<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Outside Vlan &amp; inside Vlan ASA5510 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877976#M156545</link>
    <description>&lt;P&gt;Having a few problems with my outside vlan 5 and inside vlan 10; my outside vlan are all pingable; but when i try to ping from the or switch my inside vlan10 gateway its unpingable to inside gateway. I have two route setup on the ASA5510 firewall;&amp;nbsp; one for my outside network default 0.0.0.0 0.0.0.0 Outside and i have another to allow my internal vlans to reach the outside network 10.0.0.0 255.0.0.0 Outside. I don't what else can be blocking ping access to my internal gateway; all of my acl are allowing traffic. Does any else have this problem where your outside network are pingable but your internal network is not pingable to the gateway; Could it be a switch port on the switch or could it be the router ??&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please if any have some suggestions feel free&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 07:59:03 GMT</pubDate>
    <dc:creator>j_j624001</dc:creator>
    <dc:date>2019-03-12T07:59:03Z</dc:date>
    <item>
      <title>Outside Vlan &amp; inside Vlan ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877976#M156545</link>
      <description>&lt;P&gt;Having a few problems with my outside vlan 5 and inside vlan 10; my outside vlan are all pingable; but when i try to ping from the or switch my inside vlan10 gateway its unpingable to inside gateway. I have two route setup on the ASA5510 firewall;&amp;nbsp; one for my outside network default 0.0.0.0 0.0.0.0 Outside and i have another to allow my internal vlans to reach the outside network 10.0.0.0 255.0.0.0 Outside. I don't what else can be blocking ping access to my internal gateway; all of my acl are allowing traffic. Does any else have this problem where your outside network are pingable but your internal network is not pingable to the gateway; Could it be a switch port on the switch or could it be the router ??&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please if any have some suggestions feel free&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:59:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877976#M156545</guid>
      <dc:creator>j_j624001</dc:creator>
      <dc:date>2019-03-12T07:59:03Z</dc:date>
    </item>
    <item>
      <title>Hi </title>
      <link>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877977#M156546</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would be happy to help however I'll need your asa config and switch config. &amp;nbsp;Please attach a little drawing to indicate which switch port is inside.&lt;/P&gt;
&lt;P&gt;Your issue could be asa (sub-interfaces, Same-security-traffic,..) or switch (trunk, access) configuration or acl as well.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PS: Please don't forget to rate and mark as correct answer if this solved your issue&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jul 2016 03:39:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877977#M156546</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-07-04T03:39:24Z</dc:date>
    </item>
    <item>
      <title>Hello;</title>
      <link>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877978#M156547</link>
      <description>&lt;P&gt;Hello;&lt;/P&gt;
&lt;P&gt;Thanks for the response; ive been struggling too long on this lol; here is my config you requested; excuse the drawing i tried my best lol&lt;/P&gt;
&lt;P&gt;ASA Config&lt;/P&gt;
&lt;P&gt;Result of the command: "show ru"&lt;BR /&gt;&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(3) &lt;BR /&gt;!&lt;BR /&gt;hostname JFW&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;name 10.10.0.1 Inside&lt;BR /&gt;name 10.85.85.1 Outside&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;nameif Outside_Network&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 10.85.85.2 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;&amp;nbsp;nameif Inside_Network&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.10.0.2 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;nameif TEST&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address dhcp &lt;BR /&gt;!&lt;BR /&gt;banner login 1&lt;BR /&gt;banner login WELCOME TO THE DEAD ZONE !!!!&lt;BR /&gt;banner login WELCOME TO J-WALL !!!&lt;BR /&gt;banner motd LEARN HOW TO BLOCK OUTSIDE TRAFFIC !!!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;dns domain-lookup Inside_Network&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;name-server 10.10.15.4&lt;BR /&gt;&amp;nbsp;name-server 10.10.15.5&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;BR /&gt;&amp;nbsp;protocol-object ip&lt;BR /&gt;&amp;nbsp;protocol-object icmp&lt;BR /&gt;&amp;nbsp;protocol-object udp&lt;BR /&gt;&amp;nbsp;protocol-object tcp&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_2&lt;BR /&gt;&amp;nbsp;protocol-object ip&lt;BR /&gt;&amp;nbsp;protocol-object icmp&lt;BR /&gt;&amp;nbsp;protocol-object udp&lt;BR /&gt;&amp;nbsp;protocol-object tcp&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;&amp;nbsp;network-object 10.10.0.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object host Outside&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt;&amp;nbsp;network-object host Inside&lt;BR /&gt;&amp;nbsp;network-object 0.0.0.0 0.0.0.0&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_3&lt;BR /&gt;&amp;nbsp;protocol-object ip&lt;BR /&gt;&amp;nbsp;protocol-object icmp&lt;BR /&gt;&amp;nbsp;protocol-object udp&lt;BR /&gt;&amp;nbsp;protocol-object tcp&lt;BR /&gt;access-list Outside_Network_access_in extended permit object-group DM_INLINE_PROTOCOL_1 host Outside object-group DM_INLINE_NETWORK_2 log debugging &lt;BR /&gt;access-list Inside_Network_access_in extended permit object-group DM_INLINE_PROTOCOL_2 host Inside object-group DM_INLINE_NETWORK_1 log debugging &lt;BR /&gt;access-list TEST_access_in extended permit object-group DM_INLINE_PROTOCOL_3 any any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging emblem&lt;BR /&gt;logging asdm-buffer-size 512&lt;BR /&gt;logging console debugging&lt;BR /&gt;logging monitor debugging&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging trap debugging&lt;BR /&gt;logging asdm debugging&lt;BR /&gt;logging debug-trace&lt;BR /&gt;mtu Outside_Network 1500&lt;BR /&gt;mtu Inside_Network 1500&lt;BR /&gt;mtu TEST 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;access-group Outside_Network_access_in in interface Outside_Network&lt;BR /&gt;access-group Inside_Network_access_in in interface Inside_Network&lt;BR /&gt;access-group TEST_access_in in interface TEST&lt;BR /&gt;route Outside_Network 0.0.0.0 0.0.0.0 Outside 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication enable console LOCAL &lt;BR /&gt;aaa authentication http console LOCAL &lt;BR /&gt;aaa authentication serial console LOCAL &lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;aaa authentication telnet console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.0.0 255.255.255.0 TEST&lt;BR /&gt;http 10.10.0.0 255.255.255.0 Inside_Network&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;service resetinbound interface TEST&lt;BR /&gt;no service resetoutbound interface Outside_Network&lt;BR /&gt;no service resetoutbound interface Inside_Network&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh scopy enable&lt;BR /&gt;ssh 10.10.0.0 255.255.255.0 Inside_Network&lt;BR /&gt;ssh timeout 30&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 10.10.0.85-10.10.0.100 Inside_Network&lt;BR /&gt;dhcpd dns 10.10.15.4 10.10.15.5 interface Inside_Network&lt;BR /&gt;dhcpd option 3 ip Inside interface Inside_Network&lt;BR /&gt;dhcpd option 6 ip 10.10.15.4 10.10.15.5 interface Inside_Network&lt;BR /&gt;dhcpd enable Inside_Network&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection scanning-threat&lt;BR /&gt;threat-detection statistics&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;webvpn&lt;BR /&gt;username JEJ password cX0yeH.p3WpM25f0 encrypted privilege 15&lt;BR /&gt;!