<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic That Mac adress is my laptop. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-between-two-sub-interfaces-asa-5506-x/m-p/3003765#M144853</link>
    <description>&lt;P&gt;That Mac adress is my laptop. I have tried to connect to both adm and mgmt vlan&lt;/P&gt;</description>
    <pubDate>Fri, 18 Nov 2016 13:47:25 GMT</pubDate>
    <dc:creator>Hoist Group</dc:creator>
    <dc:date>2016-11-18T13:47:25Z</dc:date>
    <item>
      <title>Inter VLAN routing between two sub interfaces ASA 5506-x</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-between-two-sub-interfaces-asa-5506-x/m-p/3003761#M144843</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;
&lt;P&gt;Im pretty new to Cisco and im setting up an ASA 5506-x for the first time.&lt;/P&gt;
&lt;P&gt;I am not able to communicate between the sub interfaces on my ASA. &amp;nbsp;Everything else is working fine.&lt;/P&gt;
&lt;P&gt;I have 3 sub interfaces:&lt;/P&gt;
&lt;P&gt;1.vlan 10 (10.0.10.1/24)&lt;/P&gt;
&lt;P&gt;2.vlan 50 (10.0.50.1/24&lt;/P&gt;
&lt;P&gt;3.vlan 99 (10.0.99.1/24)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I started like this;&lt;/P&gt;
&lt;P&gt;1.wr&lt;/P&gt;
&lt;P&gt;2.conf factory-default&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Then i added my vlans and dhcp etc. Here is complete config:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.6(1)&lt;BR /&gt;!&lt;BR /&gt;terminal width 350&lt;BR /&gt;hostname fw01&lt;BR /&gt;enable password N7FecZuSHJlVZC2P encrypted&lt;BR /&gt;names&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 191.151.150.178 255.255.255.224&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt; nameif cisco-mgmt&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2.10&lt;BR /&gt; vlan 10&lt;BR /&gt; nameif adm&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.0.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2.50&lt;BR /&gt; vlan 50&lt;BR /&gt; nameif guest&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 10.0.50.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2.99&lt;BR /&gt; vlan 99&lt;BR /&gt; nameif mgmt&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.0.99.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt; management-only&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network obj_any&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu cisco-mgmt 1500&lt;BR /&gt;mtu mgmt 1500&lt;BR /&gt;mtu guest 1500&lt;BR /&gt;mtu adm 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt; nat (any,outside) dynamic interface&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 191.151.150.161 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 cisco-mgmt&lt;BR /&gt;http 10.0.99.0 255.255.255.0 mgmt&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 10.0.99.0 255.255.255.0 mgmt&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group14-sha1&lt;BR /&gt;console timeout 0&lt;/P&gt;
&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.5-192.168.1.254 cisco-mgmt&lt;BR /&gt;dhcpd enable cisco-mgmt&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.0.99.100-10.0.99.200 mgmt&lt;BR /&gt;dhcpd dns 8.8.8.8 interface mgmt&lt;BR /&gt;dhcpd domain mgmt.local interface mgmt&lt;BR /&gt;dhcpd enable mgmt&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.0.50.2-10.0.50.200 guest&lt;BR /&gt;dhcpd dns 8.8.8.8 interface guest&lt;BR /&gt;dhcpd domain guest.local interface guest&lt;BR /&gt;dhcpd enable guest&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.0.10.12-10.0.10.200 adm&lt;BR /&gt;dhcpd dns 8.8.8.8 interface adm&lt;BR /&gt;dhcpd domain admin.local interface adm&lt;BR /&gt;dhcpd enable adm&lt;BR /&gt;!&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username admin password ZtmwWxwfZJPPSOvr encrypted privilege 15&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map&lt;BR /&gt; inspect ftp&lt;BR /&gt; inspect h323 h225&lt;BR /&gt; inspect h323 ras&lt;BR /&gt; inspect rsh&lt;BR /&gt; inspect rtsp&lt;BR /&gt; inspect esmtp&lt;BR /&gt; inspect sqlnet&lt;BR /&gt; inspect skinny&lt;BR /&gt; inspect sunrpc&lt;BR /&gt; inspect xdmcp&lt;BR /&gt; inspect sip&lt;BR /&gt; inspect netbios&lt;BR /&gt; inspect tftp&lt;BR /&gt; inspect ip-options&lt;BR /&gt; inspect icmp&lt;BR /&gt; inspect icmp error&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:63e65a7e865abf7d26504a4309f1fcbc&lt;BR /&gt;: end&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:33:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing-between-two-sub-interfaces-asa-5506-x/m-p/3003761#M144843</guid>
      <dc:creator>Hoist Group</dc:creator>
      <dc:date>2019-03-12T08:33:12Z</dc:date>
    </item>
    <item>
      <title>I do not see an obvious issue</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-between-two-sub-interfaces-asa-5506-x/m-p/3003762#M144847</link>
      <description>&lt;P&gt;I do not see an obvious issue in the config that you posted. When I saw several interfaces at the same security level I wondered if that might be an issue but I see that you have both of the same-security-level commands. So that is not the issue. I wondered if it might be a NAT issue. But you are only doing NAT for traffic going through the outside interface. So that is not an issue.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Are devices in these subinterfaces able to access the Internet?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Would you post the output of show arp?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Rick&lt;/P&gt;</description>
      <pubDate>Fri, 18 Nov 2016 13:15:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing-between-two-sub-interfaces-asa-5506-x/m-p/3003762#M144847</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2016-11-18T13:15:02Z</dc:date>
    </item>
    <item>
      <title>Hi Rick,</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-between-two-sub-interfaces-asa-5506-x/m-p/3003763#M144849</link>
      <description>&lt;P&gt;Hi Rick,&lt;/P&gt;
&lt;P&gt;Thanks for your answer.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am able to reach the internet on the different sub interfaces yes.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Here is the output of show arp:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;fw01(config)# show arp&lt;BR /&gt;&lt;BR /&gt; mgmt 10.0.99.101 406c.8f51.edc2 387&lt;BR /&gt; mgmt 10.0.99.100 406c.8f51.edc2 8237&lt;BR /&gt; adm 10.0.10.12 406c.8f51.edc2 117&lt;/P&gt;</description>
      <pubDate>Fri, 18 Nov 2016 13:35:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing-between-two-sub-interfaces-asa-5506-x/m-p/3003763#M144849</guid>
      <dc:creator>Hoist Group</dc:creator>
      <dc:date>2016-11-18T13:35:31Z</dc:date>
    </item>
    <item>
      <title>Thanks for the additional</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-between-two-sub-interfaces-asa-5506-x/m-p/3003764#M144851</link>
      <description>&lt;P&gt;Thanks for the additional information. It does verify that the interfaces and subinterfaces are working and that the default gateway of the hosts does get traffic to the ASA. And it does confirm that the ASA sees multiple devices in your network. But I notice something very strange that all of the devices inside the network seem to have exactly the same mac address of 406c.8f51.edc2. So perhaps we need to understand better what is connected to the ASA and to these devices.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Rick&lt;/P&gt;</description>
      <pubDate>Fri, 18 Nov 2016 13:41:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing-between-two-sub-interfaces-asa-5506-x/m-p/3003764#M144851</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2016-11-18T13:41:54Z</dc:date>
    </item>
    <item>
      <title>That Mac adress is my laptop.</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-between-two-sub-interfaces-asa-5506-x/m-p/3003765#M144853</link>
      <description>&lt;P&gt;That Mac adress is my laptop. I have tried to connect to both adm and mgmt vlan&lt;/P&gt;</description>
      <pubDate>Fri, 18 Nov 2016 13:47:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing-between-two-sub-interfaces-asa-5506-x/m-p/3003765#M144853</guid>
      <dc:creator>Hoist Group</dc:creator>
      <dc:date>2016-11-18T13:47:25Z</dc:date>
    </item>
    <item>
      <title>Thanks for the clarification.</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-between-two-sub-interfaces-asa-5506-x/m-p/3003766#M144855</link>
      <description>&lt;P&gt;Thanks for the clarification. If your laptop is the only device that the ASA sees do I assume that it is the only device active in the network? Or are there other devices that do not show up in the arp table?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If there is only a single device connected then communication between subinterfaces is not going to happen (who would it communicate with). If there are other devices but they do not show up in the arp table then we need to figure out what is causing this.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Rick&lt;/P&gt;</description>
      <pubDate>Fri, 18 Nov 2016 14:12:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing-between-two-sub-interfaces-asa-5506-x/m-p/3003766#M144855</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2016-11-18T14:12:43Z</dc:date>
    </item>
    <item>
      <title>Rick,</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-between-two-sub-interfaces-asa-5506-x/m-p/3003767#M144857</link>
      <description>&lt;P&gt;Rick,&lt;/P&gt;
&lt;P&gt;I agree on this, but shouldnt i be able to ping the other interfaces? From vlan 99 (10.0.99.1) i cannot ping vlan 10 (10.0.10.1) interface and vlan 50 (10.0.50.1) interface&lt;/P&gt;</description>
      <pubDate>Fri, 18 Nov 2016 14:53:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing-between-two-sub-interfaces-asa-5506-x/m-p/3003767#M144857</guid>
      <dc:creator>Hoist Group</dc:creator>
      <dc:date>2016-11-18T14:53:20Z</dc:date>
    </item>
    <item>
      <title>Actually the answer is that</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-between-two-sub-interfaces-asa-5506-x/m-p/3003768#M144859</link>
      <description>&lt;P&gt;Actually the answer is that no you should not be able to ping the other vlan interfaces of the ASA. As part of its basic security policy the ASA does not allow ping from a device connected in one interface to the other interfaces of the ASA.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Rick&lt;/P&gt;</description>
      <pubDate>Fri, 18 Nov 2016 15:09:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing-between-two-sub-interfaces-asa-5506-x/m-p/3003768#M144859</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2016-11-18T15:09:55Z</dc:date>
    </item>
    <item>
      <title>Ah, i did not know this.</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-between-two-sub-interfaces-asa-5506-x/m-p/3003769#M144861</link>
      <description>&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;/SPAN&gt;Ah, i did not know this. &amp;nbsp;Thanks for clearing this up Rick! &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Just for curiosity, &amp;nbsp;is it possible to enable this?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Nov 2016 15:23:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing-between-two-sub-interfaces-asa-5506-x/m-p/3003769#M144861</guid>
      <dc:creator>Hoist Group</dc:creator>
      <dc:date>2016-11-18T15:23:40Z</dc:date>
    </item>
    <item>
      <title>As far as I know this policy</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-between-two-sub-interfaces-asa-5506-x/m-p/3003770#M144865</link>
      <description>&lt;P&gt;As far as I know this policy can not be changed. I do not know of any config option that can change this behavior.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Rick&lt;/P&gt;</description>
      <pubDate>Fri, 18 Nov 2016 15:59:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing-between-two-sub-interfaces-asa-5506-x/m-p/3003770#M144865</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2016-11-18T15:59:30Z</dc:date>
    </item>
    <item>
      <title>Rick,</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-between-two-sub-interfaces-asa-5506-x/m-p/3003771#M144867</link>
      <description>&lt;P&gt;Rick,&lt;/P&gt;
&lt;P&gt;Thank you so much for your help!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Nov 2016 18:57:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing-between-two-sub-interfaces-asa-5506-x/m-p/3003771#M144867</guid>
      <dc:creator>Hoist Group</dc:creator>
      <dc:date>2016-11-18T18:57:15Z</dc:date>
    </item>
    <item>
      <title>You are quite welcome. I am</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-between-two-sub-interfaces-asa-5506-x/m-p/3003772#M144868</link>
      <description>&lt;P&gt;You are quite welcome. I am glad that you got it figured out. Thank you for using the rating system to mark this question as answered. This will help other readers in the forum to identify discussions that have helpful information. These forums are excellent places to learn about networking. I hope to see you continue to be active in the forums.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Rick&lt;/P&gt;</description>
      <pubDate>Fri, 18 Nov 2016 21:49:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing-between-two-sub-interfaces-asa-5506-x/m-p/3003772#M144868</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2016-11-18T21:49:23Z</dc:date>
    </item>
    <item>
      <title>Re: Inter VLAN routing between two sub interfaces ASA 5506-x</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-between-two-sub-interfaces-asa-5506-x/m-p/4160743#M1074374</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hello Richard,&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;I really need your help on a certain configuration.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;I tried deploying two FTD-2110 on my network.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;After all configurations, workstation connected to vlan85 whose&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;gateway is patched on FTD_1 could not reach a workstation on vlan_10&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;whose gateway is patched on FTD_2.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Both FTD are connected directed via cable.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Kindly help if i'm missing something out.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Oct 2020 14:02:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing-between-two-sub-interfaces-asa-5506-x/m-p/4160743#M1074374</guid>
      <dc:creator>walenteano</dc:creator>
      <dc:date>2020-10-02T14:02:14Z</dc:date>
    </item>
  </channel>
</rss>

