cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
688
Views
0
Helpful
2
Replies

Cisco ASA Management - Inside Interface Routing

DEV1389
Level 1
Level 1

Hello Guys, 

 

I am configuring ASAv with Inside and Mngt Zone with same Security level. But I am not able to ping devices behind both network. 

ciscoasa# show nameif
Interface Name Security
GigabitEthernet0/3.10 DMZVlan10 50
GigabitEthernet0/3.159 DMZMngtVLAN159 50
GigabitEthernet0/4.20 InsideVlan20 100
GigabitEthernet0/4.158 InsideMngtVlan158 100
GigabitEthernet0/5 Outside 0
Management0/0 Managment 100

ciscoasa# show int ip br
Interface IP-Address OK? Method Status Protocol
GigabitEthernet0/0 30.30.30.10 YES unset up up
GigabitEthernet0/1 unassigned YES unset down down
GigabitEthernet0/2 unassigned YES unset administratively down down
GigabitEthernet0/3 unassigned YES unset up up
GigabitEthernet0/3.10 172.16.10.10 YES CONFIG up up
GigabitEthernet0/3.159 159.10.10.10 YES CONFIG up up
GigabitEthernet0/4 unassigned YES unset up up
GigabitEthernet0/4.20 192.168.20.10 YES CONFIG up up
GigabitEthernet0/4.158 158.20.20.10 YES CONFIG up up
GigabitEthernet0/5 191.191.191.10 YES CONFIG up up
GigabitEthernet0/6 unassigned YES unset administratively down down
Internal-Data0/0 169.254.1.1 YES unset up up
Management0/0 157.10.10.10 YES CONFIG up upc

 

ciscoasa# show run access-list
access-list OUTIN extended permit ip any any log
access-list OUTIN extended permit udp any host 192.168.100.100 eq 464 log
access-list OUTIN extended permit tcp any host 192.168.100.100 eq 135 log
access-list OUTIN extended permit tcp any host 192.168.100.100 eq ldaps log
access-list OUTIN extended permit udp any host 192.168.100.100 range netbios-ns netbios-dgm log
access-list INDMZ extended permit ip any any log
access-list OUTMNGT extended permit ip any any log
access-list DMZMGMT extended permit ip any any

ciscoasa# show run router
router ospf 1
network 157.10.10.0 255.255.255.0 area 0
network 158.20.20.0 255.255.255.0 area 0
network 159.10.10.0 255.255.255.0 area 0
network 172.16.10.0 255.255.255.0 area 0
network 191.191.191.0 255.255.255.0 area 0
network 192.168.20.0 255.255.255.0 area 0
log-adj-changes
!

Welcome for your feedback. 

 

With Regards

WAQ

 

2 Replies 2

balaji.bandi
Hall of Fame
Hall of Fame

try 

 

ASA(config)#same-security-traffic permit intra-interface

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

Hello

Access to any other interface on the asa isnt supported to/from the managment interface


Please rate and mark as an accepted solution if you have found any of the information provided useful.
This then could assist others on these forums to find a valuable answer and broadens the community’s global network.

Kind Regards
Paul
Review Cisco Networking for a $25 gift card