04-23-2009 08:10 AM - edited 03-11-2019 08:22 AM
Do the management interface routes tie in with the other routes on the ASA or are they separated? I'm trying to figure if say network 10.10.2.0 is granted management access would that that route conflict with site-to-site VPN traffic from the same source network?
04-29-2009 12:54 PM
The ASA 5510 and higher adaptive security appliance includes a dedicated management interface called Management 0/0, which is meant to support traffic to the security appliance. However, you can configure any interface to be a management-only interface using the management-only command. Also, for Management 0/0, you can disable management-only mode so the interface can pass through traffic just like any other interface.
Transparent firewall mode allows only two interfaces to pass through traffic; however, on the ASA 5510 and higher adaptive security appliance, you can use the Management 0/0 interface (either the physical interface or a subinterface) as a third interface for management traffic. The mode is not configurable in this case and must always be management-only. You can also set the IP address of this interface in transparent mode if you want this interface to be on a different subnet from the management IP address, which is assigned to the security appliance or context, and not to individual interfaces.
04-29-2009 02:12 PM
Thanks for your info. Let me clarify. Is the routing table on the 5520 shared between the management and other interfaces?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide