<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Static route on inside interface of ASA does'nt work in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/914839#M956411</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://forum.cisco.com/eforum/servlet/NetProf?page=netprof&amp;amp;forum=Virtual%20Private%20Networks&amp;amp;topic=Security&amp;amp;CommCmd=MB%3Fcmd%3Ddisplay_location%26location%3D.2cbf52ea" target="_blank"&gt;http://forum.cisco.com/eforum/servlet/NetProf?page=netprof&amp;amp;forum=Virtual%20Private%20Networks&amp;amp;topic=Security&amp;amp;CommCmd=MB%3Fcmd%3Ddisplay_location%26location%3D.2cbf52ea&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 29 Jan 2008 18:24:16 GMT</pubDate>
    <dc:creator>pengfang</dc:creator>
    <dc:date>2008-01-29T18:24:16Z</dc:date>
    <item>
      <title>Static route on inside interface of ASA does'nt work</title>
      <link>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/914826#M956386</link>
      <description>&lt;P&gt;I have three Subnets connected through a router in my LAN (Inside interface)&lt;/P&gt;&lt;P&gt;route Outside 0.0.0.0 0.0.0.0 1x.1az.az.161 1&lt;/P&gt;&lt;P&gt;route Inside 192.168.2.0 255.255.255.0 192.168.0.254 1&lt;/P&gt;&lt;P&gt;route Inside 192.168.16.0 255.255.255.0 192.168.0.254 1&lt;/P&gt;&lt;P&gt;route Inside 192.168.55.0 255.255.255.0 192.168.0.254 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can reach to the IP's 192.168.2.0/24 and the other two subnets from the ASA &lt;/P&gt;&lt;P&gt;But not through the PC on my LAN tried with ACL etc. &lt;/P&gt;&lt;P&gt;Am I missing something here ?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:53:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/914826#M956386</guid>
      <dc:creator>asirajahmed28</dc:creator>
      <dc:date>2019-03-11T11:53:21Z</dc:date>
    </item>
    <item>
      <title>Re: Static route on inside interface of ASA does'nt work</title>
      <link>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/914827#M956388</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;is the following command entered:&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Jan 2008 00:05:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/914827#M956388</guid>
      <dc:creator>srue</dc:creator>
      <dc:date>2008-01-25T00:05:03Z</dc:date>
    </item>
    <item>
      <title>Re: Static route on inside interface of ASA does'nt work</title>
      <link>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/914828#M956390</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Added but no luck? Any other commands ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Jan 2008 00:49:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/914828#M956390</guid>
      <dc:creator>asirajahmed28</dc:creator>
      <dc:date>2008-01-25T00:49:46Z</dc:date>
    </item>
    <item>
      <title>Re: Static route on inside interface of ASA does'nt work</title>
      <link>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/914829#M956393</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;mifw# sh run | in route&lt;/P&gt;&lt;P&gt;route Outside 0.0.0.0 0.0.0.0 1a.1xx.3b.1x1 1&lt;/P&gt;&lt;P&gt;route Inside 192.168.2.0 255.255.255.0 192.168.0.254 1&lt;/P&gt;&lt;P&gt;route Inside 192.168.16.0 255.255.255.0 192.168.0.254 1&lt;/P&gt;&lt;P&gt;route Inside 192.168.55.0 255.255.255.0 192.168.0.254 1&lt;/P&gt;&lt;P&gt;route Inside 208.134.161.0 255.255.255.0 192.168.0.67 1&lt;/P&gt;&lt;P&gt;mifw# sh run | in same&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;mifw# ping inside 192.168.16.1&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 192.168.16.1, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!!!!!&lt;/P&gt;&lt;P&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 40/46/50 ms&lt;/P&gt;&lt;P&gt;mifw# ping inside 192.168.55.1&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 192.168.55.1, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!!!!!&lt;/P&gt;&lt;P&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 30/34/40 ms&lt;/P&gt;&lt;P&gt;mifw#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Same ping fails from the PC on this LAN&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Jan 2008 00:59:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/914829#M956393</guid>
      <dc:creator>asirajahmed28</dc:creator>
      <dc:date>2008-01-25T00:59:33Z</dc:date>
    </item>
    <item>
      <title>Re: Static route on inside interface of ASA does'nt work</title>
      <link>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/914830#M956395</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would be very interested in this as well, I have the same problem.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Jan 2008 01:20:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/914830#M956395</guid>
      <dc:creator>a.e.wiggin</dc:creator>
      <dc:date>2008-01-25T01:20:33Z</dc:date>
    </item>
    <item>
      <title>Re: Static route on inside interface of ASA does'nt work</title>
      <link>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/914831#M956397</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;can you connect to other network services from a PC to those subnets.  ie, have you tested anything besides ping/icmp?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Jan 2008 02:35:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/914831#M956397</guid>
      <dc:creator>srue</dc:creator>
      <dc:date>2008-01-25T02:35:19Z</dc:date>
    </item>
    <item>
      <title>Re: Static route on inside interface of ASA does'nt work</title>
      <link>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/914832#M956399</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes we had a Watchguard firewall and it used to work fine with that both ping and our application, now with ASA it does'nt work. However if I add a static route on the PC like&lt;/P&gt;&lt;P&gt;route add 192.168.55.0 MASK 255.255.255.0 192.168.0.254&lt;/P&gt;&lt;P&gt;route add 192.168.2.0 MASK 255.255.255.0 192.168.0.254&lt;/P&gt;&lt;P&gt;route add 192.168.16.0 MASK 255.255.255.0 192.168.0.254&lt;/P&gt;&lt;P&gt; It works for that PC but again this is not the correct way.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Jan 2008 21:10:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/914832#M956399</guid>
      <dc:creator>asirajahmed28</dc:creator>
      <dc:date>2008-01-25T21:10:07Z</dc:date>
    </item>
    <item>
      <title>Re: Static route on inside interface of ASA does'nt work</title>
      <link>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/914833#M956402</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;unless you're doing some weird NAT things on the firewall, causing ARP issues, I'm not sure what it could be.&lt;/P&gt;&lt;P&gt;you could further subnet your lan that is directly behind the firewall. then add a subinterface to one of the routers, so that would be your LAN's default gateway.  On another subinterface, put that on the same LAN as the firewall inside interface, on the that router, put a default route statement in pointing to the firewall.&lt;/P&gt;&lt;P&gt;Normally you would do all that with a layer 3 switch, but it doesn't sound like you have one of those.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Jan 2008 21:55:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/914833#M956402</guid>
      <dc:creator>srue</dc:creator>
      <dc:date>2008-01-25T21:55:33Z</dc:date>
    </item>
    <item>
      <title>Re: Static route on inside interface of ASA does'nt work</title>
      <link>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/914834#M956404</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Strange is it true PIX/ASA cannot redirect packet comming and leaving same interface ? Thats what I came to know from a colleage, Other firewalls do that, is there a way to make it happen using NAT policy/NAT rule etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't think it is feasible for us to make a sub interface on the PIX that will cause us to move the internal router to a different subnet. Any other suggestions ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 26 Jan 2008 01:21:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/914834#M956404</guid>
      <dc:creator>asirajahmed28</dc:creator>
      <dc:date>2008-01-26T01:21:55Z</dc:date>
    </item>
    <item>
      <title>Re: Static route on inside interface of ASA does'nt work</title>
      <link>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/914835#M956405</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;same-security-traffic permit intra-interface &lt;/P&gt;&lt;P&gt;that command allows traffic to enter and leave the same interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 26 Jan 2008 17:37:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/914835#M956405</guid>
      <dc:creator>srue</dc:creator>
      <dc:date>2008-01-26T17:37:27Z</dc:date>
    </item>
    <item>
      <title>Re: Static route on inside interface of ASA does'nt work</title>
      <link>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/914836#M956407</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, you have 2 ways to resolve this.ASA/PIX not supporting "redirect traffic" also called "hairpining" for unencrypted traffic before v7.2, it's a security feature. After v7.2, you can do this by nat + "same-security-traffic permit intra-interface".&lt;/P&gt;&lt;P&gt;1. the "correct" way,It should let your router/layer3 switch handle internal routing unless you need control traffic among those subnets, and firewall just do access control/vpn.&lt;/P&gt;&lt;P&gt; a.You can setup all internal PCs default gateway point to 192.168.0.254&lt;/P&gt;&lt;P&gt; b. setup router's default route pointing to inside interface of firewall, router will do routing/redirect job&lt;/P&gt;&lt;P&gt; c. remove those 3 static route &lt;/P&gt;&lt;P&gt;2. the "feasible" way&lt;/P&gt;&lt;P&gt; a. make sure you have v7.2 or later&lt;/P&gt;&lt;P&gt; b. same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt; c. configure proper nat, in your case, try this code:&lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0 extended permit ip 192.168.2.0 255.255.255.0 192.168.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0 extended permit ip 192.168.16.0 255.255.255.0  192.168.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0 extended permit ip 192.168.55.0 255.255.255.0  192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0 extended permit ip 192.168.0.0 255.255.255.0 192.168.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0 extended permit ip 192.168.0.0 255.255.255.0  192.168.16.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0 extended permit ip 192.168.0.0 255.255.255.0  192.168.55.0 255.255.255.0  &lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_outbound_nat0&lt;/P&gt;&lt;P&gt;if you have exiting nat exemption statement, just merge them. In this way, you can even put ACL between 192.168.0.0 and the other 3 subnets.These code not been verified,test it after hours.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pleas rate if it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 26 Jan 2008 19:40:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/914836#M956407</guid>
      <dc:creator>pengfang</dc:creator>
      <dc:date>2008-01-26T19:40:00Z</dc:date>
    </item>
    <item>
      <title>Re: Static route on inside interface of ASA does'nt work</title>
