<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5506-X-W trunk in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3182093#M1066298</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have some trouble creating a "trunk" on the ASA5506-x-w.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the old 5505 easy switchport&amp;nbsp; trunk etc..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;but on the 5506 with sub-interfacec, i have a hard time to get my setup working, (simple setup)&lt;/P&gt;&lt;P&gt;and is a bit embarrassed that i have to ask for help about this, but i am in a dead lock and don't know how to get any further.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the setup:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;have a inside network 192.168.1.0/24 vlan10 and have a DMZ 192.168.200.0/24. vlan 200&lt;/P&gt;&lt;P&gt;My main building only have vlan 10 and the other building have both vlan 10 and 200 (Trunk)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;from my main building a can reach vlan 200 but not my default vlan 10.&lt;/P&gt;&lt;P&gt;from my other building i can reach vlan 10 and internet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;as is it now in a non working state:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA:&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/3&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_2&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3.1&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;vlan 1&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside-vlan1&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3.10&lt;BR /&gt;&amp;nbsp;vlan 10&lt;BR /&gt;&amp;nbsp;nameif inside-vlan10&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3.200&lt;BR /&gt;&amp;nbsp;vlan 200&lt;BR /&gt;&amp;nbsp;nameif DMZ&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.200.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface BVI1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Switch:&lt;/P&gt;&lt;P&gt;(can't reach the switch right now, so this is from memmory)&lt;/P&gt;&lt;P&gt;interface gigabit 0/1&lt;/P&gt;&lt;P&gt;switchport mode trunk&lt;/P&gt;&lt;P&gt;switchport mode trunk native vlan 10&lt;/P&gt;&lt;P&gt;switchport allowed vlan 1,20,200&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;fa interface 0/1&lt;/P&gt;&lt;P&gt;switchport access&lt;/P&gt;&lt;P&gt;swich port access vlan 10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;fa interface 0/3&lt;/P&gt;&lt;P&gt;switchport access&lt;/P&gt;&lt;P&gt;swich port access vlan 200&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;vlan 1,10,200&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface vlan 200&lt;/P&gt;&lt;P&gt;ip add 192.168.1.200/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;default gateway 192.168.1.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do anyone know what i am doint wrong?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Br Kevin&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 14:17:22 GMT</pubDate>
    <dc:creator>ktoft</dc:creator>
    <dc:date>2020-02-21T14:17:22Z</dc:date>
    <item>
      <title>ASA 5506-X-W trunk</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3182093#M1066298</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have some trouble creating a "trunk" on the ASA5506-x-w.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the old 5505 easy switchport&amp;nbsp; trunk etc..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;but on the 5506 with sub-interfacec, i have a hard time to get my setup working, (simple setup)&lt;/P&gt;&lt;P&gt;and is a bit embarrassed that i have to ask for help about this, but i am in a dead lock and don't know how to get any further.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the setup:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;have a inside network 192.168.1.0/24 vlan10 and have a DMZ 192.168.200.0/24. vlan 200&lt;/P&gt;&lt;P&gt;My main building only have vlan 10 and the other building have both vlan 10 and 200 (Trunk)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;from my main building a can reach vlan 200 but not my default vlan 10.&lt;/P&gt;&lt;P&gt;from my other building i can reach vlan 10 and internet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;as is it now in a non working state:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA:&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/3&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_2&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3.1&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;vlan 1&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside-vlan1&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3.10&lt;BR /&gt;&amp;nbsp;vlan 10&lt;BR /&gt;&amp;nbsp;nameif inside-vlan10&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3.200&lt;BR /&gt;&amp;nbsp;vlan 200&lt;BR /&gt;&amp;nbsp;nameif DMZ&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.200.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface BVI1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Switch:&lt;/P&gt;&lt;P&gt;(can't reach the switch right now, so this is from memmory)&lt;/P&gt;&lt;P&gt;interface gigabit 0/1&lt;/P&gt;&lt;P&gt;switchport mode trunk&lt;/P&gt;&lt;P&gt;switchport mode trunk native vlan 10&lt;/P&gt;&lt;P&gt;switchport allowed vlan 1,20,200&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;fa interface 0/1&lt;/P&gt;&lt;P&gt;switchport access&lt;/P&gt;&lt;P&gt;swich port access vlan 10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;fa interface 0/3&lt;/P&gt;&lt;P&gt;switchport access&lt;/P&gt;&lt;P&gt;swich port access vlan 200&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;vlan 1,10,200&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface vlan 200&lt;/P&gt;&lt;P&gt;ip add 192.168.1.200/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;default gateway 192.168.1.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do anyone know what i am doint wrong?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Br Kevin&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:17:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3182093#M1066298</guid>
      <dc:creator>ktoft</dc:creator>
      <dc:date>2020-02-21T14:17:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X-W trunk</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3182103#M1066299</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;Why are you using bridge-group ?&lt;/P&gt;
&lt;P&gt;Your subnets are&amp;nbsp;192.168.1.0/24 for vlan10 and 192.168.200.0/24 for DMZ. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have you tried the following configuration?&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet1/3 &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;no nameif &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;no security-level&lt;/P&gt;
&lt;P&gt;&amp;nbsp;no ip address&lt;/P&gt;
&lt;P&gt;&amp;nbsp;no shutdown&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet1/3.10 &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;vlan 10 &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;nameif inside &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;security-level 100&lt;/P&gt;
&lt;P&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;no shutdown&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet1/3.200&lt;/P&gt;
&lt;P&gt;&amp;nbsp;vlan 200&lt;/P&gt;
&lt;P&gt;&amp;nbsp;nameif dmz&lt;/P&gt;
&lt;P&gt;&amp;nbsp;security-level 100&lt;/P&gt;
&lt;P&gt;&amp;nbsp;ip address 192.168.200.1 255.255.255.0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;no shutdown&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This configuration is straight forward and standard. Try that and let us know.&lt;/P&gt;</description>
      <pubDate>Sat, 09 Sep 2017 23:57:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3182103#M1066299</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-09-09T23:57:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X-W trunk</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3182134#M1066300</link>
      <description>&lt;P&gt;Hi Francesco&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the reply&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am using bridge-group because i want the "switch" function of the asa.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a AP direct attached in gi 0/2 to provide wireless to my house.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I dont have a switch in my main building&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And from what i know i have to ude bridge-group to get this function or is there a nother way?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Sep 2017 05:59:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3182134#M1066300</guid>
      <dc:creator>ktoft</dc:creator>
      <dc:date>2017-09-10T05:59:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X-W trunk</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3182188#M1066301</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I missed the part where you don't have switch on your site and this is why you absoluetly need to use bridge-group.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm using an ASAv version 9.8 within GNS3 to make it quick.&lt;/P&gt;
&lt;P&gt;&lt;IMG src="blob:https://supportforums.cisco.com/3a292187-d452-4b74-b9ef-8cbc03f6aa55" border="0" /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PC1 is connected on G0/0&lt;/P&gt;
&lt;P&gt;PC2 is connected on G0/1&lt;/P&gt;
&lt;P&gt;PC3 is connected on G0/2&lt;/P&gt;
&lt;P&gt;PC4 and switch are connected to G0/3&lt;/P&gt;
&lt;P&gt;ISP router connected to G0/4&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I attach the ASA config, then you can take a look how I managed the bridge-group and apply the same philosophy to your asa. It's a very basic config with acl permitting any just to show you how it works.&lt;/P&gt;
&lt;P&gt;All PCs can be reached no matter from which vlan you're.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Sep 2017 15:21:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3182188#M1066301</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-09-10T15:21:54Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X-W trunk</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3182679#M1066302</link>
      <description>&lt;P&gt;HI franccesco&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;sorry to say still cant get it to work?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i got it to semi work, i could reach the guest house from the main house, as i want but then the guest house lost its internet access.. Hmmm and now back to only being able to reach vlan 200&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i have changed vlan 10 to 1 just to see if that did anything good.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;cant figure out what i am doing wrong.. here is my config&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Switch config:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;version 12.1&lt;BR /&gt;no service pad&lt;BR /&gt;service timestamps debug uptime&lt;BR /&gt;service timestamps log uptime&lt;BR /&gt;service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname xx&lt;BR /&gt;!&lt;BR /&gt;clock timezone cet 1&lt;BR /&gt;clock summer-time ECTD recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;BR /&gt;ip subnet-zero&lt;BR /&gt;ip dhcp excluded-address 192.168.200.1 192.168.200.5&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool xx-pool&lt;BR /&gt;&amp;nbsp;&amp;nbsp; network 192.168.200.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; default-router 192.168.200.1&lt;BR /&gt;&amp;nbsp;&amp;nbsp; dns-server 8.8.8.8 8.8.4.4&lt;BR /&gt;!&lt;BR /&gt;spanning-tree mode pvst&lt;BR /&gt;no spanning-tree optimize bpdu transmission&lt;BR /&gt;spanning-tree extend system-id&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;random-detect&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/2&lt;BR /&gt;&amp;nbsp;switchport access vlan 200&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/3&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;random-detect&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/4&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;random-detect&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/5&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;random-detect&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/6&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;random-detect&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/7&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;random-detect&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/8&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;random-detect&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;switchport mode trunk&lt;BR /&gt;&amp;nbsp;no keepalive&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.200 255.255.255.0&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;!&lt;BR /&gt;interface Vlan200&lt;BR /&gt;&amp;nbsp;ip address 192.168.200.2 255.255.255.0&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;ip default-gateway 192.168.1.1&lt;BR /&gt;ip http server&lt;BR /&gt;banner motd ^CCC&lt;BR /&gt;UNAUTHORISED ACCESS TO THIS DEVICE IS PROHIBITED.&lt;BR /&gt;&amp;nbsp;You must have explicit permission to access this&lt;BR /&gt;&amp;nbsp;device. All activities performed on this device&lt;BR /&gt;&amp;nbsp;are logged, any violations of this policy will be&lt;BR /&gt;&amp;nbsp;prosecuted.&lt;BR /&gt;^C&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;&amp;nbsp;exec-timeout 90 0&lt;BR /&gt;&amp;nbsp;logging synchronous&lt;BR /&gt;line vty 0 4&lt;BR /&gt;&amp;nbsp;logging synchronous&lt;BR /&gt;&amp;nbsp;login&lt;BR /&gt;line vty 5 15&lt;BR /&gt;&amp;nbsp;logging synchronous&lt;BR /&gt;&amp;nbsp;login&lt;BR /&gt;!&lt;BR /&gt;ntp clock-period 17180147&lt;BR /&gt;ntp server&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA config:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hostname&lt;BR /&gt;names&lt;BR /&gt;ip local pool vpn_subnet 192.168.100.10-192.168.100.100 mask 255.255.255.0&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.2.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_1&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3.10&lt;BR /&gt;&amp;nbsp;vlan 1&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif Inside_vlan1&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3.200&lt;BR /&gt;&amp;nbsp;vlan 200&lt;BR /&gt;&amp;nbsp;bridge-group 2&lt;BR /&gt;&amp;nbsp;nameif DMZ_vlan200&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_3&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_4&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_5&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_6&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_7&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/9&lt;BR /&gt;&amp;nbsp;nameif wifi&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface BVI1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface BVI2&lt;BR /&gt;&amp;nbsp;nameif DMZ&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.200.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj_any1&lt;BR /&gt;&amp;nbsp;nat (inside_1,outside) dynamic interface&lt;BR /&gt;object network obj_any3&lt;BR /&gt;&amp;nbsp;nat (inside_3,outside) dynamic interface&lt;BR /&gt;object network obj_any4&lt;BR /&gt;&amp;nbsp;nat (inside_4,outside) dynamic interface&lt;BR /&gt;object network obj_any5&lt;BR /&gt;&amp;nbsp;nat (inside_5,outside) dynamic interface&lt;BR /&gt;object network obj_any6&lt;BR /&gt;&amp;nbsp;nat (inside_6,outside) dynamic interface&lt;BR /&gt;object network obj_any7&lt;BR /&gt;&amp;nbsp;nat (inside_7,outside) dynamic interface&lt;BR /&gt;object network obj_any_wifi&lt;/P&gt;&lt;P&gt;&amp;nbsp;nat (wifi,outside) dynamic interface&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_access_in_1 in interface inside&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 192.168.2.1 1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd dns 8.8.8.8 8.8.4.4&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.10.2-192.168.10.254 wifi&lt;BR /&gt;dhcpd enable wifi&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.5-192.168.1.36 inside&lt;BR /&gt;dhcpd dns 8.8.8.8 8.8.4.4 interface inside&lt;BR /&gt;dhcpd enable inside&lt;/P&gt;</description>
      <pubDate>Mon, 11 Sep 2017 20:39:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3182679#M1066302</guid>
      <dc:creator>ktoft</dc:creator>
      <dc:date>2017-09-11T20:39:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X-W trunk</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3182702#M1066303</link>
      <description>&lt;P&gt;Hi &lt;SPAN class="UserName lia-user-name lia-user-rank-VIP-Blue lia-component-message-view-widget-author-username"&gt;&lt;SPAN class=""&gt;Francesco&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-VIP-Blue lia-component-message-view-widget-author-username"&gt;&lt;SPAN class=""&gt;Thanks for the effert.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-VIP-Blue lia-component-message-view-widget-author-username"&gt;&lt;SPAN class=""&gt;But i still cant make it work, or i got it to semi work.. i could reach the guest houe as wanted but then the guest house lost it's internet connection??&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-VIP-Blue lia-component-message-view-widget-author-username"&gt;&lt;SPAN class=""&gt;i have tryed to change vlan 10 to 1 just to see if that did anything good, but it didnt.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-VIP-Blue lia-component-message-view-widget-author-username"&gt;&lt;SPAN class=""&gt;i am still able to reach vlan 200&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-VIP-Blue lia-component-message-view-widget-author-username"&gt;&lt;SPAN class=""&gt;im lost... &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-VIP-Blue lia-component-message-view-widget-author-username"&gt;&lt;SPAN class=""&gt;ASA config:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-VIP-Blue lia-component-message-view-widget-author-username"&gt;&lt;SPAN class=""&gt;hostname xx&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.2.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_1&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif null&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3.10&lt;BR /&gt;&amp;nbsp;vlan 1&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif Inside_vlan1&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3.200&lt;BR /&gt;&amp;nbsp;vlan 200&lt;BR /&gt;&amp;nbsp;bridge-group 2&lt;BR /&gt;&amp;nbsp;nameif DMZ_vlan200&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_3&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_4&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_5&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_6&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_7&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/9&lt;BR /&gt;&amp;nbsp;nameif wifi&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface BVI1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface BVI2&lt;BR /&gt;&amp;nbsp;nameif DMZ&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.200.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-VIP-Blue lia-component-message-view-widget-author-username"&gt;&lt;SPAN class=""&gt;!&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-VIP-Blue lia-component-message-view-widget-author-username"&gt;&lt;SPAN class=""&gt;object network obj_any1&lt;BR /&gt;&amp;nbsp;nat (inside_1,outside) dynamic interface&lt;BR /&gt;object network obj_any3&lt;BR /&gt;&amp;nbsp;nat (inside_3,outside) dynamic interface&lt;BR /&gt;object network obj_any4&lt;BR /&gt;&amp;nbsp;nat (inside_4,outside) dynamic interface&lt;BR /&gt;object network obj_any5&lt;BR /&gt;&amp;nbsp;nat (inside_5,outside) dynamic interface&lt;BR /&gt;object network obj_any6&lt;BR /&gt;&amp;nbsp;nat (inside_6,outside) dynamic interface&lt;BR /&gt;object network obj_any7&lt;BR /&gt;&amp;nbsp;nat (inside_7,outside) dynamic interface&lt;BR /&gt;object network obj_any_wifi&lt;BR /&gt;&amp;nbsp;nat (wifi,outside) dynamic interface&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_access_in_1 in interface inside&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-VIP-Blue lia-component-message-view-widget-author-username"&gt;&lt;SPAN class=""&gt;!