20.0 255.255.255.0 172.22.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 172.19.20.0 255.255.255.0 192.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list tozzz extended permit ip 172.19.20.0 255.255.255.0 172.25.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list toxxx extended permit ip 172.19.20.0 255.255.255.0 172.22.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list toccc extended permit ip 172.19.20.0 255.255.255.0 192.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list qw extended permit ip 172.19.20.0 255.255.255.0 172.19.200.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list qw extended permit ip 172.19.200.0 255.255.255.0 172.19.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_access_in_V1 extended permit icmp any 172.19.21.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2008 18:53:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002643#M918845</guid>
      <dc:creator>brianbono</dc:creator>
      <dc:date>2008-06-05T18:53:31Z</dc:date>
    </item>
    <item>
      <title>Re: same-security-traffic permit inter-interface not working</title>
      <link>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002644#M918846</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok first of all, for 'inside' to communicate with 'insidevoice', you need to add the following line in your nonat ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 172.19.20.0 255.255.255.0 172.19.21.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or if you want to NAT/PAT this traffic, something like&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (insidevoice) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once you enable any sort of dynamic NAT / PAT, 'no nat-control' rule no longer applies for that zone, now all traffic between this zone and any other zone either requires NAT rules or NAT exemption.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As to why insidevoice cannot access Internet, please run the packet-tracer command I gave you before, it seems OK to me....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2008 19:18:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002644#M918846</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-05T19:18:17Z</dc:date>
    </item>
    <item>
      <title>Re: same-security-traffic permit inter-interface not working</title>
      <link>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002645#M918847</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;tried to add the suggested:&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 172.19.20.0 255.255.255.0 172.19.21.0 255.255.255.0  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but still I cant communicate with the other VLAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Appreciate all your help... any other suggestions?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2008 19:29:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002645#M918847</guid>
      <dc:creator>brianbono</dc:creator>
      <dc:date>2008-06-05T19:29:20Z</dc:date>
    </item>
    <item>
      <title>Re: same-security-traffic permit inter-interface not working</title>
      <link>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002646#M918848</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes. packet-tracer with the 'detailed' keyword:)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also make sure you do a 'clear local-host' and 'clear xlate' after making any NAT changes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2008 19:30:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002646#M918848</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-05T19:30:50Z</dc:date>
    </item>
    <item>
      <title>Re: same-security-traffic permit inter-interface not working</title>
      <link>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002647#M918849</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;anybody else has a suggestion?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jun 2008 08:08:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002647#M918849</guid>
      <dc:creator>brianbono</dc:creator>
      <dc:date>2008-06-06T08:08:58Z</dc:date>
    </item>
    <item>
      <title>Re: same-security-traffic permit inter-interface not working</title>
      <link>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002648#M918850</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I just ran some debugs and this was one of the things that caught my eye:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No translation group found for icmp src inside:172.19.20.19 dst insidevoice:172.19.21.21 (type 8, code 0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what do i need to add on NAT to make sure 172.19.20.x can communicate to 172.19.21.x considering both have the same security level and that the "same-security-traffic permit inter-interface" is already enabled yet I can't communicate...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please advise..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jun 2008 08:41:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002648#M918850</guid>
      <dc:creator>brianbono</dc:creator>
      <dc:date>2008-06-06T08:41:53Z</dc:date>
    </item>
    <item>
      <title>Re: same-security-traffic permit inter-interface not working</title>
      <link>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002649#M918851</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As I mentioned before, you can use:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok first of all, for 'inside' to communicate with 'insidevoice', you need to add the following line in your nonat ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(NAT Exemption):&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 172.19.20.0 255.255.255.0 172.19.21.0 255.255.255.0  (I gave wrong mask earlier)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or if you want to NAT/PAT this traffic, something like&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(Dynamic NAT):&lt;/P&gt;&lt;P&gt;global (insidevoice) 1 interface &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also use: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(Identity Static)&lt;/P&gt;&lt;P&gt;static (inside,insidevoice) 172.19.20.0 172.19.20.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try any three, if one does not work for some reason (which is strange, try the other).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BTW, why don't you post packet-tracer output? You have something personal against the command? This is *THIRD TIME* I'm requesting you to do it......&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packter-tracer input inside icmp 172.19.20.19 8 0 172.19.21.21 detailed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See even Cisco is using it, it won't hurt &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080734db7.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080734db7.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jun 2008 09:53:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002649#M918851</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-06T09:53:14Z</dc:date>
    </item>
    <item>
      <title>Re: same-security-traffic permit inter-interface not working</title>