      <link>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/914837#M956408</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;access-list inside_outbound_nat0 extended permit ip 192.168.0.0 255.255.255.0 192.168.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0 extended permit ip 192.168.0.0 255.255.255.0 192.168.16.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0 extended permit ip 192.168.0.0 255.255.255.0 192.168.55.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_outbound_nat0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just adding the above nat rules helped thanks a lot, I'll be testing with the user application, thanks for your help&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jan 2008 07:31:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/914837#M956408</guid>
      <dc:creator>asirajahmed28</dc:creator>
      <dc:date>2008-01-28T07:31:24Z</dc:date>
    </item>
    <item>
      <title>Re: Static route on inside interface of ASA does'nt work</title>
      <link>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/914838#M956409</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi pengfang if you can help me with VPN can you address this "I was able to integrate NT Domain authentication for the VPN clients, however I need to know if I can restrict this Authentication to a particular User group in the NT. All other users should not be allowed to VPN in" This posting is in the VPN section. Thanks in advance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jan 2008 08:00:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/914838#M956409</guid>
      <dc:creator>asirajahmed28</dc:creator>
      <dc:date>2008-01-28T08:00:59Z</dc:date>
    </item>
    <item>
      <title>Re: Static route on inside interface of ASA does'nt work</title>
      <link>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/914839#M956411</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://forum.cisco.com/eforum/servlet/NetProf?page=netprof&amp;amp;forum=Virtual%20Private%20Networks&amp;amp;topic=Security&amp;amp;CommCmd=MB%3Fcmd%3Ddisplay_location%26location%3D.2cbf52ea" target="_blank"&gt;http://forum.cisco.com/eforum/servlet/NetProf?page=netprof&amp;amp;forum=Virtual%20Private%20Networks&amp;amp;topic=Security&amp;amp;CommCmd=MB%3Fcmd%3Ddisplay_location%26location%3D.2cbf52ea&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Jan 2008 18:24:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/914839#M956411</guid>
      <dc:creator>pengfang</dc:creator>
      <dc:date>2008-01-29T18:24:16Z</dc:date>
    </item>
    <item>
      <title>Re: Static route on inside interface of ASA does'nt work</title>
      <link>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/914840#M956413</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Only icmp works I get following in the syslog for RDP and other applications&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jan 29 2008 11:46:13: %ASA-6-302013: Built inbound TCP connection 2692400 for Inside:192.168.0.77/4442 (192.168.0.77/4442) to Inside:192.168.16.74/3389 (192.168.16.74/3389)&lt;/P&gt;&lt;P&gt;Jan 29 2008 11:46:13: %ASA-6-302014: Teardown TCP connection 2692414 for Inside:192.168.0.75/2923 to Inside:192.168.16.65/135 duration 0:00:00 bytes 0 TCP Reset-O&lt;/P&gt;&lt;P&gt;Jan 29 2008 11:46:25: %ASA-6-302013: Built inbound TCP connection 2692487 for Inside:192.168.0.77/4443 (192.168.0.77/4443) to Inside:192.168.16.74/3389 (192.168.16.74/3389)&lt;/P&gt;&lt;P&gt;Jan 29 2008 11:46:25: %ASA-6-302014: Teardown TCP connection 2692487 for Inside:192.168.0.77/4443 to Inside:192.168.16.74/3389 duration 0:00:00 bytes 0 TCP Reset-O&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Jan 2008 01:14:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/914840#M956413</guid>
      <dc:creator>asirajahmed28</dc:creator>
      <dc:date>2008-01-30T01:14:01Z</dc:date>
    </item>
    <item>
      <title>Re: Static route on inside interface of ASA does'nt work</title>
      <link>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/4008570#M956415</link>
      <description>&lt;P&gt;If you do not know,then please do not post all this thing which is not useful.&amp;nbsp; Do not confuse the persons who are trying to learn something. Those code are not useful as I tried on real scenario.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2020 05:32:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/4008570#M956415</guid>
      <dc:creator>bangalore.samanta08</dc:creator>
      <dc:date>2020-01-09T05:32:24Z</dc:date>
    </item>
    <item>
      <title>Re: Static route on inside interface of ASA does'nt work</title>
      <link>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/4763362#M1097239</link>
      <description>&lt;P&gt;Would this be a legitimate Nat statement on the ASA if I have a router in parallel with the ASA on the same inside subnet? (router also has an IP from "outside" subnet). It is in parallel to take VPN load off ASA.&lt;BR /&gt;&lt;BR /&gt;nat (inside,inside) 1 source static inside-AMZ-VPN inside-AMZ-VPN destination static obj-amzn-10.24.0.0s13 obj-amzn-10.24.0.0s13 no-proxy-arp description NONAT&lt;BR /&gt;&lt;BR /&gt;I can trace from ASA and it routes to router. If I trace from a host on inside, it goes to ASA which is Default GW for all host on inside network but then continue to outside interface and out.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2023 18:17:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-on-inside-interface-of-asa-does-nt-work/m-p/4763362#M1097239</guid>
      <dc:creator>jroy777</dc:creator>
      <dc:date>2023-01-26T18:17:53Z</dc:date>
    </item>
  </channel>
</rss>