&lt;BR /&gt;class-map type inspect http match-all asdm_high_security_methods&lt;BR /&gt;&amp;nbsp;match not request method get&lt;BR /&gt;&amp;nbsp;match not request method head&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;&amp;nbsp; id-randomization&lt;BR /&gt;&amp;nbsp; id-mismatch action log&lt;BR /&gt;&amp;nbsp; tsig enforced action log&lt;BR /&gt;policy-map type inspect ftp FTP&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; mask-banner&lt;BR /&gt;&amp;nbsp; mask-syst-reply&lt;BR /&gt;policy-map type inspect netbios NETBIOS&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; protocol-violation action drop log&lt;BR /&gt;policy-map type inspect ip-options Options&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; eool action clear&lt;BR /&gt;&amp;nbsp; nop action clear&lt;BR /&gt;&amp;nbsp; router-alert action clear&lt;BR /&gt;policy-map type inspect http HTTP&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; protocol-violation action drop-connection log&lt;BR /&gt;&amp;nbsp;class asdm_high_security_methods&lt;BR /&gt;&amp;nbsp; drop-connection&lt;BR /&gt;&amp;nbsp;match request header non-ascii&lt;BR /&gt;&amp;nbsp; drop-connection&lt;BR /&gt;!&lt;BR /&gt;prompt hostname context &lt;BR /&gt;call-home&lt;BR /&gt;&amp;nbsp;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email callhome@cisco.com&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:6e49ea09880a8584795ecc8bccb8cc85&lt;BR /&gt;: end&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Here is my switch config&lt;/P&gt;
&lt;P&gt;SW#s&lt;BR /&gt;Building configuration...&lt;BR /&gt;&lt;BR /&gt;Current configuration : 5624 bytes&lt;BR /&gt;!&lt;BR /&gt;version 12.2&lt;BR /&gt;no service pad&lt;BR /&gt;service timestamps debug uptime&lt;BR /&gt;service timestamps log uptime&lt;BR /&gt;no service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname SW&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;clock timezone EST 4 1&lt;BR /&gt;switch 1 provision ws-c3750e-24td&lt;BR /&gt;system mtu routing 1500&lt;BR /&gt;ip subnet-zero&lt;BR /&gt;ip icmp redirect host&lt;BR /&gt;no ip domain-lookup&lt;BR /&gt;ip domain-name IN_Switch.com&lt;BR /&gt;ip name-server 10.10.15.4&lt;BR /&gt;ip name-server 10.10.15.5&lt;BR /&gt;!&lt;BR /&gt;ip port-map dns port 53&lt;BR /&gt;ip port-map smtp port 161&lt;BR /&gt;ip port-map pop2 port 109&lt;BR /&gt;ip port-map pop3 port 110&lt;BR /&gt;ip port-map nntp port 119&lt;BR /&gt;ip port-map ldap port 389&lt;BR /&gt;ip port-map imap port 143&lt;BR /&gt;ip port-map nfs port 944&lt;BR /&gt;ip dhcp-server 10.10.0.1&lt;BR /&gt;ip dhcp-server 10.10.20.1&lt;BR /&gt;ip dhcp-server 10.10.25.1&lt;BR /&gt;!&lt;BR /&gt;password encryption aes&lt;/P&gt;
&lt;P&gt;spanning-tree mode pvst&lt;BR /&gt;spanning-tree extend system-id&lt;BR /&gt;!&lt;BR /&gt;vlan internal allocation policy ascending&lt;BR /&gt;!&lt;BR /&gt;ip tcp selective-ack&lt;BR /&gt;ip tcp timestamp&lt;BR /&gt;ip tcp queuemax 50&lt;BR /&gt;ip tcp path-mtu-discovery&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;no ip mroute-cache&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/1&lt;BR /&gt;&amp;nbsp;description Outside R1 - SW&lt;BR /&gt;&amp;nbsp;switchport access vlan 5&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/2&lt;BR /&gt;&amp;nbsp;description Outside FW - SW&lt;BR /&gt;&amp;nbsp;switchport access vlan 5&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/3&lt;BR /&gt;&amp;nbsp;description Inside Network FW&lt;BR /&gt;&amp;nbsp;switchport trunk encapsulation dot1q&lt;BR /&gt;&amp;nbsp;switchport trunk native vlan 10&lt;BR /&gt;&amp;nbsp;switchport trunk allowed vlan 10,15,20,25&lt;BR /&gt;&amp;nbsp;switchport mode trunk&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/4&lt;BR /&gt;&amp;nbsp;description **************&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/5&lt;BR /&gt;&amp;nbsp;description Servers&lt;BR /&gt;&amp;nbsp;switchport access vlan 15&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet1/0/6&lt;BR /&gt;&amp;nbsp;description Servers&lt;BR /&gt;&amp;nbsp;switchport access vlan 15&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/7&lt;BR /&gt;&amp;nbsp;description Inside&lt;BR /&gt;&amp;nbsp;switchport access vlan 10&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/8&lt;BR /&gt;&amp;nbsp;description Inside&lt;BR /&gt;&amp;nbsp;switchport access vlan 10&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet1/0/13&lt;BR /&gt;&amp;nbsp;description Backups&lt;BR /&gt;&amp;nbsp;switchport access vlan 20&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/14&lt;BR /&gt;&amp;nbsp;description Backups&lt;BR /&gt;&amp;nbsp;switchport access vlan 20&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/15&lt;BR /&gt;&amp;nbsp;description Storage&lt;BR /&gt;&amp;nbsp;switchport access vlan 25&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/16&lt;BR /&gt;&amp;nbsp;description Storage&lt;BR /&gt;&amp;nbsp;switchport access vlan 25&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/17&lt;BR /&gt;&amp;nbsp;description Storage&lt;BR /&gt;&amp;nbsp;switchport access vlan 25&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;/P&gt;
&lt;P&gt;interface Vlan5&lt;BR /&gt;&amp;nbsp;ip address 10.85.85.3 255.255.255.0&lt;BR /&gt;&amp;nbsp;ip helper-address 10.85.85.1&lt;BR /&gt;&amp;nbsp;arp snap&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface Vlan10&lt;BR /&gt;&amp;nbsp;ip address 10.10.0.3 255.255.255.0&lt;BR /&gt;&amp;nbsp;ip helper-address 10.10.0.1&lt;BR /&gt;&amp;nbsp;arp snap&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface Vlan15&lt;BR /&gt;&amp;nbsp;ip address 10.10.15.3 255.255.255.0&lt;BR /&gt;&amp;nbsp;ip helper-address 10.10.15.1&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;no ip mroute-cache&lt;BR /&gt;&amp;nbsp;arp snap&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface Vlan20&lt;BR /&gt;&amp;nbsp;ip address 10.10.20.3 255.255.255.0&lt;BR /&gt;&amp;nbsp;ip helper-address 10.10.20.1&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;no ip mroute-cache&lt;BR /&gt;&amp;nbsp;arp snap&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface Vlan25&lt;BR /&gt;&amp;nbsp;ip address 10.10.25.3 255.255.255.0&lt;BR /&gt;&amp;nbsp;ip helper-address 10.10.25.1&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;&amp;nbsp;no ip mroute-cache&lt;BR /&gt;&amp;nbsp;arp snap&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;/P&gt;
&lt;P&gt;ip default-gateway 10.85.85.1&lt;BR /&gt;no ip classless&lt;BR /&gt;no ip http server&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jul 2016 03:51:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877978#M156547</guid>
      <dc:creator>j_j624001</dc:creator>
      <dc:date>2016-07-04T03:51:56Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877979#M156548</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Form your switch vlan 10, are you able to ping your FW inside (10.10.0.2)?&lt;/P&gt;
&lt;P&gt;To reach other vlans from your firewall:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;1. You have configured trunk from your switch to your firewall then you need to adapt your ASA config&lt;/P&gt;
&lt;P&gt;&amp;nbsp;2. OR you leave it with 1 vlan and do a route inside on your firewall pointing to your SW vlan 10 as next-hop for all other vlans.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If you want to keep trunking, the ASA config would be:&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;interface Ethernet0/1.10&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp; vlan 10&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp; nameif Inside_Network&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;security-level 100&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;ip address 10.10.0.2 255.255.255.0&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;interface Ethernet0/1.15&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp; vlan 15&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp; nameif Inside_Network_2&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;security-level 100&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;ip address 10.10.15.2 255.255.255.0&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Hope this is clear.&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;PS: Please don't forget to rate and mark as correct answer if this solved your issue&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jul 2016 12:49:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877979#M156548</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-07-04T12:49:29Z</dc:date>
    </item>
    <item>
      <title>Hello;</title>
      <link>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877980#M156549</link>
      <description>&lt;P&gt;Hello;&lt;/P&gt;
&lt;P&gt;From the switch i can ping to the FW (10.10.0.2)&lt;/P&gt;
&lt;P&gt;SW#ping 10.10.0.2&lt;BR /&gt;&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 10.10.0.2, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/4/9 ms&lt;/P&gt;
&lt;P&gt;Also from the firewall i can ping back to the switch (Vlan 10 10.10.0.3)&lt;/P&gt;
&lt;P&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 10.10.0.3, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/10 ms&lt;/P&gt;
&lt;P&gt;But from pinging from the switch and/or Firewall to the Vlan10 gateway is where i have the problem, even from my firewall can't ping vlan 10 gateway&lt;/P&gt;
&lt;P&gt;SW#ping 10.10.0.1&lt;BR /&gt;&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 10.10.0.1, timeout is 2 seconds:&lt;BR /&gt;.....&lt;BR /&gt;Success rate is 0 percent (0/5)&lt;/P&gt;
&lt;P&gt;this is from the firewall gui&lt;/P&gt;
&lt;P&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to Inside, timeout is 2 seconds:&lt;BR /&gt;?????&lt;BR /&gt;Success rate is 0 percent (0/5) (10.10.0.1 Vlan 10 gateway)&lt;/P&gt;
&lt;P&gt;if you can see on the switch config i have a trunk port from the firewall to the switch&lt;/P&gt;
&lt;P&gt;&amp;nbsp;description Inside Network FW &amp;lt;----- FW to Switch&lt;BR /&gt;&amp;nbsp;switchport trunk encapsulation dot1q&lt;BR /&gt;&amp;nbsp;switchport trunk native vlan 10&lt;BR /&gt;&amp;nbsp;switchport trunk allowed vlan 10,15,20,25&lt;BR /&gt;&amp;nbsp;switchport mode trunk&lt;/P&gt;
&lt;P&gt;So your saying have ethernet0/1 empty and create an subnet underneath ethernet0/1 to ethernet0/1.10 for my internal vlans; and also how would I configure an route; would it be &lt;STRONG&gt;10.10.0.0 255.255.0.0 10.10.0.3&lt;/STRONG&gt; &amp;lt;---- would the inside route look like this; I'm rarely new to this routing stuff lol. I would like to keep the trunk and have all traffic stop by my firewall first; it seems like all my internal vlans gateway i can't ping from the firewall or switch.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jul 2016 15:18:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877980#M156549</guid>
      <dc:creator>j_j624001</dc:creator>
      <dc:date>2016-07-04T15:18:44Z</dc:date>
    </item>
    <item>
      <title>Ok wait a minute. Let's</title>
      <link>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877981#M156550</link>
      <description>&lt;P&gt;Ok wait a minute. Let's forgot about the trunk configuration now. Let's concentrate on your problem.&lt;/P&gt;
&lt;P&gt;The switch vlan 10 ip is 10.10.0.3 and you can't reach 10.10.0.1. Who is this 10.10.0.1? You said your default gateway... It's the switch your default gateway? Where this device is connected to?&lt;/P&gt;
&lt;P&gt;Do you see a show ip arp entry for that 10.10.0.1 device?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jul 2016 16:50:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877981#M156550</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-07-04T16:50:06Z</dc:date>
    </item>
    <item>
      <title>Hello;</title>
      <link>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877982#M156551</link>
      <description>&lt;P&gt;Hello;&lt;/P&gt;
&lt;P&gt;10.10.0.1 is my default gw from vlan 10 off my router; on my router i have 4 subinterfaces; here is my router config&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;hostname R1&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;!&lt;BR /&gt;resource policy&lt;BR /&gt;!&lt;BR /&gt;ip cef&lt;BR /&gt;no ip dhcp use vrf connected&lt;BR /&gt;ip dhcp excluded-address 10.10.0.1 10.10.0.84&lt;BR /&gt;ip dhcp excluded-address 10.10.0.101 10.10.0.255&lt;BR /&gt;ip dhcp excluded-address 10.10.20.1 10.10.20.84&lt;BR /&gt;ip dhcp excluded-address 10.10.20.101 10.10.20.255&lt;BR /&gt;ip dhcp excluded-address 10.10.25.101 10.10.25.255&lt;BR /&gt;ip dhcp excluded-address 10.10.25.1 10.10.25.84&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool 10_Net_POOL&lt;BR /&gt;&amp;nbsp;&amp;nbsp; import all&lt;BR /&gt;&amp;nbsp;&amp;nbsp; network 10.10.0.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; update dns&lt;BR /&gt;&amp;nbsp;&amp;nbsp; default-router 10.10.0.1&lt;BR /&gt;&amp;nbsp;&amp;nbsp; domain-name Internal_Net.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp; dns-server 10.10.15.4 10.10.15.5&lt;BR /&gt;&amp;nbsp;&amp;nbsp; update arp&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool 20_NET_POOL&lt;BR /&gt;&amp;nbsp;&amp;nbsp; import all&lt;BR /&gt;&amp;nbsp;&amp;nbsp; network 10.10.20.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; update dns&lt;BR /&gt;&amp;nbsp;&amp;nbsp; default-router 10.10.20.1&lt;BR /&gt;&amp;nbsp;&amp;nbsp; domain-name Backup_Internal_Net.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp; dns-server 10.10.15.4 10.10.15.5&lt;BR /&gt;&amp;nbsp;&amp;nbsp; update arp&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool 25_NET_POOL&lt;BR /&gt;&amp;nbsp;&amp;nbsp; import all&lt;BR /&gt;&amp;nbsp;&amp;nbsp; network 10.10.25.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; update dns&lt;BR /&gt;&amp;nbsp;&amp;nbsp; default-router 10.10.25.1&lt;BR /&gt;&amp;nbsp;&amp;nbsp; domain-name Storage_Internal_Net.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp; dns-server 10.10.15.4 10.10.15.5&lt;BR /&gt;&amp;nbsp;&amp;nbsp; update arp&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip domain name Internal.com&lt;BR /&gt;ip ssh source-interface FastEthernet1&lt;BR /&gt;ip ssh logging events&lt;BR /&gt;ip ssh version 2&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;username JEJ privilege 15 secret 5 $1$jyg2$ZDr0KASZP.8CbSZyBdIw61&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0&lt;BR /&gt;&amp;nbsp;description OUT&lt;BR /&gt;&amp;nbsp;ip address 192.168.0.85 255.255.255.0&lt;BR /&gt;&amp;nbsp;ip access-group filter-inbond in&lt;BR /&gt;&amp;nbsp;ip access-group filter-outbond out&lt;BR /&gt;&amp;nbsp;ip nat outside&lt;BR /&gt;&amp;nbsp;ip irdp&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly&lt;BR /&gt;&amp;nbsp;duplex auto&lt;BR /&gt;&amp;nbsp;speed auto&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1&lt;BR /&gt;&amp;nbsp;description Internal&lt;BR /&gt;&amp;nbsp;ip address 10.85.85.1 255.255.255.0&lt;BR /&gt;&amp;nbsp;ip nat outside&lt;BR /&gt;&amp;nbsp;ip irdp&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly&lt;BR /&gt;&amp;nbsp;duplex auto&lt;BR /&gt;&amp;nbsp;speed auto&lt;BR /&gt;&amp;nbsp;no snmp trap link-status&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1.10&lt;BR /&gt;&amp;nbsp;description Clients&lt;BR /&gt;&amp;nbsp;encapsulation dot1Q 10&lt;BR /&gt;&amp;nbsp;ip address 10.10.0.1 255.255.255.0&lt;BR /&gt;&amp;nbsp;ip nat inside&lt;BR /&gt;&amp;nbsp;ip irdp&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly&lt;BR /&gt;&amp;nbsp;no snmp trap link-status&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1.15&lt;BR /&gt;&amp;nbsp;description Servers&lt;BR /&gt;&amp;nbsp;encapsulation dot1Q 15&lt;BR /&gt;&amp;nbsp;ip address 10.10.15.1 255.255.255.0&lt;BR /&gt;&amp;nbsp;ip nat inside&lt;BR /&gt;&amp;nbsp;ip irdp&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly&lt;BR /&gt;&amp;nbsp;no snmp trap link-status&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1.20&lt;BR /&gt;&amp;nbsp;description Backup&lt;BR /&gt;&amp;nbsp;encapsulation dot1Q 20&lt;BR /&gt;&amp;nbsp;ip address 10.10.20.1 255.255.255.0&lt;BR /&gt;&amp;nbsp;ip nat inside&lt;BR /&gt;&amp;nbsp;ip irdp&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly&lt;BR /&gt;&amp;nbsp;no snmp trap link-status&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1.25&lt;BR /&gt;&amp;nbsp;description Storage&lt;BR /&gt;&amp;nbsp;encapsulation dot1Q 25&lt;BR /&gt;&amp;nbsp;ip address 10.10.25.1 255.255.255.0&lt;BR /&gt;&amp;nbsp;ip nat inside&lt;BR /&gt;&amp;nbsp;ip irdp&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly&lt;BR /&gt;&amp;nbsp;no snmp trap link-status&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Async1&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;encapsulation slip&lt;BR /&gt;!&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 192.168.0.X&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ip http server&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;ip nat inside source list 50 interface FastEthernet0 overload&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended filter-inbond&lt;BR /&gt;&amp;nbsp;permit icmp any any echo-reply&lt;BR /&gt;&amp;nbsp;permit tcp any eq www any established&lt;BR /&gt;&amp;nbsp;permit tcp any eq 443 any established&lt;BR /&gt;&amp;nbsp;permit tcp any eq 8080 any established&lt;BR /&gt;&amp;nbsp;permit udp any eq domain any&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip any any&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; udp any any&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; tcp any any&lt;BR /&gt;ip access-list extended filter-outbond&lt;BR /&gt;&amp;nbsp;permit icmp any any echo&lt;BR /&gt;&amp;nbsp;permit udp any any eq domain&lt;BR /&gt;&amp;nbsp;permit tcp any any eq www&lt;BR /&gt;&amp;nbsp;permit tcp any any eq 443&lt;BR /&gt;&amp;nbsp;permit tcp any any eq 8080&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip any any&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; tcp any any&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; udp any any&lt;BR /&gt;!&lt;BR /&gt;access-list 40 permit 0.0.0.0 255.0.0.0&lt;BR /&gt;access-list 50 permit 0.0.0.0 255.0.0.0&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;from Switch arp table&lt;/P&gt;
&lt;P&gt;SW#sarp&lt;BR /&gt;Protocol&amp;nbsp; Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Age (min)&amp;nbsp; Hardware Addr&amp;nbsp;&amp;nbsp; Type&amp;nbsp;&amp;nbsp; Interface&lt;BR /&gt;&lt;STRONG&gt;Internet&amp;nbsp; 10.10.0.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 209&amp;nbsp;&amp;nbsp; 0026.cb6e.da17&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; Vlan10 &amp;lt;----- this is the gw for vlan10; but its pointing to the wrong mac address; (FW Mac 0026.cb6e.da17, its supposed to be my R1 mac address 001e.7aa1.8ca7)&lt;/STRONG&gt;&lt;BR /&gt;Internet&amp;nbsp; 10.10.0.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 130&amp;nbsp;&amp;nbsp; 0026.cb6e.da17&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; Vlan10&lt;BR /&gt;Internet&amp;nbsp; 10.10.0.3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -&amp;nbsp;&amp;nbsp; 0026.0a7c.01c2&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; Vlan10&lt;/P&gt;
&lt;P&gt;Internet&amp;nbsp; 10.85.85.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp; 001e.7aa1.8ca7&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; Vlan5&lt;BR /&gt;Internet&amp;nbsp; 10.85.85.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 139&amp;nbsp;&amp;nbsp; 0026.cb6e.da16&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; Vlan5&lt;BR /&gt;Internet&amp;nbsp; 10.85.85.3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -&amp;nbsp;&amp;nbsp; 0026.0a7c.01c1&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; Vlan5&lt;BR /&gt;Internet&amp;nbsp; 10.10.15.3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -&amp;nbsp;&amp;nbsp; 0026.0a7c.01c3&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; Vlan15&lt;BR /&gt;Internet&amp;nbsp; 10.10.20.3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -&amp;nbsp;&amp;nbsp; 0026.0a7c.01c4&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; Vlan20&lt;BR /&gt;Internet&amp;nbsp; 10.10.25.3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -&amp;nbsp;&amp;nbsp; 0026.0a7c.01c5&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; Vlan25&lt;/P&gt;
&lt;P&gt;My switch default gw is 10.85.85.1&lt;/P&gt;
&lt;P&gt;my R1 is connect directly to the switch on vlan5 on SW FA0/1&lt;/P&gt;
&lt;P&gt;Please see drawing for confirmation&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jul 2016 18:24:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877982#M156551</guid>