      <link>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002650#M918852</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Once you enable dynamic nat on one of those interfaces, it's as if the same-security traffic command wasn't even entered because of the nat.  In your case, the ASA is behaving as expected.&lt;/P&gt;&lt;P&gt;By default, you do not need to do NAT between same-security level interfaces, even if nat-control is enabled.&lt;/P&gt;&lt;P&gt;however, you do need to configure nat rules if you define dynamic NAT for either of the same-security level interfaces.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jun 2008 11:50:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002650#M918852</guid>
      <dc:creator>srue</dc:creator>
      <dc:date>2008-06-06T11:50:05Z</dc:date>
    </item>
    <item>
      <title>Re: same-security-traffic permit inter-interface not working</title>
      <link>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002651#M918853</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have tried your three suggested solutions but to no avail. I have also tried the packet-tracer but had this error:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# packet-tracer input inside icmp 172.19.20.19 8 0 172.19.21.21 detailed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input inside icmp 172.19.20.19 8 0 172.19.21.21 detailed&lt;/P&gt;&lt;P&gt; ^&lt;/P&gt;&lt;P&gt;ERROR: % Invalid input detected at '^' marker.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I got this log for the ASA below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3|Jun 06 2008 02:34:40|305005: No translation group found for icmp src inside:172.19.20.19 dst insidevoice:172.19.21.21 (type 8, code 0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;appreciate all your help Farrukh &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jun 2008 11:52:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002651#M918853</guid>
      <dc:creator>brianbono</dc:creator>
      <dc:date>2008-06-06T11:52:46Z</dc:date>
    </item>
    <item>
      <title>Re: same-security-traffic permit inter-interface not working</title>
      <link>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002652#M918854</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Brian&lt;/P&gt;&lt;P&gt;  Run "clear xlate" after applying NAT statements.&lt;/P&gt;&lt;P&gt;  Please post your full sanitized config and let us see.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jun 2008 12:15:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002652#M918854</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-06-06T12:15:13Z</dc:date>
    </item>
    <item>
      <title>Re: same-security-traffic permit inter-interface not working</title>
      <link>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002653#M918855</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hrm, are you running ASA 7.2.x or higher? packet-tracer is only supported on 7.2(1) and later?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jun 2008 12:17:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002653#M918855</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-06T12:17:15Z</dc:date>
    </item>
    <item>
      <title>Re: same-security-traffic permit inter-interface not working</title>
      <link>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002654#M918856</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the OP is running 7.0(7).&lt;/P&gt;&lt;P&gt;he needs to post a sanitized config at this point so we can see everythign that's going on.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jun 2008 12:53:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002654#M918856</guid>
      <dc:creator>srue</dc:creator>
      <dc:date>2008-06-06T12:53:31Z</dc:date>
    </item>
    <item>
      <title>Re: same-security-traffic permit inter-interface not working</title>
      <link>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002655#M918857</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ASA# sh run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 7.0(7)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ASA&lt;/P&gt;&lt;P&gt;domain-name abc.com&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 123.123.123.2 255.255.255.240&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.19.20.40 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; nameif insidevoice&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.19.21.40 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 172.19.20.0 255.255.255.0 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 172.19.20.0 255.255.255.0 172.25.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 172.19.20.0 255.255.255.0 172.22.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 172.19.20.0 255.255.255.0 192.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 172.19.20.0 255.255.255.0 172.19.21.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list to1 extended permit ip 172.19.20.0 255.255.255.0 172.25.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list to2 extended permit ip 172.19.20.0 255.255.255.0 172.22.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list to3 extended permit ip 172.19.20.0 255.255.255.0 192.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list to4 extended permit ip 172.19.20.0 255.255.255.0 172.19.200.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list to5 extended permit ip 172.19.200.0 255.255.255.0 172.19.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu insidevoice 1500&lt;/P&gt;&lt;P&gt;ip local pool vpnip 172.19.200.10-172.19.200.250&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-507.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (insidevoice) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 123.123.123.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00&lt;/P&gt;&lt;P&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server VPNAuth protocol radius&lt;/P&gt;&lt;P&gt;aaa-server VPNAuth host 172.19.20.250&lt;/P&gt;&lt;P&gt; key xxxxx&lt;/P&gt;&lt;P&gt;group-policy ABC internal&lt;/P&gt;&lt;P&gt;group-policy ABC attributes&lt;/P&gt;&lt;P&gt; dns-server value 172.19.20.250&lt;/P&gt;&lt;P&gt; vpn-idle-timeout 30&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value ST&lt;/P&gt;&lt;P&gt; default-domain value ABC.local&lt;/P&gt;&lt;P&gt; webvpn&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;http 172.19.20.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet 172.19.20.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 60&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh timeout 60&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns maximum-length 512&lt;/P&gt;&lt;P&gt;  inspect ftp&lt;/P&gt;&lt;P&gt;  inspect h323 h225&lt;/P&gt;&lt;P&gt;  inspect h323 ras&lt;/P&gt;&lt;P&gt;  inspect rsh&lt;/P&gt;&lt;P&gt;  inspect rtsp&lt;/P&gt;&lt;P&gt;  inspect esmtp&lt;/P&gt;&lt;P&gt;  inspect sqlnet&lt;/P&gt;&lt;P&gt;  inspect skinny&lt;/P&gt;&lt;P&gt;  inspect sunrpc&lt;/P&gt;&lt;P&gt;  inspect xdmcp&lt;/P&gt;&lt;P&gt;  inspect sip&lt;/P&gt;&lt;P&gt;  inspect netbios&lt;/P&gt;&lt;P&gt;  inspect tftp&lt;/P&gt;&lt;P&gt;  inspect tftp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;ASA#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jun 2008 12:54:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-traffic-permit-inter-interface-not-working/m-p/1002655#M918857</guid>
      <dc:creator>brianbono</dc:creator>
      <dc:date>2008-06-06T12:54:52Z</dc:date>
    </item>
  </channel>
</rss>