&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-VIP-Blue lia-component-message-view-widget-author-username"&gt;&lt;SPAN class=""&gt;route outside 0.0.0.0 0.0.0.0 192.168.2.1 1&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-VIP-Blue lia-component-message-view-widget-author-username"&gt;&lt;SPAN class=""&gt;!&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-VIP-Blue lia-component-message-view-widget-author-username"&gt;&lt;SPAN class=""&gt;Switch config:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-VIP-Blue lia-component-message-view-widget-author-username"&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;hostname xx&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-VIP-Blue lia-component-message-view-widget-author-username"&gt;&lt;SPAN class=""&gt;!&lt;BR /&gt;clock timezone cet 1&lt;BR /&gt;clock summer-time ECTD recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;BR /&gt;ip subnet-zero&lt;BR /&gt;ip dhcp excluded-address 192.168.200.1 192.168.200.5&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool xx-pool&lt;BR /&gt;&amp;nbsp;&amp;nbsp; network 192.168.200.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; default-router 192.168.200.1&lt;BR /&gt;&amp;nbsp;&amp;nbsp; dns-server 8.8.8.8 8.8.4.4&lt;BR /&gt;!&lt;BR /&gt;spanning-tree mode pvst&lt;BR /&gt;no spanning-tree optimize bpdu transmission&lt;BR /&gt;spanning-tree extend system-id&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1&lt;BR /&gt;&amp;nbsp;description Bio_router&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;random-detect&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/2&lt;BR /&gt;&amp;nbsp;description Intel NUC port 0/1&lt;BR /&gt;&amp;nbsp;switchport access vlan 200&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/3&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;random-detect&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/4&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;random-detect&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/5&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;random-detect&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/6&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;random-detect&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/7&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;random-detect&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/8&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;random-detect&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;switchport mode trunk&lt;BR /&gt;&amp;nbsp;no keepalive&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.200 255.255.255.0&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;!&lt;BR /&gt;interface Vlan200&lt;BR /&gt;&amp;nbsp;ip address 192.168.200.2 255.255.255.0&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;ip default-gateway 192.168.1.1&lt;BR /&gt;ip http server&lt;BR /&gt;banner motd ^CCC&lt;BR /&gt;UNAUTHORISED ACCESS TO THIS DEVICE IS PROHIBITED.&lt;BR /&gt;&amp;nbsp;You must have explicit permission to access this&lt;BR /&gt;&amp;nbsp;device. All activities performed on this device&lt;BR /&gt;&amp;nbsp;are logged, any violations of this policy will be&lt;BR /&gt;&amp;nbsp;prosecuted.&lt;BR /&gt;^C&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;&amp;nbsp;exec-timeout 90 0&lt;BR /&gt;&amp;nbsp;logging synchronous&lt;BR /&gt;line vty 0 4&lt;BR /&gt;&amp;nbsp;logging synchronous&lt;BR /&gt;&amp;nbsp;login&lt;BR /&gt;line vty 5 15&lt;BR /&gt;&amp;nbsp;logging synchronous&lt;BR /&gt;&amp;nbsp;login&lt;BR /&gt;!&lt;BR /&gt;ntp clock-period 17180147&lt;BR /&gt;!&lt;BR /&gt;end&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Sep 2017 21:08:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3182702#M1066303</guid>
      <dc:creator>ktoft</dc:creator>
      <dc:date>2017-09-11T21:08:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X-W trunk</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3182704#M1066304</link>
      <description>&lt;P&gt;Do you have an IP address for both Bridge groups? Do you have SVIs on the switch?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mike.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Sep 2017 21:18:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3182704#M1066304</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2017-09-11T21:18:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X-W trunk</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3182707#M1066305</link>
      <description>&lt;P&gt;Hi Mike&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;taken from the config i have uploaded:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA:&lt;/P&gt;&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-VIP-Blue lia-component-message-view-widget-author-username"&gt;&lt;SPAN class=""&gt;interface BVI1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface BVI2&lt;BR /&gt;&amp;nbsp;nameif DMZ&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.200.1 255.255.255.0&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-VIP-Blue lia-component-message-view-widget-author-username"&gt;Switch:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-VIP-Blue lia-component-message-view-widget-author-username"&gt;&lt;SPAN class=""&gt;nterface Vlan1&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.200 255.255.255.0&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Sep 2017 21:29:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3182707#M1066305</guid>
      <dc:creator>ktoft</dc:creator>
      <dc:date>2017-09-11T21:29:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X-W trunk</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3182709#M1066306</link>
      <description>&lt;P&gt;OK, what happens if you try to ping devices on both vlans? Do you have ARP entries for both vlans?&lt;/P&gt;&lt;P&gt;Show ARP.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Sep 2017 21:33:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3182709#M1066306</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2017-09-11T21:33:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X-W trunk</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3182720#M1066307</link>
