Solved

cisco asa5506 traffic between interfaces

Posted on 2016-08-27
9
49 Views
Last Modified: 2016-09-06
how do you allow interfaces on asa5506 to allow traffic?  i see a check mark there and also ensure the security levels are the same but i cant ping either subnett of each interfaces.

appreciate your time....

thanks,
0
Comment
Question by:mwauki
  • 4
  • 4
9 Comments
 
LVL 94

Expert Comment

by:John Hurst
ID: 41772891
Are the two machines together in the same office / area, or are they separated by the internet and in different locations. In the latter case, you would need to set up a VPN connection to connect the devices.
0
 
LVL 28

Accepted Solution

by:
Jan Springer earned 500 total points
ID: 41772975
Each interface on a 5506 is routed and will have its own nameif with a security level.

You will create ACLs for the traffic inbound to the ASA for the permitted actions and deny all else for that subnet, then permit everything (rule order is important).

You may also need the "same-security-traffic permit inter-interface" or "same-security-traffic permit intra-interface".

If you can specific, we can help craft rules.
0
 

Author Comment

by:mwauki
ID: 41773282
thanks! ok, here it is:
asa5506, gigabit1/2 & 1/3,  on same unit.  
ips: g1/2=192.168.1.0/24  ,  g1/3=192.168.2.0/24

i'v ran "same-security-traffic permit intra-interface" and i can see that both interfaces are able to exchange traffic now.  however, when i created a vpn from this unit(siteA) to another unit (siteB), only devices on g1/2 gets a successful ping accross to siteB.  SiteB also gets a successful ping only to devices on g1/2.  

vpn (site-site): siteA g1/2 & g1/3 are under one networkobject as a network.

windows firewall is turned off on all involve stations.

please let me know if you need more info.

thanks,
0
Visualize your virtual and backup environments

Create well-organized and polished visualizations of your virtual and backup environments when planning VMware vSphere, Microsoft Hyper-V or Veeam deployments. It helps you to gain better visibility and valuable business insights.

 
LVL 28

Expert Comment

by:Jan Springer
ID: 41773291
Does the ACL for the VPN include both subnets?

Are but subnets excluded from NAT?
0
 

Author Comment

by:mwauki
ID: 41773684
isn't ACL auto created once the vpn is configured and online?  sorry, just trying to understand this...

i can see that my ACL has the default entries.  unless am looking at a wrong place... please advise.

thanks,
0
 
LVL 28

Expert Comment

by:Jan Springer
ID: 41773841
You have to define somewhere the local and remote "interesting" subnets for encryption.

I don't use ASDM, so if that's what you're using, I won't be of much help.

If you post a sanitized configuration, that would give me somewhere to start.
0
 

Author Comment

by:mwauki
ID: 41774178
ok.  any specific part of the running config?  i can do a lil from the cli... would you be able to show me the cli command need to run for this particular ?
0
 
LVL 28

Expert Comment

by:Jan Springer
ID: 41774753
term pag 0
sh run

Then do an X.X for the first two octets of the public IP(s).  

Delete all line that contain: passwords, keys, usernames, logging, snmp, etc.

We're only interested in any detail that involves routing to include access lists.  So, if you're using objects and object-groups, I'll need that detail.  If you don't want it publicly published, sent it to my EE mailbox.  I'll look at it and respond back here.
0
 

Author Comment

by:mwauki
ID: 41775784
ok. sent it to your message box
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I recently updated from an old PIX platform to the new ASA platform.  While upgrading, I was tremendously confused about how the VPN and AnyConnect licensing works.  It turns out that the ASA has 3 different VPN licensing schemes. "site-to-site" …
This article will cover setting up redundant ISPs for outbound connectivity on an ASA 5510 (although the same should work on the 5520s and up as well).  It’s important to note that this covers outbound connectivity only.  The ASA does not have built…
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …
Both in life and business – not all partnerships are created equal. Spend 30 short minutes with us to learn:   • Key questions to ask when considering a partnership to accelerate your business into the cloud • Pitfalls and mistakes other partners…

696 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question