      <dc:creator>j_j624001</dc:creator>
      <dc:date>2016-07-04T18:24:33Z</dc:date>
    </item>
    <item>
      <title>Ok I understand. It would be</title>
      <link>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877983#M156552</link>
      <description>&lt;P&gt;Ok I understand. It would be better in this design to put your asa in transparent mode.&lt;/P&gt;
&lt;P&gt;I'm at work right now. I will paste a config example this evening&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jul 2016 18:36:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877983#M156552</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-07-04T18:36:27Z</dc:date>
    </item>
    <item>
      <title>Ok; thats fine; ill be up</title>
      <link>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877984#M156553</link>
      <description>&lt;P&gt;Ok; thats fine; ill be up here; i just want traffic to hit my firewall first before heading to my router; i never thought about transparent mode; but hopefully it will work so all traffic will pass thru the firewall first. Thanks for your help&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jul 2016 19:45:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877984#M156553</guid>
      <dc:creator>j_j624001</dc:creator>
      <dc:date>2016-07-04T19:45:06Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877985#M156554</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;as promise, here as a sample config with ASA as transparent. I've created acls with permit any any as it's a lab. You need to open everything to test and then build up your own acls.&lt;/P&gt;
&lt;P&gt;On my design ASA e0 is GigabitEthernet 0 and e1 is GigabitEthernet 1.&lt;/P&gt;
&lt;P&gt;I've attached all configs.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Another thing, be careful with inspect as you can have asymmetric traffic (e.g: If you try a ping from VLAN10 on my R2 design to VLAN20 on my R1 design, if you are doing icmp inspection, it will failed.) You can use tcp-bypass feature to eliminate the stateful. But this is config tweaks.&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/design_0.jpg" class="migrated-markup-image" /&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PS: Please don't forget to rate and mark as correct answer if this answered your question.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jul 2016 22:28:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877985#M156554</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-07-04T22:28:47Z</dc:date>
    </item>
    <item>
      <title>Hello;</title>
      <link>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877986#M156555</link>
      <description>&lt;P&gt;Hello;&lt;/P&gt;
&lt;P&gt;Thanks again for the response; what ill do is take my config and modify it to what you have in your previous response; and paste what i got; i want to make sure on what you requested is correct before i implemented this change&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So First is my router after it has been modified; does this look correct to you&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;Building configuration...&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;Current configuration : 4436 bytes&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;!&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;version 12.4&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;service timestamps debug datetime msec&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;service timestamps log datetime msec&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;no service password-encryption&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;!&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;hostname R1&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;!&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;boot-start-marker&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;boot-end-marker&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;!&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;no aaa new-model&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;resource policy&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; line-height: normal; tab-stops: .2in .4in .6in .8in 1.0in 1.2in 1.4in 1.6in 1.8in 2.0in 2.2in 2.4in 2.6in 2.8in 3.0in 3.2in 3.4in 3.6in 3.8in 4.0in 4.2in 4.4in 4.6in 4.8in 5.0in 5.2in 5.4in 5.6in 5.8in 6.0in 6.2in 6.4in; text-autospace: none;"&gt;&lt;SPAN style="font-family: 'Segoe Print';"&gt;memory-size iomem 5&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&lt;SPAN style="font-family: 'Segoe Print';"&gt;no ip icmp rate-limit unreachable&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;ip cef&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;no ip dhcp use vrf connected&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;ip dhcp excluded-address 10.10.0.1 10.10.0.84&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;ip dhcp excluded-address 10.10.0.101 10.10.0.255&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;ip dhcp excluded-address 10.10.20.1 10.10.20.84&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;ip dhcp excluded-address 10.10.20.101 10.10.20.255&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;ip dhcp excluded-address 10.10.25.101 10.10.25.255&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;ip dhcp excluded-address 10.10.25.1 10.10.25.84&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;!&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;ip dhcp pool 10_Net_POOL&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;&amp;nbsp; import all&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;&amp;nbsp; network 10.10.0.3 255.255.255.0&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;&amp;nbsp; update dns&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;&amp;nbsp; default-router 10.10.0.3&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;&amp;nbsp; domain-name J_Internal_Net.com&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;&amp;nbsp; dns-server 10.10.15.4 10.10.15.5&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;&amp;nbsp; update arp&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;!&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;ip dhcp pool 20_NET_POOL&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;&amp;nbsp; import all&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;&amp;nbsp; network 10.10.20.0 255.255.255.0&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;&amp;nbsp; update dns&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;&amp;nbsp; default-router 10.10.20.3&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;&amp;nbsp; domain-name Backup_Internal_Net.com&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;&amp;nbsp; dns-server 10.10.15.4 10.10.15.5&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;&amp;nbsp; update arp&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;!&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;ip dhcp pool 25_NET_POOL&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;&amp;nbsp; import all&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;&amp;nbsp; network 10.10.25.0 255.255.255.0&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;&amp;nbsp; update dns&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;&amp;nbsp; default-router 10.10.25.3&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;&amp;nbsp; domain-name Storage_Internal_Net.com&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;&amp;nbsp; dns-server 10.10.15.4 10.10.15.5&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;&amp;nbsp; update arp&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;!&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; line-height: normal; tab-stops: .2in .4in .6in .8in 1.0in 1.2in 1.4in 1.6in 1.8in 2.0in 2.2in 2.4in 2.6in 2.8in 3.0in 3.2in 3.4in 3.6in 3.8in 4.0in 4.2in 4.4in 4.6in 4.8in 5.0in 5.2in 5.4in 5.6in 5.8in 6.0in 6.2in 6.4in; text-autospace: none;"&gt;&lt;SPAN style="font-family: 'Segoe Print';"&gt;no ip domain lookup&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; line-height: normal; tab-stops: .2in .4in .6in .8in 1.0in 1.2in 1.4in 1.6in 1.8in 2.0in 2.2in 2.4in 2.6in 2.8in 3.0in 3.2in 3.4in 3.6in 3.8in 4.0in 4.2in 4.4in 4.6in 4.8in 5.0in 5.2in 5.4in 5.6in 5.8in 6.0in 6.2in 6.4in; text-autospace: none;"&gt;&lt;SPAN style="font-family: 'Segoe Print';"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; line-height: normal; tab-stops: .2in .4in .6in .8in 1.0in 1.2in 1.4in 1.6in 1.8in 2.0in 2.2in 2.4in 2.6in 2.8in 3.0in 3.2in 3.4in 3.6in 3.8in 4.0in 4.2in 4.4in 4.6in 4.8in 5.0in 5.2in 5.4in 5.6in 5.8in 6.0in 6.2in 6.4in; text-autospace: none;"&gt;&lt;SPAN style="font-family: 'Segoe Print';"&gt;ip tcp synwait-time 5&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; line-height: normal; tab-stops: .2in .4in .6in .8in 1.0in 1.2in 1.4in 1.6in 1.8in 2.0in 2.2in 2.4in 2.6in 2.8in 3.0in 3.2in 3.4in 3.6in 3.8in 4.0in 4.2in 4.4in 4.6in 4.8in 5.0in 5.2in 5.4in 5.6in 5.8in 6.0in 6.2in 6.4in; text-autospace: none;"&gt;&lt;SPAN style="font-family: 'Segoe Print';"&gt;multilink bundle-name authenticated&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;!&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;ip ssh logging events&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;ip ssh version 2&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;!&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; line-height: normal; tab-stops: .2in .4in .6in .8in 1.0in 1.2in 1.4in 1.6in 1.8in 2.0in 2.2in 2.4in 2.6in 2.8in 3.0in 3.2in 3.4in 3.6in 3.8in 4.0in 4.2in 4.4in 4.6in 4.8in 5.0in 5.2in 5.4in 5.6in 5.8in 6.0in 6.2in 6.4in; text-autospace: none;"&gt;&lt;SPAN style="font-family: 'Segoe Print';"&gt;archive&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; line-height: normal; tab-stops: .2in .4in .6in .8in 1.0in 1.2in 1.4in 1.6in 1.8in 2.0in 2.2in 2.4in 2.6in 2.8in 3.0in 3.2in 3.4in 3.6in 3.8in 4.0in 4.2in 4.4in 4.6in 4.8in 5.0in 5.2in 5.4in 5.6in 5.8in 6.0in 6.2in 6.4in; text-autospace: none;"&gt;&lt;SPAN style="font-family: 'Segoe Print';"&gt;&amp;nbsp;log config&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; line-height: normal; tab-stops: .2in .4in .6in .8in 1.0in 1.2in 1.4in 1.6in 1.8in 2.0in 2.2in 2.4in 2.6in 2.8in 3.0in 3.2in 3.4in 3.6in 3.8in 4.0in 4.2in 4.4in 4.6in 4.8in 5.0in 5.2in 5.4in 5.6in 5.8in 6.0in 6.2in 6.4in; text-autospace: none;"&gt;&lt;SPAN style="font-family: 'Segoe Print';"&gt;&amp;nbsp; hidekeys&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; line-height: normal; tab-stops: .2in .4in .6in .8in 1.0in 1.2in 1.4in 1.6in 1.8in 2.0in 2.2in 2.4in 2.6in 2.8in 3.0in 3.2in 3.4in 3.6in 3.8in 4.0in 4.2in 4.4in 4.6in 4.8in 5.0in 5.2in 5.4in 5.6in 5.8in 6.0in 6.2in 6.4in; text-autospace: none;"&gt;&lt;SPAN style="font-family: 'Segoe Print';"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; line-height: normal; tab-stops: .2in .4in .6in .8in 1.0in 1.2in 1.4in 1.6in 1.8in 2.0in 2.2in 2.4in 2.6in 2.8in 3.0in 3.2in 3.4in 3.6in 3.8in 4.0in 4.2in 4.4in 4.6in 4.8in 5.0in 5.2in 5.4in 5.6in 5.8in 6.0in 6.2in 6.4in; text-autospace: none;"&gt;&lt;SPAN style="font-family: 'Segoe Print';"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; line-height: normal; tab-stops: .2in .4in .6in .8in 1.0in 1.2in 1.4in 1.6in 1.8in 2.0in 2.2in 2.4in 2.6in 2.8in 3.0in 3.2in 3.4in 3.6in 3.8in 4.0in 4.2in 4.4in 4.6in 4.8in 5.0in 5.2in 5.4in 5.6in 5.8in 6.0in 6.2in 6.4in; text-autospace: none;"&gt;&lt;SPAN style="font-family: 'Segoe Print';"&gt;ip tcp synwait-time 5&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;!&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;!&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; line-height: normal; tab-stops: .2in .4in .6in .8in 1.0in 1.2in 1.4in 1.6in 1.8in 2.0in 2.2in 2.4in 2.6in 2.8in 3.0in 3.2in 3.4in 3.6in 3.8in 4.0in 4.2in 4.4in 4.6in 4.8in 5.0in 5.2in 5.4in 5.6in 5.8in 6.0in 6.2in 6.4in; text-autospace: none;"&gt;&lt;SPAN style="font-family: 'Segoe Print';"&gt;interface Loopback0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&lt;SPAN style="font-family: 'Segoe Print';"&gt;&amp;nbsp;ip address 8.8.8.8 255.255.255.255&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;!&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;interface FastEthernet0&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;description OUT&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;ip address 192.168.0.85 255.255.255.0&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;ip access-group filter-inbond in&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;ip access-group filter-outbond out&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;ip nat outside&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;ip irdp&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;ip virtual-reassembly&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;duplex auto&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;speed auto&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;!&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;interface FastEthernet1&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;description Internal&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;ip address 10.85.85.1 255.255.255.0&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;ip nat inside&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;ip irdp&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;ip virtual-reassembly&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;duplex auto&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;speed auto&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;no snmp trap link-status&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;!&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;interface FastEthernet1.10&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;description Clients&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;encapsulation dot1Q 10&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;ip address 10.10.0.1 255.255.255.0&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;ip nat inside&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;ip irdp&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;ip virtual-reassembly&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;no snmp trap link-status&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;!&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;interface FastEthernet1.15&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;description Servers&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;encapsulation dot1Q 15&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;ip address 10.10.15.1 255.255.255.0&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;ip nat inside&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;ip irdp&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;ip virtual-reassembly&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;no snmp trap link-status&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;!&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;interface FastEthernet1.20&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;description Backup&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;encapsulation dot1Q 20&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;ip address 10.10.20.1 255.255.255.0&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;ip nat inside&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;ip irdp&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;ip virtual-reassembly&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;no snmp trap link-status&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;!&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;interface FastEthernet1.25&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;description Storage&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;encapsulation dot1Q 25&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;ip address 10.10.25.1 255.255.255.0&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;ip nat inside&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;ip irdp&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;ip virtual-reassembly&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;no snmp trap link-status&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;!&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;interface Vlan1&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;no ip address&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;!&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;interface Async1&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;no ip address&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;encapsulation slip&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;!&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;ip route 0.0.0.0 0.0.0.0 192.168.0.X&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;!&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;!&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;no ip http server&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;no ip http secure-server&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;ip nat inside source list 50 interface FastEthernet0 overload&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&lt;SPAN style="font-family: 'Segoe Print';"&gt;no cdp log mismatch duplex&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;!&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;ip access-list extended filter-inbond&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;permit icmp any any echo-reply&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;permit tcp any eq www any established&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;permit tcp any eq 443 any established&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;permit tcp any eq 8080 any established&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;permit udp any eq domain any&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip any any&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; udp any any&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; tcp any any&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;ip access-list extended filter-outbond&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;permit icmp any any echo&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;permit udp any any eq domain&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;permit tcp any any eq www&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;permit tcp any any eq 443&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;permit tcp any any eq 8080&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip any any&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; tcp any any&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; udp any any&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;!&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;access-list 40 permit 0.0.0.90 255.255.255.0&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;access-list 40 permit 0.0.0.0 255.0.0.0&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;access-list 50 permit 10.10.0.0 0.0.255.255&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;access-list 50 permit 0.0.0.0 255.0.0.0&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;!&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;control-plane&lt;/P&gt;
&lt;P style="text-autospace: none;"&gt;!&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jul 2016 22:57:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877986#M156555</guid>
      <dc:creator>j_j624001</dc:creator>
      <dc:date>2016-07-04T22:57:51Z</dc:date>
    </item>
    <item>
      <title>Don't copy my router config</title>
      <link>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877987#M156556</link>
      <description>&lt;P&gt;Don't copy my router config (delete the loopback 0). I've past the config just to show the vlan id you need to use on both end devices: router and switch.&lt;/P&gt;
&lt;P&gt;the most important is the firewall. You need to convert it in transparent mode by using the command firewall transparent.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My router configs is just for example, don't copy anything from there. The goal is to show you that vlans id are different on both side.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jul 2016 23:23:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877987#M156556</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-07-04T23:23:47Z</dc:date>
    </item>
    <item>
      <title>Lmao; ok ok my fault no</title>
      <link>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877988#M156557</link>
      <description>&lt;P&gt;Lmao; ok ok my fault no worries; i see what you mean just need to focus on the firewall and switch when converting it an transparent mode.. whats the advantage of converting it transparent instead of route mode ???&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jul 2016 23:27:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877988#M156557</guid>
      <dc:creator>j_j624001</dc:creator>
      <dc:date>2016-07-04T23:27:55Z</dc:date>
    </item>
    <item>
      <title>You need to concentrate on</title>
      <link>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877989#M156558</link>
      <description>&lt;P&gt;You need to concentrate on configs and adapt it on your devices. Example: you will see that vlan 10 is used in inside but on outside (firewall + router) vlan id used is 110.&lt;/P&gt;
&lt;P&gt;For what you want to achieve with your design you need to it in transparent. If you move forward with routed, you need to change your design otherwise it will not work.&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PS: Please don't forget to rate and mark as correct answer&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jul 2016 23:34:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877989#M156558</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-07-04T23:34:10Z</dc:date>
    </item>
    <item>
      <title>ok; i see what you mean; i</title>
      <link>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877990#M156559</link>
      <description>&lt;P&gt;ok; i see what you mean; i will see what i can do when i get home&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for the help; if i have any ? or trouble i'll reply to the latest post in this discussion&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jul 2016 23:54:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877990#M156559</guid>
      <dc:creator>j_j624001</dc:creator>
      <dc:date>2016-07-04T23:54:25Z</dc:date>
    </item>
    <item>
      <title>Hello;</title>
      <link>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877991#M156560</link>
      <description>&lt;P&gt;Hello;&lt;/P&gt;
&lt;P&gt;I just implemented new config on firewall; can you take a look at my config; to make sure it correct or could be better; so far im reaching traffic from IN and Out; i haven't implemented any changes on the switch side.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Result of the command: "show run"&lt;BR /&gt;&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(3) &lt;BR /&gt;!&lt;BR /&gt;firewall transparent&lt;BR /&gt;hostname JFW&lt;BR /&gt;enable password hE3tTzx4XvGURupW encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;description OUT&lt;BR /&gt;&amp;nbsp;nameif OUT&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0.110&lt;BR /&gt;&amp;nbsp;description Client-Out&lt;BR /&gt;&amp;nbsp;vlan 110&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;&amp;nbsp;description IN&lt;BR /&gt;&amp;nbsp;nameif IN&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1.10&lt;BR /&gt;&amp;nbsp;description Client-In&lt;BR /&gt;&amp;nbsp;vlan 10&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;nameif Manage&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address dhcp &lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;access-list IN_access_in extended permit ip any any &lt;BR /&gt;access-list OUT_access_in extended permit ip any any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu OUT 1500&lt;BR /&gt;mtu IN 1500&lt;BR /&gt;mtu Manage 1500&lt;BR /&gt;no ip address&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;access-group OUT_access_in in interface OUT&lt;BR /&gt;access-group IN_access_in in interface IN&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication enable console LOCAL &lt;BR /&gt;aaa authentication http console LOCAL &lt;BR /&gt;aaa authentication serial console LOCAL &lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.0.0 255.255.255.0 Manage&lt;BR /&gt;http 10.10.0.0 255.255.255.0 IN&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection scanning-threat&lt;BR /&gt;threat-detection statistics host&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:943a1e5eeb36eac10dec9622669e5cf7&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jul 2016 00:44:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877991#M156560</guid>
      <dc:creator>j_j624001</dc:creator>
      <dc:date>2016-07-06T00:44:12Z</dc:date>
    </item>
    <item>
      <title>Hi </title>
      <link>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877992#M156561</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You set nameif on interface instead of subinterface.&lt;/P&gt;
&lt;P&gt;Your missing the bridge group and bvi interface.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And what about other vlans.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The config I've provided for asa is good. You can take it. Just access-list and maybe bvi IP needs to be adapted.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PS: Please don't forget to rate and mark as correct answer if this solved your issue&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jul 2016 01:55:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877992#M156561</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-07-06T01:55:08Z</dc:date>
    </item>
    <item>
      <title>Hello;</title>
      <link>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877993#M156562</link>
      <description>&lt;P&gt;Hello;&lt;/P&gt;
&lt;P&gt;From the gui i enter vlan 10 for IN and Vlan110 for Out it automatically set it as a subinterface along with my vlan id. For the bridge group method i don't have that feature from cli nor gui using ASA Version (8.2)(3) not sure if that matters but i look everywhere for bridge group nor bvi interface. So that method couldn't work. Im just using one Vlan for test before i start adding more config for the other vlans; gotta get one vlan running first lol.... I still haven't done anything on the switch nor router side yet; just working on this firewall at first... Plus in transparent i can't add ip address unless its an network object....&amp;nbsp; see screen shots&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jul 2016 02:18:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877993#M156562</guid>
      <dc:creator>j_j624001</dc:creator>
      <dc:date>2016-07-06T02:18:51Z</dc:date>
    </item>
    <item>
      <title>I don't remember equivalent</title>
      <link>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877994#M156563</link>
      <description>&lt;P&gt;I don't remember equivalent in old asa version. Let's continue in that way. I will try to downgrade a asa tomorrow evening if I have time and come back to you. Or if you want you can upgrade to newer version. Thanks PS: Please don't forget to rate and mark as correct answer if this solved your issue&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jul 2016 02:26:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877994#M156563</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-07-06T02:26:31Z</dc:date>
    </item>
    <item>
      <title>Hello;</title>
      <link>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877995#M156564</link>
      <description>&lt;P&gt;Hello;&lt;/P&gt;
&lt;P&gt;Ok; if you can downgrade a asa tom that would be awesome lol..... hopefully using my design lol.... seems like this is an ol asa firewall.. lol... But thanks again for the help; ill keep working on it&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jul 2016 02:36:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-vlan-inside-vlan-asa5510/m-p/2877995#M156564</guid>
      <dc:creator>j_j624001</dc:creator>
      <dc:date>2016-07-06T02:36:21Z</dc:date>
    </item>
  </channel>
</rss>

