<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Multi vlan on the inside interface of firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/multi-vlan-on-the-inside-interface-of-firewall/m-p/4616897#M1090393</link>
    <description>&lt;P&gt;Have you tried creating a static route on your ASA? Try creating this maybe this can help. just let me know&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;route INSIDE 192.168.0.0(your inside network subnet) 255.255.0.0(subnetmask) 192.168.1.1(your Layer3 gateway ip) 1&lt;/P&gt;</description>
    <pubDate>Wed, 25 May 2022 01:35:20 GMT</pubDate>
    <dc:creator>Herald Sison</dc:creator>
    <dc:date>2022-05-25T01:35:20Z</dc:date>
    <item>
      <title>Multi vlan on the inside interface of firewall</title>
      <link>https://community.cisco.com/t5/network-security/multi-vlan-on-the-inside-interface-of-firewall/m-p/3824086#M30490</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have a layer 3 switch (Cisco Catalyst 3560) with &lt;SPAN&gt;multiple vlans configured on it, and connect to switch is inside interface of ASA 5505. Only host in the same vlan with inside interface of firewall can ping it, but I need all vlans can.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;How would I config this?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2019 03:11:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multi-vlan-on-the-inside-interface-of-firewall/m-p/3824086#M30490</guid>
      <dc:creator>ChuTichNuoc</dc:creator>
      <dc:date>2019-03-22T03:11:30Z</dc:date>
    </item>
    <item>
      <title>Re: Multi vlan on the inside interface of firewall</title>
      <link>https://community.cisco.com/t5/network-security/multi-vlan-on-the-inside-interface-of-firewall/m-p/3824100#M30491</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;Did you configure any layer 3 interface on this switch? If yes, normally all vlans should be able to communicate each others.&lt;BR /&gt;If the goal is to keep layer 2 only on the switch and layer 3 on the firewall then you need to create subinterfaces on your inside cable with all your vlans and allow traffic between them or configure the same security level and put the command same-security-traffic permit inter-interface</description>
      <pubDate>Fri, 22 Mar 2019 04:05:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multi-vlan-on-the-inside-interface-of-firewall/m-p/3824100#M30491</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2019-03-22T04:05:07Z</dc:date>
    </item>
    <item>
      <title>Re: Multi vlan on the inside interface of firewall</title>
      <link>https://community.cisco.com/t5/network-security/multi-vlan-on-the-inside-interface-of-firewall/m-p/3824115#M30492</link>
      <description>&lt;P&gt;&lt;SPAN&gt;All my vlans can communicate with each others.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;My goal is make all vlans can go through firewall.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;But inside interface of firewall can access only one vlan.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Do you have any idea?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2019 04:30:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multi-vlan-on-the-inside-interface-of-firewall/m-p/3824115#M30492</guid>
      <dc:creator>ChuTichNuoc</dc:creator>
      <dc:date>2019-03-22T04:30:56Z</dc:date>
    </item>
    <item>
      <title>Re: Multi vlan on the inside interface of firewall</title>
      <link>https://community.cisco.com/t5/network-security/multi-vlan-on-the-inside-interface-of-firewall/m-p/3825258#M30493</link>
      <description>You want all vlans to be filtered by the firewall when communicating between each others?&lt;BR /&gt;&lt;BR /&gt;If so, you have a simple option which consists into moving all your layer 3 to your firewall. For that you can have a trunk interface amd create your svi (interface vlan) on your asa. Be careful you're limited to 20 vlans.&lt;BR /&gt;A doc that can help:&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa72/configuration/guide/conf_gd/int5505.pdf" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa72/configuration/guide/conf_gd/int5505.pdf&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;If you want to keep all your vlans on your switch and just route your traffic on asa for Internet access, you can have an interco subnet between your switch and your asa, and then add a default static route in your switch pointing to your asa. On your asa you will have to configure a static route pointing to your switch off you can summarize all your inside networks (or multiple routes depending on your IP scheme).&lt;BR /&gt;&lt;BR /&gt;Let me know which option you're trying to do, i can then show a quick config example.</description>
      <pubDate>Mon, 25 Mar 2019 03:41:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multi-vlan-on-the-inside-interface-of-firewall/m-p/3825258#M30493</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2019-03-25T03:41:45Z</dc:date>
    </item>
    <item>
      <title>Re: Multi vlan on the inside interface of firewall</title>
      <link>https://community.cisco.com/t5/network-security/multi-vlan-on-the-inside-interface-of-firewall/m-p/4616881#M1090392</link>
