ASA 5510 - Wide Open Configuration Assistance Needed

Unanswered Question
May 21st, 2009

I would like to insert an ASA 5510 into our network in transparent mode. I would like to begin by allowing all traffic to pass between the two interfaces unrestricted. How would I go about doing this?

I currently have access lists on both interfaces that read:

outside_access_in extended permit ip any any

inside_access_in extended permit ip any any

Outside interface security level = 99

Inside interface security level = 99

Same-security-traffic permit inter-interface is enabled.

Any thoughts are appreciated.


I have this problem too.
0 votes
  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 0 (0 ratings)
Anonymous (not verified) Wed, 05/27/2009 - 13:54

When the security appliance runs in transparent mode, the outbound interface of a packet is determined by a MAC address lookup instead of a route lookup. Route statements can still be configured, but they only apply to security appliance-originated traffic. For example, if your syslog server is located on a remote network, you must use a static route, so the security appliance can reach that subnet.

Kureli Sankar Wed, 05/27/2009 - 17:28

Since you have same security, flow initiated from both sides will automatically be allowed without any need for access-list.

Pls. read this link below:

Allowing Communication Between Interfaces on the Same Security Level

By default, interfaces on the same security level cannot communicate with each other. Allowing communication between same security interfaces provides the following benefits:

•You can configure more than 101 communicating interfaces.

If you use different levels for each interface and do not assign any interfaces to the same security level, you can configure only one interface per level (0 to 100).

•You want traffic to flow freely between all same security interfaces without access lists.

hostname(config)# same-security-traffic permit inter-interface


This Discussion