<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic If they are same security in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5525-inter-vlan/m-p/3023821#M147551</link>
    <description>&lt;P&gt;If they are same security level then you only need to add "same-security traffic inter-interface" command.&lt;/P&gt;
&lt;P&gt;If they are different security levels then by default higher security can talk to lower security unless you have an ACL on the input of the higher security interface - then you would need to explicitly allow the traffic in the ACL.&lt;/P&gt;
&lt;P&gt;Similarly, lower security needing to talk to higher security needs an explicit ACL applied on the lower security interface (input direction).&lt;/P&gt;
&lt;P&gt;See this thread for some earlier discussion on this topic:&lt;/P&gt;
&lt;P&gt;https://supportforums.cisco.com/discussion/13008881/asa-same-security-traffic-permit-inter-interface-vs-access-list-permitdeny&lt;/P&gt;</description>
    <pubDate>Fri, 27 Jan 2017 16:51:33 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2017-01-27T16:51:33Z</dc:date>
    <item>
      <title>ASA 5525 Inter  Vlan</title>
      <link>https://community.cisco.com/t5/network-security/asa-5525-inter-vlan/m-p/3023819#M147547</link>
      <description>&lt;P&gt;Hello everyone, I am new to SA I want to set up an ASA 5525 on a local network in there are VLANs (Vlan &lt;STRONG&gt;print&lt;/STRONG&gt; vlan &lt;STRONG&gt;server&lt;/STRONG&gt; vlan &lt;STRONG&gt;client&lt;/STRONG&gt; vlan &lt;STRONG&gt;wifi Vlan DMZ&amp;nbsp;&lt;/STRONG&gt;)&lt;BR /&gt;I want how I can configure it and communicate the print and server vlan and client to each other&lt;BR /&gt;And for the DMZ it must be consulted in public and internally by vlan server and client&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;thank you in advance&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:48:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5525-inter-vlan/m-p/3023819#M147547</guid>
      <dc:creator>mmarouan</dc:creator>
      <dc:date>2019-03-12T08:48:15Z</dc:date>
    </item>
    <item>
      <title>We would need to know more</title>
      <link>https://community.cisco.com/t5/network-security/asa-5525-inter-vlan/m-p/3023820#M147548</link>
      <description>&lt;P&gt;We would need to know more about your network setup to provide a suggestion for configuration. &amp;nbsp;For example, if each VLAN is connecting to its own ASA interface or will there just be one interface or a portchannel configured with subinterfaces?&lt;/P&gt;
&lt;P&gt;If you are setting this up using a single interface or bundled etherchannel interface then you would need to configure subinterfaces on the ASA, assign the vlan to each interface using the vlan "&lt;EM&gt;vlan number&lt;/EM&gt;" command and then configure the switch interface connecting to the ASA as a trunk.&lt;/P&gt;
&lt;P&gt;Marvin has already explained how to do it if each will be connected to their own interface.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sat, 21 Jan 2017 14:43:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5525-inter-vlan/m-p/3023820#M147548</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-01-21T14:43:27Z</dc:date>
    </item>
    <item>
      <title>If they are same security</title>
      <link>https://community.cisco.com/t5/network-security/asa-5525-inter-vlan/m-p/3023821#M147551</link>
      <description>&lt;P&gt;If they are same security level then you only need to add "same-security traffic inter-interface" command.&lt;/P&gt;
&lt;P&gt;If they are different security levels then by default higher security can talk to lower security unless you have an ACL on the input of the higher security interface - then you would need to explicitly allow the traffic in the ACL.&lt;/P&gt;
&lt;P&gt;Similarly, lower security needing to talk to higher security needs an explicit ACL applied on the lower security interface (input direction).&lt;/P&gt;
&lt;P&gt;See this thread for some earlier discussion on this topic:&lt;/P&gt;
&lt;P&gt;https://supportforums.cisco.com/discussion/13008881/asa-same-security-traffic-permit-inter-interface-vs-access-list-permitdeny&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2017 16:51:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5525-inter-vlan/m-p/3023821#M147551</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-01-27T16:51:33Z</dc:date>
    </item>
    <item>
      <title>Hellon,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5525-inter-vlan/m-p/3023822#M147553</link>
      <description>&lt;P&gt;Hellon,&lt;/P&gt;
&lt;P&gt;My architecture its :&amp;nbsp;&lt;/P&gt;
&lt;P&gt;for the internal vlan (they have the same physical interface "&lt;SPAN&gt; subinterfaces&lt;/SPAN&gt;"):&lt;BR /&gt;Vlan 2server (172.16.1.0/24)&lt;BR /&gt;Vlan 3 desktop (172.16.2.0/24)&lt;BR /&gt;Vlan 4 printer (172.16.3.0/24)&lt;/P&gt;
&lt;P&gt;and&amp;nbsp;&lt;BR /&gt;Vlan 5 DMZ (172.16.4.0/24)&lt;BR /&gt;For the vlan DMZ it has a unique physical interface. I have an application web server in the zone DMZ which must communicate with a server in the vlan 2 for the replication MSSQL&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2017 16:51:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5525-inter-vlan/m-p/3023822#M147553</guid>
      <dc:creator>mmarouan</dc:creator>
      <dc:date>2017-01-27T16:51:34Z</dc:date>
    </item>
    <item>
      <title>If they are different</title>
      <link>https://community.cisco.com/t5/network-security/asa-5525-inter-vlan/m-p/3023823#M147555</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If they are different security levels then by default higher security can talk to lower security unless you have an ACL on the input of the higher security interface - then you would need to explicitly allow the traffic in the ACL.&lt;/P&gt;
&lt;P&gt;Similarly, lower security needing to talk to higher security needs an explicit ACL applied on the lower security interface (input direction).&lt;/P&gt;
&lt;P&gt;See this thread for some earlier discussion on this topic:&lt;/P&gt;
&lt;P style="border: none; padding: 0cm;"&gt;&lt;A href="https://supportforums.cisco.com/discussion/13008881/asa-same-security-traffic-permit-inter-interface-vs-access-list-permitdeny"&gt;https://supportforums.cisco.com/discussion/13008881/asa-same-security-tr...&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2017 17:35:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5525-inter-vlan/m-p/3023823#M147555</guid>
      <dc:creator>Farhan Mohamed</dc:creator>
      <dc:date>2017-01-27T17:35:26Z</dc:date>
    </item>
    <item>
      <title>vlan 2 , 3, 4 are same</title>
      <link>https://community.cisco.com/t5/network-security/asa-5525-inter-vlan/m-p/3023824#M147557</link>
      <description>&lt;P&gt;vlan 2 , 3, 4 are same security level?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 29 Jan 2017 02:50:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5525-inter-vlan/m-p/3023824#M147557</guid>
      <dc:creator>MANI .P</dc:creator>
      <dc:date>2017-01-29T02:50:35Z</dc:date>
    </item>
    <item>
      <title>hello 
yes </title>
      <link>https://community.cisco.com/t5/network-security/asa-5525-inter-vlan/m-p/3023825#M147559</link>
      <description>&lt;P&gt;hello&amp;nbsp;&lt;/P&gt;
&lt;P&gt;yes&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2017 08:45:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5525-inter-vlan/m-p/3023825#M147559</guid>
      <dc:creator>mmarouan</dc:creator>
      <dc:date>2017-04-04T08:45:36Z</dc:date>
    </item>
  </channel>
</rss>

