<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: intervlan comm on firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/intervlan-comm-on-firewall/m-p/649417#M1035637</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;But the FWSM is meant for FW only know with out SUP?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 08 Feb 2007 04:05:33 GMT</pubDate>
    <dc:creator>aksher</dc:creator>
    <dc:date>2007-02-08T04:05:33Z</dc:date>
    <item>
      <title>intervlan comm on firewall</title>
      <link>https://community.cisco.com/t5/network-security/intervlan-comm-on-firewall/m-p/649415#M1035606</link>
      <description>&lt;P&gt;how is intervlan communication enabled on PIX and FWSM.I believe the traffic is carried to an L3 or router on PIX scenario to enable intervlan routing.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:30:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/intervlan-comm-on-firewall/m-p/649415#M1035606</guid>
      <dc:creator>aksher</dc:creator>
      <dc:date>2019-03-11T09:30:13Z</dc:date>
    </item>
    <item>
      <title>Re: intervlan comm on firewall</title>
      <link>https://community.cisco.com/t5/network-security/intervlan-comm-on-firewall/m-p/649416#M1035625</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The PIX, if configured for 'routed' mode,  handles intervlan routing by itself while the ASA keeps watch on layer 3 to 7.Ofcourse intervlan routing is not needed for 'transparent' mode. For FWSM the routing is handled by the switch supervisor (MSFC) as the vlans are defined on the sup itself and assigned to FWSM.To enable intervlan routing the administrator will ofcourse have to configure policies(ACLs) to allow traffic to be routed as the default ASA behaviour would not allow traffic between different security regions.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Feb 2007 07:52:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/intervlan-comm-on-firewall/m-p/649416#M1035625</guid>
      <dc:creator>sacbhati</dc:creator>
      <dc:date>2007-02-07T07:52:20Z</dc:date>
    </item>
    <item>
      <title>Re: intervlan comm on firewall</title>
      <link>https://community.cisco.com/t5/network-security/intervlan-comm-on-firewall/m-p/649417#M1035637</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;But the FWSM is meant for FW only know with out SUP?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Feb 2007 04:05:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/intervlan-comm-on-firewall/m-p/649417#M1035637</guid>
      <dc:creator>aksher</dc:creator>
      <dc:date>2007-02-08T04:05:33Z</dc:date>
    </item>
  </channel>
</rss>