      <description>&lt;P&gt;From the&amp;nbsp; ASA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ping 192.168.1.200&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 192.168.1.200, timeout is 2 seconds:&lt;BR /&gt;?????&lt;BR /&gt;Success rate is 0 percent (0/5)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;sh arp&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside 192.168.2.1 e0b9.e59a.6946 14&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DMZ 192.168.200.5 c03f.d561.85c2 3570&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; wifi 192.168.10.2 0042.5ad0.00b4 170&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside 192.168.1.5 8019.343f.0fe8 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside 192.168.1.10 5840.4e1b.26fa 35&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside 192.168.1.12 b827.eb73.2b54 48&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside 192.168.1.120 c097.2716.a246 487&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside 192.168.1.8 484b.aab9.8ca7 870&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside 192.168.1.6 5032.75a9.fed5 1728&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside 192.168.1.2 d850.e6af.17b0 5524&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;inside 192.168.1.200 0011.5cfa.4440 6934&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside 192.168.1.7 f48c.5079.595a 8781&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside 192.168.1.9 0024.e415.3ddc 10980&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside 192.168.1.30 f48c.5079.595a 11384&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside 192.168.1.29 484b.aab9.8ca7 12782&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside 192.168.1.28 5840.4e1b.26fa 13097&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside 192.168.1.22 5032.75a9.fed5 13177&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside 192.168.1.19 8019.343f.0fe8 13268&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From switch:&lt;/P&gt;&lt;P&gt;ping 192.168.1.1&lt;BR /&gt;&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 192.168.1.1, timeout is 2 seconds:&lt;BR /&gt;...&lt;BR /&gt;Success rate is 0 percent (0/3)&lt;BR /&gt;Bio-Switch#ping 192.168.200.1&lt;BR /&gt;&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 192.168.200.1, timeout is 2 seconds:&lt;BR /&gt;...&lt;BR /&gt;Success rate is 0 percent (0/3)&lt;BR /&gt;Bio-Switch#sh arp&lt;BR /&gt;Protocol&amp;nbsp; Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Age (min)&amp;nbsp; Hardware Addr&amp;nbsp;&amp;nbsp; Type&amp;nbsp;&amp;nbsp; Interface&lt;BR /&gt;Internet&amp;nbsp; 192.168.1.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 75&amp;nbsp;&amp;nbsp; 286f.7fd1.39d3&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; Vlan1&lt;BR /&gt;Internet&amp;nbsp; 192.168.1.200&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -&amp;nbsp;&amp;nbsp; 0011.5cfa.4440&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; Vlan1&lt;BR /&gt;Internet&amp;nbsp; 192.168.200.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -&amp;nbsp;&amp;nbsp; 0011.5cfa.4440&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; Vlan200&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if i take the switch port fa0/1 direct into my computer i am getting:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Spanning-tree-(for-briges)_00&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;5 times and the &lt;STRONG&gt;loop&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;and 5 time again over and over&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;dont get any dhcp from the ASA&lt;/P&gt;&lt;P&gt;Dont know if that means anything?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Sep 2017 21:55:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3182720#M1066307</guid>
      <dc:creator>ktoft</dc:creator>
      <dc:date>2017-09-11T21:55:28Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X-W trunk</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3182755#M1066308</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;On interface GigabitEthernet1/3, you have configured some stuff and you don't have because the config is done on sub-interfaces:&lt;BR /&gt;&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt; no bridge-group 1&lt;BR /&gt; no nameif null&lt;BR /&gt; no security-level 0&lt;BR /&gt;&lt;BR /&gt;For the nat, I trust what you did but I don't see your groups like obj_any1&lt;BR /&gt;&lt;BR /&gt;On the switch the svi vlan 200 is down. Is that normal?&lt;BR /&gt;What is the default gateway for vlan 1 and vlan 200 hosts?&lt;BR /&gt;&lt;BR /&gt;Then, when you're doing ping tests, do it from the device to ping another device. Don't use ASA to make ping tests.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 12 Sep 2017 00:10:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3182755#M1066308</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-09-12T00:10:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X-W trunk</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3182974#M1066309</link>
      <description>&lt;P&gt;I would either suggest to open a ticket with TAC or get into a call so we can take a look at this together? is the firewall facing the Internet so I can help you configure?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I&amp;nbsp;just recently stopped working for TAC so I think I still have it.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Sep 2017 12:17:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3182974#M1066309</guid>
      <dc:creator>jumora1</dc:creator>
      <dc:date>2017-09-12T12:17:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X-W trunk</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3183018#M1066310</link>
      <description>&lt;P&gt;Hi Again&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now i have made a small simple setup at work with new equipment similar to mine just to see if this ware a problem with my equipment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have anyone actually tried this and made this work?&lt;/P&gt;&lt;P&gt;Why can i access cross networks but not connect to something that is connected to the same network?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have anyone made this work, or is this a bug and TAC have to look into?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;here is the config and test from pc to the other equipment&lt;/P&gt;&lt;P&gt;So in the ASA the 'white cable' is vlan 10 connected to the computer&lt;/P&gt;&lt;P&gt;and the 'grey cable' is a trunk to the switch&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="error.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/781i9B2A2A43601F10BE/image-size/large?v=v2&amp;amp;px=999" role="button" title="error.jpg" alt="error.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the config and test&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hostname Switch&lt;BR /&gt;!&lt;BR /&gt;ip subnet-zero&lt;BR /&gt;!&lt;BR /&gt;vtp domain DKCPH-TERM&lt;BR /&gt;vtp mode transparent&lt;BR /&gt;!&lt;BR /&gt;spanning-tree mode pvst&lt;BR /&gt;no spanning-tree optimize bpdu transmission&lt;BR /&gt;spanning-tree extend system-id&lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;vlan 10&lt;BR /&gt;&amp;nbsp;name inside&lt;BR /&gt;!&lt;BR /&gt;vlan 200&lt;BR /&gt;&amp;nbsp;name DMZ&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1&lt;BR /&gt;&amp;nbsp;switchport access vlan 10&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/2&lt;BR /&gt;&amp;nbsp;switchport access vlan 200&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/3&lt;BR /&gt;&amp;nbsp;switchport access vlan 10&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/8&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;switchport mode trunk&lt;BR /&gt;&amp;nbsp;spanning-tree portfast trunk&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Vlan10&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.200 255.255.255.0&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;!