10-24-2011 01:47 AM - edited 03-11-2019 02:41 PM
Hi,
I have a Cisco ASA 5510 configured to access the internet, with an:
inside interface (ethernet 0/1) 130.130.0.254 and
outside interface (ethernet 0/0) x.x.x.x
I have now configured another inside interface (ethernet0/2) on ASA with the IP 172.16.0.254 and I have connected it directly to another switch with a management IP 172.16.0.5.
The problem is that the two inside interfaces (130.130.0.254 &172.16.0.254) cannot communicate with each other thus the e0/2 172.16.0.254 interface cannot access the internet.
Please see the diagram that I have attached for you below for a better point of view.
Thank you.
Solved! Go to Solution.
10-24-2011 02:43 AM
You need to configure NAT exeption and an ACL for the new interface, as this will have a lower security level than the inside interface. You could also configure a NAT for the new interface to access the internet directly.
10-24-2011 02:49 AM
You also need to define
"same-security-traffic permit inter-interface" to allow interfaces with same security levels to communicate with each other.
10-24-2011 02:43 AM
You need to configure NAT exeption and an ACL for the new interface, as this will have a lower security level than the inside interface. You could also configure a NAT for the new interface to access the internet directly.
10-24-2011 02:54 AM
Thank you. NAT exceptions and ACL was the solution.
10-24-2011 02:49 AM
You also need to define
"same-security-traffic permit inter-interface" to allow interfaces with same security levels to communicate with each other.
10-24-2011 02:56 AM
Thank you as well. This tick box that you mentioned is important too!
10-24-2011 03:08 AM
You are welcome.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide