<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Does &amp;quot;same-security-traffic permit intra-interface&amp;quot; commad w in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/does-quot-same-security-traffic-permit-intra-interface-quot/m-p/847281#M960419</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;Thank you very much for your answer.&lt;/P&gt;&lt;P&gt;I like your idea, but it raise a dubt in me.&lt;/P&gt;&lt;P&gt;I think, why does everything work fine, if I replace the ASA with a router? &lt;/P&gt;&lt;P&gt;Any idea?&lt;/P&gt;&lt;P&gt;Thank you again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 21 Nov 2007 14:21:18 GMT</pubDate>
    <dc:creator>netadminquid</dc:creator>
    <dc:date>2007-11-21T14:21:18Z</dc:date>
    <item>
      <title>Does "same-security-traffic permit intra-interface" commad work?</title>
      <link>https://community.cisco.com/t5/network-security/does-quot-same-security-traffic-permit-intra-interface-quot/m-p/847279#M960409</link>
      <description>&lt;P&gt;Hello.&lt;/P&gt;&lt;P&gt;My default gateway is an ASA5505 and I need to route a network trought a router connected on the same interface of the source client.&lt;/P&gt;&lt;P&gt;So the traffic have to enter and exit by the same interface, to do that I use the same-security-traffic permit intra-interface command, but it works only with icmp traffic.&lt;/P&gt;&lt;P&gt;Why? What I have to do to permit all traffic?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My test configuration is the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 7.2(3) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;enable password xxx&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif INSIDE&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.20.4.31 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; shutdown     &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list ACL-INSIDE-IN extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list ACL-INSIDE-OUT extended permit ip any any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu INSIDE 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any INSIDE&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;access-group ACL-INSIDE-IN in interface INSIDE&lt;/P&gt;&lt;P&gt;access-group ACL-INSIDE-OUT out interface INSIDE&lt;/P&gt;&lt;P&gt;route INSIDE 10.132.1.0 255.255.255.0 172.20.4.30 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;sysopt noproxyarp INSIDE&lt;/P&gt;&lt;P&gt;telnet 172.20.4.0 255.255.255.0 INSIDE&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access INSIDE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;  inspect ftp &lt;/P&gt;&lt;P&gt;  inspect h323 h225 &lt;/P&gt;&lt;P&gt;  inspect h323 ras &lt;/P&gt;&lt;P&gt;  inspect netbios &lt;/P&gt;&lt;P&gt;  inspect rsh &lt;/P&gt;&lt;P&gt;  inspect rtsp &lt;/P&gt;&lt;P&gt;  inspect skinny &lt;/P&gt;&lt;P&gt;  inspect esmtp &lt;/P&gt;&lt;P&gt;  inspect sqlnet &lt;/P&gt;&lt;P&gt;  inspect sunrpc &lt;/P&gt;&lt;P&gt;  inspect tftp &lt;/P&gt;&lt;P&gt;  inspect sip &lt;/P&gt;&lt;P&gt;  inspect xdmcp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;username test password xxx encrypted privilege 15&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:32:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/does-quot-same-security-traffic-permit-intra-interface-quot/m-p/847279#M960409</guid>
      <dc:creator>netadminquid</dc:creator>
      <dc:date>2019-03-11T11:32:48Z</dc:date>
    </item>
    <item>
      <title>Re: Does "same-security-traffic permit intra-interface" commad w</title>
      <link>https://community.cisco.com/t5/network-security/does-quot-same-security-traffic-permit-intra-interface-quot/m-p/847280#M960415</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;to me it sound like the return traffic is not going the same way back. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;client -&amp;gt; fw -&amp;gt; router -&amp;gt; destination&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;return traffic:&lt;/P&gt;&lt;P&gt;destination -&amp;gt; router -&amp;gt; client &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so the state table of the connection might be broken. and icmp is working because its stateless.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;just a guess - had a similar routing issue with two asa boxes in parallel setup (no HA).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2007 13:52:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/does-quot-same-security-traffic-permit-intra-interface-quot/m-p/847280#M960415</guid>
      <dc:creator>bauer.juergen</dc:creator>
      <dc:date>2007-11-21T13:52:09Z</dc:date>
    </item>
    <item>
      <title>Re: Does "same-security-traffic permit intra-interface" commad w</title>
      <link>https://community.cisco.com/t5/network-security/does-quot-same-security-traffic-permit-intra-interface-quot/m-p/847281#M960419</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;Thank you very much for your answer.&lt;/P&gt;&lt;P&gt;I like your idea, but it raise a dubt in me.&lt;/P&gt;&lt;P&gt;I think, why does everything work fine, if I replace the ASA with a router? &lt;/P&gt;&lt;P&gt;Any idea?&lt;/P&gt;&lt;P&gt;Thank you again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2007 14:21:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/does-quot-same-security-traffic-permit-intra-interface-quot/m-p/847281#M960419</guid>
      <dc:creator>netadminquid</dc:creator>
      <dc:date>2007-11-21T14:21:18Z</dc:date>
    </item>
    <item>
      <title>Re: Does "same-security-traffic permit intra-interface" commad w</title>
      <link>https://community.cisco.com/t5/network-security/does-quot-same-security-traffic-permit-intra-interface-quot/m-p/847282#M960421</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would agree with the previous poster.  The router that you replace the ASA with would not be keeping a state table to break, just happily route away.  The ASA however, on not seeing a SYNACK return through it for the SYN it has already seen, will deny the TCP connection.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2007 14:30:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/does-quot-same-security-traffic-permit-intra-interface-quot/m-p/847282#M960421</guid>