      <description>&lt;P&gt;Same problem here&lt;/P&gt;&lt;P&gt;I'd like to keep the VLANs on the Layer 3 switch within my Inside network&lt;/P&gt;&lt;P&gt;just dont know how to make the ASA5505 to route all of them to the internet&lt;/P&gt;&lt;P&gt;my VLANs live happely togather well connected with one another, all hosts are pinging&amp;nbsp;&lt;/P&gt;&lt;P&gt;each other easely, but no connection with the edge router, or the ASA's outside network. I'm a student, and this is killing me. Please, any advize will be very appreciated. Thank you&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="Screenshot (816).png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/151922i55E32AA3B0EF2CCF/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot (816).png" alt="Screenshot (816).png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 May 2022 00:12:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multi-vlan-on-the-inside-interface-of-firewall/m-p/4616881#M1090392</guid>
      <dc:creator>grgton</dc:creator>
      <dc:date>2022-05-25T00:12:47Z</dc:date>
    </item>
    <item>
      <title>Re: Multi vlan on the inside interface of firewall</title>
      <link>https://community.cisco.com/t5/network-security/multi-vlan-on-the-inside-interface-of-firewall/m-p/4616897#M1090393</link>
      <description>&lt;P&gt;Have you tried creating a static route on your ASA? Try creating this maybe this can help. just let me know&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;route INSIDE 192.168.0.0(your inside network subnet) 255.255.0.0(subnetmask) 192.168.1.1(your Layer3 gateway ip) 1&lt;/P&gt;</description>
      <pubDate>Wed, 25 May 2022 01:35:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multi-vlan-on-the-inside-interface-of-firewall/m-p/4616897#M1090393</guid>
      <dc:creator>Herald Sison</dc:creator>
      <dc:date>2022-05-25T01:35:20Z</dc:date>
    </item>
    <item>
      <title>Re: Multi vlan on the inside interface of firewall</title>
      <link>https://community.cisco.com/t5/network-security/multi-vlan-on-the-inside-interface-of-firewall/m-p/4617466#M1090406</link>
      <description>&lt;P&gt;Thank Herald,&lt;/P&gt;&lt;P&gt;it is a great idea.&lt;/P&gt;&lt;P&gt;The only problem I have now is, how to implement it,&lt;/P&gt;&lt;P&gt;i'm a student and not very experienced one,&amp;nbsp;&lt;/P&gt;&lt;P&gt;that is why I learn from examples, and not so good with the idea on its own.&lt;/P&gt;&lt;P&gt;If you can demonstrate with example how and in which device to nest the commands,&lt;/P&gt;&lt;P&gt;it will be splendid.&lt;/P&gt;&lt;P&gt;Many Thanks&lt;/P&gt;&lt;P&gt;George&lt;/P&gt;</description>
      <pubDate>Wed, 25 May 2022 11:14:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multi-vlan-on-the-inside-interface-of-firewall/m-p/4617466#M1090406</guid>
      <dc:creator>grgton</dc:creator>
      <dc:date>2022-05-25T11:14:18Z</dc:date>
    </item>
    <item>
      <title>Re: Multi vlan on the inside interface of firewall</title>
      <link>https://community.cisco.com/t5/network-security/multi-vlan-on-the-inside-interface-of-firewall/m-p/4617958#M1090427</link>
      <description>&lt;P&gt;are you using FMC? ASDM? FDM or pure CLI? let me know so i can show you.&lt;/P&gt;</description>
      <pubDate>Thu, 26 May 2022 02:05:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multi-vlan-on-the-inside-interface-of-firewall/m-p/4617958#M1090427</guid>
      <dc:creator>Herald Sison</dc:creator>
      <dc:date>2022-05-26T02:05:57Z</dc:date>
    </item>
    <item>
      <title>Re: Multi vlan on the inside interface of firewall</title>
      <link>https://community.cisco.com/t5/network-security/multi-vlan-on-the-inside-interface-of-firewall/m-p/4619197#M1090451</link>
      <description>&lt;P&gt;no special GUI&lt;/P&gt;&lt;P&gt;just Packet Tracer's user interface simulation&lt;/P&gt;&lt;P&gt;I use P/T for all my work, no real equipment involved&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2022 11:03:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multi-vlan-on-the-inside-interface-of-firewall/m-p/4619197#M1090451</guid>
      <dc:creator>grgton</dc:creator>
      <dc:date>2022-05-27T11:03:41Z</dc:date>
    </item>
    <item>
      <title>Re: Multi vlan on the inside interface of firewall</title>
      <link>https://community.cisco.com/t5/network-security/multi-vlan-on-the-inside-interface-of-firewall/m-p/5160545#M1115060</link>
      <description>&lt;P&gt;it is an&amp;nbsp; ASA5505, so the layer3&amp;nbsp; interfaces on the ASA&amp;nbsp; are "interface vlan xxx", the ethernet interfaces are&amp;nbsp; switchport on this device&amp;nbsp; (hisis a&amp;nbsp; big difference bettween ASA5505 andotther ASA devices). Configurig a&amp;nbsp; switcport&amp;nbsp; on&amp;nbsp; the&amp;nbsp; ASA as VLAN&amp;nbsp; trunk&amp;nbsp; (that is, what&amp;nbsp; is&amp;nbsp; on tis&amp;nbsp; device similar to subinterfaces on other&amp;nbsp; ASAs) requires a securityplus license. Without&amp;nbsp; a securitplus license&amp;nbsp; on&amp;nbsp; ASA5505, you&amp;nbsp; may&amp;nbsp; connec one ethernet port per VLAN to an access port in the same VLAN. Be&amp;nbsp; shure&amp;nbsp; to *not*&amp;nbsp; configure layer3 interfaces&amp;nbsp; on the switch in each VLAN, ottherwise the switch will do the routing bypassing the firewall.&lt;/P&gt;&lt;P&gt;Also be shure&amp;nbsp; to configure&amp;nbsp; "same-security-traffic pemit inter-interface" if you want to&amp;nbsp; enable&amp;nbsp; comunication&amp;nbsp; between layer3 interfaces&amp;nbsp; with the&amp;nbsp; same&amp;nbsp; security level. The ASA&amp;nbsp; deniesby defaultt&amp;nbsp; all traffic between intterfaces of the same security&amp;nbsp; level&amp;nbsp; (independent from&amp;nbsp; any&amp;nbsp; access-lists).&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2024 23:15:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multi-vlan-on-the-inside-interface-of-firewall/m-p/5160545#M1115060</guid>
      <dc:creator>jilse-iph</dc:creator>
      <dc:date>2024-08-13T23:15:44Z</dc:date>
    </item>
  </channel>
</rss>