&lt;BR /&gt;interface Vlan200&lt;BR /&gt;&amp;nbsp;ip address 192.168.200.2 255.255.255.0&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;ip default-gateway 192.168.1.1&lt;BR /&gt;ip http server&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;line vty 5 15&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;end&lt;BR /&gt;------------------------------------------------------------------------&lt;BR /&gt;&lt;BR /&gt;Switch#sh interfaces trunk&lt;BR /&gt;&lt;BR /&gt;Port&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Mode&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Encapsulation&amp;nbsp; Status&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Native vlan&lt;BR /&gt;Gi0/1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; on&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1q&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; trunking&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&lt;BR /&gt;&lt;BR /&gt;Port&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Vlans allowed on trunk&lt;BR /&gt;Gi0/1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1-4094&lt;BR /&gt;&lt;BR /&gt;Port&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Vlans allowed and active in management domain&lt;BR /&gt;Gi0/1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1,10,200&lt;BR /&gt;&lt;BR /&gt;Port&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Vlans in spanning tree forwarding state and not pruned&lt;BR /&gt;Gi0/1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1,10,200&lt;BR /&gt;&lt;BR /&gt;---------------------------------------------------------------------------&lt;BR /&gt;ASA&lt;BR /&gt;ASA Version 9.8(1)&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;names&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address dhcp setroute&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_1&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3.10&lt;BR /&gt;&amp;nbsp;vlan 10&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif Inside_vlan10&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3.200&lt;BR /&gt;&amp;nbsp;vlan 200&lt;BR /&gt;&amp;nbsp;bridge-group 2&lt;BR /&gt;&amp;nbsp;nameif DMZ_vlan200&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_3&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_4&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_5&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_6&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;&amp;nbsp;bridge-group 1&lt;BR /&gt;&amp;nbsp;nameif inside_7&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface BVI1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface BVI2&lt;BR /&gt;&amp;nbsp;nameif DMZ&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.200.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network obj_any1&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any2&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any3&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any4&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any5&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any6&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any7&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network inside&lt;BR /&gt;&amp;nbsp;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network DMZ&lt;BR /&gt;&amp;nbsp;subnet 192.168.200.0 255.255.255.0&lt;BR /&gt;object-group service DM_INLINE_SERVICE_2&lt;BR /&gt;&amp;nbsp;service-object icmp&lt;BR /&gt;&amp;nbsp;service-object icmp echo-reply&lt;BR /&gt;&amp;nbsp;service-object icmp echo&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt;&amp;nbsp;service-object icmp&lt;BR /&gt;&amp;nbsp;service-object icmp echo&lt;BR /&gt;&amp;nbsp;service-object icmp echo-reply&lt;BR /&gt;object-group service DM_INLINE_SERVICE_3&lt;BR /&gt;&amp;nbsp;service-object icmp&lt;BR /&gt;&amp;nbsp;service-object icmp echo&lt;BR /&gt;&amp;nbsp;service-object icmp echo-reply&lt;BR /&gt;object-group service DM_INLINE_SERVICE_5&lt;BR /&gt;&amp;nbsp;service-object icmp&lt;BR /&gt;&amp;nbsp;service-object icmp echo&lt;BR /&gt;&amp;nbsp;service-object icmp echo-reply&lt;BR /&gt;access-list DMZ_vlan200_access_in extended permit object-group DM_INLINE_SERVICE_2 192.168.200.0 255.255.255.0 192.168.1.0 255.255.255.0 inactive&lt;BR /&gt;access-list DMZ_vlan200_access_in extended permit ip any any&lt;BR /&gt;access-list Inside_vlan10_access_in extended permit object-group DM_INLINE_SERVICE_5 192.168.1.0 255.255.255.0 192.168.200.0 255.255.255.0 inactive&lt;BR /&gt;access-list Inside_vlan10_access_in extended permit ip any any&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_3 192.168.1.0 255.255.255.0 192.168.200.0 255.255.255.0&lt;BR /&gt;access-list inside_access_in extended permit ip any any&lt;BR /&gt;access-list DMZ_access_in extended permit object-group DM_INLINE_SERVICE_1 192.168.200.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list DMZ_access_in extended permit ip any any inactive&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside_1 1500&lt;BR /&gt;mtu inside_3 1500&lt;BR /&gt;mtu inside_4 1500&lt;BR /&gt;mtu inside_5 1500&lt;BR /&gt;mtu inside_6 1500&lt;BR /&gt;mtu inside_7 1500&lt;BR /&gt;mtu Inside_vlan10 1500&lt;BR /&gt;mtu DMZ_vlan200 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;!&lt;BR /&gt;object network obj_any1&lt;BR /&gt;&amp;nbsp;nat (inside_1,outside) dynamic interface&lt;BR /&gt;object network obj_any3&lt;BR /&gt;&amp;nbsp;nat (inside_3,outside) dynamic interface&lt;BR /&gt;object network obj_any4&lt;BR /&gt;&amp;nbsp;nat (inside_4,outside) dynamic interface&lt;BR /&gt;object network obj_any5&lt;BR /&gt;&amp;nbsp;nat (inside_5,outside) dynamic interface&lt;BR /&gt;object network obj_any6&lt;BR /&gt;&amp;nbsp;nat (inside_6,outside) dynamic interface&lt;BR /&gt;object network obj_any7&lt;BR /&gt;&amp;nbsp;nat (inside_7,outside) dynamic interface&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group Inside_vlan10_access_in in interface Inside_vlan10&lt;BR /&gt;access-group DMZ_access_in in interface DMZ&lt;BR /&gt;access-group DMZ_vlan200_access_in in interface DMZ_vlan200&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_1&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_3&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_4&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_5&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_6&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_7&lt;BR /&gt;http 192.168.1.0 255.255.255.0 Inside_vlan10&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.5-192.168.1.254 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.200.5-192.168.200.254 DMZ&lt;BR /&gt;dhcpd enable DMZ&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;&amp;nbsp; no tcp-inspection&lt;BR /&gt;!