same-security-traffic
To permit communication between interfaces with equal security levels, or to allow traffic to enter and exit the same interface, use the same-security-traffic command in global configuration mode. To disable the same-security traffic, use the no form of this command.
same-security-traffic permit { inter-interface | intra-interface }
no same-security-traffic permit { inter-interface | intra-interface }
Syntax Description
inter-interface |
Permits communication between different interfaces that have the same security level. |
intra-interface |
Permits communication in and out of the same interface. |
Command Default
This command is disabled by default.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode |
Firewall Mode |
Security Context |
|||
---|---|---|---|---|---|
Routed |
Transparent |
Single |
Multiple |
||
Context |
System |
||||
Global configuration |
|
|
|
|
— |
Command History
Release |
Modification |
---|---|
7.0(1) |
This command was added. |
7.2(1) |
The intra-interface keyword now allows all traffic to enter and exit the same interface, and not just IPsec traffic. |
Usage Guidelines
Allowing communication between same security interfaces (enabled by the same-security-traffic inter-interface command) provides the following benefits:
-
You can configure more than 101 communicating interfaces. If you use different levels for each interface, you can configure only one interface per level (0 to 100).
-
You can allow traffic to flow freely between all same security interfaces without access lists.
The same-security-traffic intra-interface command lets traffic enter and exit the same interface, which is normally not allowed. This feature might be useful for VPN traffic that enters an interface, but is then routed out the same interface. The VPN traffic might be unencrypted in this case, or it might be re-encrypted for another VPN connection. For example, if you have a hub and spoke VPN network, where the Secure Firewall ASA is the hub, and remote VPN networks are spokes, for one spoke to communicate with another spoke, traffic must go into the ASA and then out again to the other spoke.
Note |
All traffic allowed by the same-security-traffic intra-interface command is still subject to firewall rules. Be careful not to create an asymmetric routing situation that can cause return traffic not to traverse the ASA. |
Examples
The following example shows how to enable the same-security interface communication:
ciscoasa(config)# same-security-traffic permit inter-interface
The following example shows how to enable traffic to enter and exit the same interface:
ciscoasa(config)# same-security-traffic permit intra-interface