Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
For your 1st clarification, yes you are right. However, rather than applying it per interface using the service-policy, you can just apply it on the default global policy that is configured on Cisco ASAs. You can find that default here. So if you wan...
Hi,For your first question: "Can I know why I need to add this inbound rule since same-security-traffic permit inter-interface is configured at FW 01?"It probably has to do with ICMP inspection. By default, ICMP traffic is not inspected by the ASA so...
For your dynamic NAT, I guess you meant to match "10.10.10.0" in the NAT statements? Either ways, those two NAT statements will not be accepted because they are duplicates. If you are looking to know the order of NAT rules used to match real addresse...
Hi Dhaval,As long as you have the routing set up correctly and the DMZ interface is on a higher security level than outside, then you shouldn't need any ACL to allow traffic from the DMZ to the Outside. However, if you need devices on the Outside to ...