&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:306ca950ee815065e3ff375b5914fa6f&lt;BR /&gt;: end&lt;BR /&gt;&lt;BR /&gt;-------------------------------&lt;BR /&gt;ciscoasa# sh arp&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside 192.168.1.25 0023.2461.e54b 7&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside 192.168.1.7 c85b.7674.8284 9&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside 192.168.1.200 0019.55fb.f080 1390&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DMZ 192.168.200.25 0090.e85f.b57a 641&lt;BR /&gt;--------------------------------------------------------------&lt;BR /&gt;Ping from PC on vlan10 in ASA&lt;BR /&gt;Ping statistics for 192.168.1.25:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packets: Sent = 2, Received = 0, Lost = 2 (100% loss),&lt;BR /&gt;---------------------------------------------------------------&lt;BR /&gt;Pinging 192.168.1.200 with 32 bytes of data:&lt;BR /&gt;Reply from 192.168.1.7: Destination host unreachable.&lt;BR /&gt;Request timed out.&lt;BR /&gt;Request timed out.&lt;BR /&gt;&lt;BR /&gt;Ping statistics for 192.168.1.200:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packets: Sent = 3, Received = 1, Lost = 2 (66% loss),&lt;BR /&gt;--------------------------------------------------------------&lt;BR /&gt;Pinging 192.168.200.25 with 32 bytes of data:&lt;BR /&gt;Reply from 192.168.200.25: bytes=32 time=1ms TTL=255&lt;BR /&gt;Reply from 192.168.200.25: bytes=32 time=2ms TTL=255&lt;BR /&gt;Reply from 192.168.200.25: bytes=32 time=2ms TTL=255&lt;BR /&gt;Reply from 192.168.200.25: bytes=32 time=2ms TTL=255&lt;BR /&gt;&lt;BR /&gt;Ping statistics for 192.168.200.25:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),&lt;BR /&gt;Approximate round trip times in milli-seconds:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Minimum = 1ms, Maximum = 2ms, Average = 1ms&lt;/P&gt;</description>
      <pubDate>Tue, 12 Sep 2017 13:16:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3183018#M1066310</guid>
      <dc:creator>ktoft</dc:creator>
      <dc:date>2017-09-12T13:16:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X-W trunk</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3183116#M1066311</link>
      <description>&lt;P&gt;Remove the vlan 10 address from the switch please and test&lt;/P&gt;</description>
      <pubDate>Tue, 12 Sep 2017 15:43:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3183116#M1066311</guid>
      <dc:creator>jumora1</dc:creator>
      <dc:date>2017-09-12T15:43:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X-W trunk</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3183120#M1066312</link>
      <description>&lt;P&gt;Please remove the vlan 10 address from the switch and &amp;nbsp;please and test. it seems as if you have two devices doing the inter vlan routing&lt;/P&gt;</description>
      <pubDate>Tue, 12 Sep 2017 15:50:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3183120#M1066312</guid>
      <dc:creator>jumora1</dc:creator>
      <dc:date>2017-09-12T15:50:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X-W trunk</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3183319#M1066313</link>
      <description>Hi &lt;BR /&gt;&lt;BR /&gt;OK let's do it simple. &lt;BR /&gt;Remove svi from the switch and do no ip routing. &lt;BR /&gt;On all devices, their gateway should be the asa. Then test it and let us know. &lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 13 Sep 2017 01:18:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3183319#M1066313</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-09-13T01:18:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X-W trunk</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3183428#M1066314</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have noone ever made a "trunk" from a ASA5506 to a switch before and got it to work?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks for the suggestions but still no luck &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I did try to switch out the old 2940 to a new 2960-cx switch to see if there where an IOS bug on the switch but the outcome where exactly the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The ASA config is the same no changes for previous post.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can't ping on the same subnet 192.168.1.0/24 cross the "trunk" on the ASA&lt;/P&gt;&lt;P&gt;As you can see from the test below, the switch can see both the equipment on vlan 10 and 200 on the correct ports.&lt;/P&gt;&lt;P&gt;And the test computer connected to the switch 192.168.1.25 can ping its gateway 192.168.1.1 (ASA)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The ASA is DHCP server to the computer connected to directly to it 192.168.1.10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So $$ question is why cant the ASA find the way when it is gateway for computer 192.168.1.25 and DHCP server for computer 192.168.1.10 ARHHH....!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;here are the resaults:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Switch#sh mac address-table&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Mac Address Table&lt;BR /&gt;-------------------------------------------&lt;BR /&gt;&lt;BR /&gt;Vlan&amp;nbsp;&amp;nbsp;&amp;nbsp; Mac Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Type&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Ports&lt;BR /&gt;----&amp;nbsp;&amp;nbsp;&amp;nbsp; -----------&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; --------&amp;nbsp;&amp;nbsp;&amp;nbsp; -----&lt;BR /&gt;&amp;nbsp;All&amp;nbsp;&amp;nbsp;&amp;nbsp; 0019.55fb.f080&amp;nbsp;&amp;nbsp;&amp;nbsp; STATIC&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; CPU&lt;BR /&gt;&amp;nbsp;All&amp;nbsp;&amp;nbsp;&amp;nbsp; 0100.0ccc.cccc&amp;nbsp;&amp;nbsp;&amp;nbsp; STATIC&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; CPU&lt;BR /&gt;&amp;nbsp;All&amp;nbsp;&amp;nbsp;&amp;nbsp; 0100.0ccc.cccd&amp;nbsp;&amp;nbsp;&amp;nbsp; STATIC&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; CPU&lt;BR /&gt;&amp;nbsp;All&amp;nbsp;&amp;nbsp;&amp;nbsp; 0100.0cdd.dddd&amp;nbsp;&amp;nbsp;&amp;nbsp; STATIC&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; CPU&lt;BR /&gt;Total Mac Addresses for this criterion: 4&lt;BR /&gt;Switch#sh mac address-table&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Mac Address Table&lt;BR /&gt;-------------------------------------------&lt;BR /&gt;&lt;BR /&gt;Vlan&amp;nbsp;&amp;nbsp;&amp;nbsp; Mac Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Type&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Ports&lt;BR /&gt;----&amp;nbsp;&amp;nbsp;&amp;nbsp; -----------&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; --------&amp;nbsp;&amp;nbsp;&amp;nbsp; -----&lt;BR /&gt;&amp;nbsp;All&amp;nbsp;&amp;nbsp;&amp;nbsp; 0019.55fb.f080&amp;nbsp;&amp;nbsp;&amp;nbsp; STATIC&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; CPU&lt;BR /&gt;&amp;nbsp;All&amp;nbsp;&amp;nbsp;&amp;nbsp; 0100.0ccc.cccc&amp;nbsp;&amp;nbsp;&amp;nbsp; STATIC&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; CPU&lt;BR /&gt;&amp;nbsp;All&amp;nbsp;&amp;nbsp;&amp;nbsp; 0100.0ccc.cccd&amp;nbsp;&amp;nbsp;&amp;nbsp; STATIC&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; CPU&lt;BR /&gt;&amp;nbsp;All&amp;nbsp;&amp;nbsp;&amp;nbsp; 0100.0cdd.dddd&amp;nbsp;&amp;nbsp;&amp;nbsp; STATIC&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; CPU&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;200&amp;nbsp;&amp;nbsp;&amp;nbsp; 0090.e85f.b57a&amp;nbsp;&amp;nbsp;&amp;nbsp; DYNAMIC&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Fa0/2&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;200&amp;nbsp;&amp;nbsp;&amp;nbsp; 00a6.ca07.54f1&amp;nbsp;&amp;nbsp;&amp;nbsp; DYNAMIC&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Gi0/1&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp; 10&amp;nbsp;&amp;nbsp;&amp;nbsp; 0023.2461.e54b&amp;nbsp;&amp;nbsp;&amp;nbsp; DYNAMIC&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Fa0/1&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp; 10&amp;nbsp;&amp;nbsp;&amp;nbsp; 00a6.ca07.54f1&amp;nbsp;&amp;nbsp;&amp;nbsp; DYNAMIC&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Gi0/1&lt;BR /&gt;Total Mac Addresses for this criterion: 8&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;--------------------------------------------------------------------&lt;BR /&gt;&lt;STRONG&gt;From PC direct connected to ASA&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;Vlan10 network&lt;BR /&gt;&lt;STRONG&gt;Pinging 192.168.1.25&lt;/STRONG&gt; with 32 bytes of data:&lt;BR /&gt;Reply from 192.168.1.10: Destination host unreachable.&lt;BR /&gt;Reply from 192.168.1.10: Destination host unreachable.&lt;BR /&gt;Reply from 192.168.1.10: Destination host unreachable.&lt;BR /&gt;Reply from 192.168.1.10: Destination host unreachable.&lt;BR /&gt;&lt;BR /&gt;Ping statistics for 192.168.1.25:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),&lt;BR /&gt;&lt;BR /&gt;------------------------------------------------------------------&lt;BR /&gt;vlan200 network&lt;BR /&gt;Pinging 192.168.200.25 with 32 bytes of data:&lt;BR /&gt;Reply from 192.168.200.25: bytes=32 time=1ms TTL=255&lt;BR /&gt;Reply from 192.168.200.25: bytes=32 time=1ms TTL=255&lt;BR /&gt;&lt;BR /&gt;-------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;From PC direct connected to Switch&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;Vlan10 network&lt;BR /&gt;&lt;STRONG&gt;Pinging 192.168.1.1&lt;/STRONG&gt; with 32 bytes of data:&lt;BR /&gt;Reply from 192.168.1.1: bytes=32 time=1ms TTL=255&lt;BR /&gt;Reply from 192.168.1.1: bytes=32 time=1ms TTL=255&lt;BR /&gt;------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Vlan10 network&lt;BR /&gt;&lt;STRONG&gt;Pinging 192.168.1.10&lt;/STRONG&gt; with 32 bytes of data:&lt;BR /&gt;Request timed out.&lt;BR /&gt;Request timed out.&lt;BR /&gt;Request timed out.&lt;BR /&gt;Request timed out.&lt;BR /&gt;&lt;BR /&gt;Ping statistics for 192.168.1.10:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packets: Sent = 4, Received = 0, Lost = 4 (100% loss),&lt;/P&gt;&lt;P&gt;----------------------------------------------------------------------&lt;BR /&gt;&lt;STRONG&gt;switc config&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;hostname Switch&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip subnet-zero&lt;BR /&gt;!&lt;BR /&gt;vtp domain DKCPH-TERM&lt;BR /&gt;vtp mode transparent&lt;BR /&gt;!&lt;BR /&gt;spanning-tree mode pvst&lt;BR /&gt;no spanning-tree optimize bpdu transmission&lt;BR /&gt;spanning-tree extend system-id&lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;vlan 10&lt;BR /&gt;&amp;nbsp;name inside&lt;BR /&gt;!&lt;BR /&gt;vlan 200&lt;BR /&gt;&amp;nbsp;name DMZ&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1&lt;BR /&gt;&amp;nbsp;switchport access vlan 10&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/2&lt;BR /&gt;&amp;nbsp;switchport access vlan 200&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/3&lt;BR /&gt;&amp;nbsp;switchport access vlan 10&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/8&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;switchport mode trunk&lt;BR /&gt;&amp;nbsp;spanning-tree portfast trunk&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;ip default-gateway 192.168.1.1&lt;BR /&gt;ip http server&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;line vty 5 15&lt;BR /&gt;!&lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;end&lt;/P&gt;</description>
      <pubDate>Wed, 13 Sep 2017 08:52:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3183428#M1066314</guid>
      <dc:creator>ktoft</dc:creator>
      <dc:date>2017-09-13T08:52:28Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X-W trunk</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3183804#M1066315</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;We are probably in a different timezone but is it possible to plan a troubleshooting session through a teamviewer or webex?&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 13 Sep 2017 22:03:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3183804#M1066315</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-09-13T22:03:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X-W trunk</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3183926#M1066316</link>
      <description>&lt;P&gt;Hi Francesco&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you think that it is possible to make this setup, then yes it would be helpful&lt;/P&gt;&lt;P&gt;I am in time zone UTC +2 CEST, I have written you a private message.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;of course if anyone have some suggestions you are more than welcome to continue to write this&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Br Kevin&lt;/P&gt;</description>
      <pubDate>Thu, 14 Sep 2017 06:46:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3183926#M1066316</guid>
      <dc:creator>ktoft</dc:creator>
      <dc:date>2017-09-14T06:46:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X-W trunk</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3184050#M1066317</link>
      <description>&lt;P&gt;You need a webex to get this solved.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Sep 2017 12:00:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-w-trunk/m-p/3184050#M1066317</guid>
      <dc:creator>jumora1</dc:creator>
      <dc:date>2017-09-14T12:00:33Z</dc:date>
    </item>
  </channel>
</rss>