      <dc:creator>kagodfrey</dc:creator>
      <dc:date>2007-11-21T14:30:17Z</dc:date>
    </item>
    <item>
      <title>Re: Does "same-security-traffic permit intra-interface" commad w</title>
      <link>https://community.cisco.com/t5/network-security/does-quot-same-security-traffic-permit-intra-interface-quot/m-p/847283#M960424</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;kagodfrey is right, there is no state table on an (ip base) router - maybe you would have the same issue with an fw ios on the router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;maybe you can reconfigure your routing: default gateway for all clients is the internal router, the internal router uses the asa as the default gw...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope that helps,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;juergen&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2007 15:50:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/does-quot-same-security-traffic-permit-intra-interface-quot/m-p/847283#M960424</guid>
      <dc:creator>bauer.juergen</dc:creator>
      <dc:date>2007-11-21T15:50:28Z</dc:date>
    </item>
    <item>
      <title>Re: Does "same-security-traffic permit intra-interface" commad w</title>
      <link>https://community.cisco.com/t5/network-security/does-quot-same-security-traffic-permit-intra-interface-quot/m-p/847284#M960427</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes it's right, I verified it monitoring the ASA interface with a protocol analyzer, frames from the PC get to the ASA and then from the ASA go to the router but nothing come back trought the ASA.&lt;/P&gt;&lt;P&gt;We can solve the problem working on the router, adding a static route that routes the router's local network trought the ASA.&lt;/P&gt;&lt;P&gt;That works but I don't think it's a good thing.&lt;/P&gt;&lt;P&gt;Thank you to all&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Nov 2007 10:28:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/does-quot-same-security-traffic-permit-intra-interface-quot/m-p/847284#M960427</guid>
      <dc:creator>netadminquid</dc:creator>
      <dc:date>2007-11-22T10:28:55Z</dc:date>
    </item>
    <item>
      <title>Re: Does "same-security-traffic permit intra-interface" commad w</title>
      <link>https://community.cisco.com/t5/network-security/does-quot-same-security-traffic-permit-intra-interface-quot/m-p/847285#M960429</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"We can solve the problem working on the router, adding a static route that routes the router's local network trought the ASA."#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;wont work - that network is locally connected and so it already has a route to it - if you add a static route this one wont make it into the routing table because static routes have an administrative distance of 1 while locally connected network routes have an AD of 0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;changing the default gateway on all hosts is imho the best solution and your more flexible with a router as default gateway. &lt;/P&gt;&lt;P&gt;of course it can be a lot of work &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Juergen&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Nov 2007 14:58:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/does-quot-same-security-traffic-permit-intra-interface-quot/m-p/847285#M960429</guid>
      <dc:creator>bauer.juergen</dc:creator>
      <dc:date>2007-11-22T14:58:56Z</dc:date>
    </item>
    <item>
      <title>Re: Does "same-security-traffic permit intra-interface" commad w</title>
      <link>https://community.cisco.com/t5/network-security/does-quot-same-security-traffic-permit-intra-interface-quot/m-p/847286#M960430</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you are right.&lt;/P&gt;&lt;P&gt;In fact, I tried adding a static route only for my testing host, so the added route is a strictly match and it works, but you can't do the same with the entire network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Nov 2007 15:40:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/does-quot-same-security-traffic-permit-intra-interface-quot/m-p/847286#M960430</guid>
      <dc:creator>netadminquid</dc:creator>
      <dc:date>2007-11-22T15:40:35Z</dc:date>
    </item>
    <item>
      <title>Re: Does "same-security-traffic permit intra-interface" commad w</title>
      <link>https://community.cisco.com/t5/network-security/does-quot-same-security-traffic-permit-intra-interface-quot/m-p/847287#M960431</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please confirm the network you are routing to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should be able to route a network from the firewall to the router both on the internal (inside) interface of the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking at the config the network in question is 10.132.10/24.  Is this correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If so kindly show the router config (4.30)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tim&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Nov 2007 04:33:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/does-quot-same-security-traffic-permit-intra-interface-quot/m-p/847287#M960431</guid>
      <dc:creator>timkaye</dc:creator>
      <dc:date>2007-11-27T04:33:28Z</dc:date>
    </item>
    <item>
      <title>Re: Does "same-security-traffic permit intra-interface" commad w</title>
      <link>https://community.cisco.com/t5/network-security/does-quot-same-security-traffic-permit-intra-interface-quot/m-p/847288#M960432</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes the network is correct.&lt;/P&gt;&lt;P&gt;We are talking about a test enviroment, so the router has 2 ethernet interfaces configured respectively 172.20.4.30 and 10.132.1.30 and nothing else.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Nov 2007 08:58:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/does-quot-same-security-traffic-permit-intra-interface-quot/m-p/847288#M960432</guid>
      <dc:creator>netadminquid</dc:creator>
      <dc:date>2007-11-27T08:58:08Z</dc:date>
    </item>
  </channel>
</rss>

