<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA intervlan routing in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-intervlan-routing/m-p/4944046#M1105196</link>
    <description>&lt;P&gt;Make sure that you use gw (IP of vlan of FW) in each host.&lt;/P&gt;</description>
    <pubDate>Thu, 19 Oct 2023 08:15:35 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2023-10-19T08:15:35Z</dc:date>
    <item>
      <title>Cisco ASA intervlan routing</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-intervlan-routing/m-p/4941359#M1105129</link>
      <description>&lt;P&gt;Hello Cisco community,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can i please have some ideas, how can i configure intervlan routing on cisco asa, i have shared my current config and diagram,&amp;nbsp;&lt;/P&gt;&lt;P&gt;what can i added to complete the config for all the vlan to communicate each other, Any help would be highly appreciated &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; .&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Veera.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cisco ASA for intervlan .png" style="width: 940px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/199826iC636169C162D1473/image-size/large?v=v2&amp;amp;px=999" role="button" title="cisco ASA for intervlan .png" alt="cisco ASA for intervlan .png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cisco ASA:&lt;/P&gt;&lt;P&gt;ciscoasa(config)# sh run&lt;BR /&gt;: Hardware: ASA5520, 2048 MB RAM, CPU Pentium II 1000 MHz&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.1(5)16&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Ethernet0&lt;BR /&gt;channel-group 1 mode active&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1&lt;BR /&gt;channel-group 1 mode active&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet2&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 192.168.1.55 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Port-channel1&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.10&lt;BR /&gt;vlan 10&lt;BR /&gt;nameif vlan10&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.20&lt;BR /&gt;vlan 20&lt;BR /&gt;nameif vlan20&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.20.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.30&lt;BR /&gt;vlan 30&lt;BR /&gt;nameif vlan30&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.30.1 255.255.255.0&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object network vlan10&lt;BR /&gt;subnet 192.168.10.0 255.255.255.0&lt;BR /&gt;object network vlan20&lt;BR /&gt;subnet 192.168.20.0 255.255.255.0&lt;BR /&gt;object network vlan30&lt;BR /&gt;subnet 192.168.30.0 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;object network vlan10&lt;BR /&gt;nat (vlan10,outside) dynamic interface&lt;BR /&gt;object network vlan20&lt;BR /&gt;nat (vlan20,outside) dynamic interface&lt;BR /&gt;object network vlan30&lt;BR /&gt;nat (vlan30,outside) dynamic interface&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.1.1 1&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.10.5-192.168.10.100 vlan10&lt;BR /&gt;dhcpd dns 8.8.8.8 interface vlan10&lt;BR /&gt;dhcpd enable vlan10&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.20.5-192.168.20.100 vlan20&lt;BR /&gt;dhcpd dns 8.8.8.8 interface vlan20&lt;BR /&gt;dhcpd enable vlan20&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.30.5-192.168.30.100 vlan30&lt;BR /&gt;dhcpd dns 8.8.8.8 interface vlan30&lt;BR /&gt;dhcpd enable vlan30&lt;BR /&gt;!&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect icmp&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;ciscoasa(config)#&lt;/P&gt;</description>
      <pubDate>Mon, 16 Oct 2023 20:20:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-intervlan-routing/m-p/4941359#M1105129</guid>
      <dc:creator>veerapandiyanrengasamy</dc:creator>
      <dc:date>2023-10-16T20:20:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA intervlan routing</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-intervlan-routing/m-p/4941409#M1105131</link>
      <description>&lt;P&gt;Are you able to ping the default gateway for each VLAN?&amp;nbsp; If yes, then I would suggest verifying the default gateway configuration on the endpoint you are testing between.&lt;/P&gt;
&lt;P&gt;Your configuration should allow inter-VLAN traffic, if this is a virtual environment test lab, then the issue might be in the virtualization and you might need to rebuild the setup.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Oct 2023 22:12:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-intervlan-routing/m-p/4941409#M1105131</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-10-16T22:12:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA intervlan routing</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-intervlan-routing/m-p/4941413#M1105132</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690"&gt;@Marius Gunnerud&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;thanks for your reply, yes i can able to ping default gateway of the each vlan(10,20,30) and also i can get to internet from all vlan, But i cant ping from one vlan to other vlan&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Oct 2023 22:18:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-intervlan-routing/m-p/4941413#M1105132</guid>
      <dc:creator>veerapandiyanrengasamy</dc:creator>
      <dc:date>2023-10-16T22:18:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA intervlan routing</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-intervlan-routing/m-p/4941420#M1105133</link>
      <description>&lt;P&gt;did you provide the full configuration from the ASA or did you leave something out?&amp;nbsp; could you also provide the configuration of the switch?&lt;/P&gt;
&lt;P&gt;Is this a virtual environment?&lt;/P&gt;</description>
      <pubDate>Mon, 16 Oct 2023 22:31:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-intervlan-routing/m-p/4941420#M1105133</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-10-16T22:31:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA intervlan routing</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-intervlan-routing/m-p/4943292#M1105191</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690"&gt;@Marius Gunnerud&lt;/a&gt;&amp;nbsp;, Thanks for your input on this, Your help much appreciated.&lt;/P&gt;&lt;P&gt;I have provide all the ASA configuration above,&amp;nbsp;&lt;/P&gt;&lt;P&gt;this is switch configuration, by the way this is GNS3 lab&amp;nbsp;&lt;/P&gt;&lt;P&gt;IOU1#sh run&lt;BR /&gt;Building configuration...&lt;/P&gt;&lt;P&gt;Current configuration : 2242 bytes&lt;BR /&gt;!&lt;BR /&gt;! Last configuration change at 20:36:59 UTC Wed Oct 18 2023&lt;BR /&gt;!&lt;BR /&gt;version 15.2&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;no service password-encryption&lt;BR /&gt;service compress-config&lt;BR /&gt;!&lt;BR /&gt;hostname IOU1&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;logging discriminator EXCESS severity drops 6 msg-body drops EXCESSCOLL&lt;BR /&gt;logging buffered 50000&lt;BR /&gt;logging console discriminator EXCESS&lt;BR /&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ip icmp rate-limit unreachable&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ip domain-lookup&lt;BR /&gt;ip cef&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;spanning-tree mode pvst&lt;BR /&gt;spanning-tree extend system-id&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1&lt;BR /&gt;switchport trunk encapsulation dot1q&lt;BR /&gt;switchport mode trunk&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;switchport trunk encapsulation dot1q&lt;BR /&gt;switchport mode trunk&lt;BR /&gt;channel-group 1 mode active&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;switchport trunk encapsulation dot1q&lt;BR /&gt;switchport mode trunk&lt;BR /&gt;channel-group 1 mode active&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;switchport access vlan 20&lt;BR /&gt;switchport mode access&lt;BR /&gt;spanning-tree portfast edge&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;switchport access vlan 10&lt;BR /&gt;switchport mode access&lt;BR /&gt;spanning-tree portfast edge&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/0&lt;BR /&gt;switchport access vlan 30&lt;BR /&gt;switchport mode access&lt;BR /&gt;spanning-tree portfast edge&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/1&lt;BR /&gt;switchport access vlan 10&lt;BR /&gt;switchport mode access&lt;BR /&gt;spanning-tree portfast edge&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet2/0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet2/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet2/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet2/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet3/0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet3/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet3/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet3/3&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Vlan10&lt;BR /&gt;ip address 192.168.10.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan20&lt;BR /&gt;ip address 192.168.20.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan30&lt;BR /&gt;ip address 192.168.30.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;router eigrp 1&lt;BR /&gt;network 0.0.0.0&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;!&lt;BR /&gt;ip tcp synwait-time 5&lt;BR /&gt;ip http server&lt;BR /&gt;ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;ip ssh server algorithm encryption aes128-ctr aes192-ctr aes256-ctr&lt;BR /&gt;ip ssh client algorithm encryption aes128-ctr aes192-ctr aes256-ctr&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;exec-timeout 0 0&lt;BR /&gt;privilege level 15&lt;BR /&gt;logging synchronous&lt;BR /&gt;line aux 0&lt;BR /&gt;exec-timeout 0 0&lt;BR /&gt;privilege level 15&lt;BR /&gt;logging synchronous&lt;BR /&gt;line vty 0 4&lt;BR /&gt;login&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Oct 2023 21:12:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-intervlan-routing/m-p/4943292#M1105191</guid>
      <dc:creator>veerapandiyanrengasamy</dc:creator>
      <dc:date>2023-10-18T21:12:47Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA intervlan routing</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-intervlan-routing/m-p/4944031#M1105193</link>
      <description>&lt;P&gt;First off, remove the VLAN interfaces on the switch for VLAN 10, 20, 30 so to remove any possibility for the switch to do inter-VLAN routing, and make sure the client machines are configured with relevant firewall IP as default gateway.&lt;/P&gt;
&lt;P&gt;If this does not solve the issue, then I suggest backup the configuration on both firewall and switch, delete them from GNS3 and then add them back.&amp;nbsp; I have experienced with GNS3 previously that the virtual emulation of the devices messes with switching of traffic.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2023 08:04:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-intervlan-routing/m-p/4944031#M1105193</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-10-19T08:04:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA intervlan routing</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-intervlan-routing/m-p/4944046#M1105196</link>
      <description>&lt;P&gt;Make sure that you use gw (IP of vlan of FW) in each host.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2023 08:15:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-intervlan-routing/m-p/4944046#M1105196</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-10-19T08:15:35Z</dc:date>
    </item>
  </channel>
</rss>

