Solved

Broadcast Traffic

Posted on 2013-10-23
2
770 Views
Last Modified: 2013-10-24
I'm sure this is a 101 question, but I honestly am not sure of the answer. Will network broadcast traffic jump interfaces on a Cisco ASA 5510?

Allow me to attempt to describe the network:

Sonicwall NSA 250
Inside Interface IP: 192.168.1.XX
Outside Interface IP: 74.XX.XX.180

Cisco ASA 5510
Inside Interface IP: 10.4.XX.XX
Inside2 Interface IP: 192.168.1.XX
Outside Interface: 74.XX.XX.181

Both the Sonicwall and the Cisco devices are connected to a cable internet modem on the outside interfaces

Both the Sonicwall and the Cisco devices connect to the LAN through a Cisco switch on the Inside interfaces

The Cisco Interface Inside2 connects to a Netgear switch and a separate LAN

Traffic passes from the 192.168.1.XX network to the 10.4.XX.XX network in both directions.
Both LAN can access the internet

So... my question is... will broadcast traffic from 192.168.1.XX pass to the 10.4.XX.XX network?

Now, I didn't mentioned any ACLs on either device because I was wondering if the break in segments would be sufficient to stop broadcast traffic.

Thanks for all comments and advice
Tom
0
Comment
Question by:silsuba
2 Comments
 
LVL 27

Accepted Solution

by:
masnrock earned 500 total points
ID: 39595854
The answer to that question is no. Broadcast traffic from any device within a subnet will only broadcast within that same subnet.
0
 

Author Closing Comment

by:silsuba
ID: 39595926
Perfect... that's the answer I expected, but for some reason I needed to confirm.
0

Featured Post

Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question