<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Richard, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-5505-unable-to-communicate-multiple-vlans/m-p/2806988#M160299</link>
    <description>&lt;P&gt;Hi Richard,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I wants to configure udp port forwarding range 36,000 to 59,000 in Cisco asa 5505 9.2(4) to allow outside access of Cisco jabber for my internal resources.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have already done static NAT in router but it's not possible to put list of commands in router so i decided to use ASA to use range command instead of manually adding.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Cisco router 2800 / 2900 doesn't support UDP port range command for port forwarding.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;please advise how i can setup this port range in ASA.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thank you a lot.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 28 Jan 2016 19:29:49 GMT</pubDate>
    <dc:creator>haider.rizwan</dc:creator>
    <dc:date>2016-01-28T19:29:49Z</dc:date>
    <item>
      <title>Cisco 5505 unable to communicate multiple VLANs</title>
      <link>https://community.cisco.com/t5/network-security/cisco-5505-unable-to-communicate-multiple-vlans/m-p/2806983#M160294</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have Cisco ASA 5505 and configured 2 VLANs connecting to Cisco 2960 on access ports. both VLANs are unable to communicate.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;where is the issue?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HAWK-ASA# show running-config &lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(5) &lt;BR /&gt;!&lt;BR /&gt;hostname HAWK-ASA&lt;BR /&gt;domain-name hsmea.com&lt;BR /&gt;enable password A4KROCQZQWlF.ct5 encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; description WAN OUTSIDE&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; description LAN INSIDE&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; description Servers-Vlan&lt;BR /&gt; switchport access vlan 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; description Voice Gateway 2811&lt;BR /&gt; switchport access vlan 10&lt;BR /&gt; shutdown&lt;BR /&gt;! &lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.254 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; description OUTSIDE INTERFACE PPPOE&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; pppoe client vpdn group hawksol&lt;BR /&gt; ip address pppoe setroute &lt;BR /&gt;!&lt;BR /&gt;interface Vlan10&lt;BR /&gt; no forward interface Vlan1&lt;BR /&gt; nameif DMZ&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.172.192.254 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone GST 4&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name hsmea.com&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group network HAWK_BURDUBAI_LAN&lt;BR /&gt; network-object 192.168.172.0 255.255.255.0&lt;BR /&gt;object-group network HAWK_HQ_LAN&lt;BR /&gt; network-object 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list HAWKSOL_VPN_TRAFFIC extended permit ip 192.168.172.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list NO-NAT-TRAFFIC extended permit ip 192.168.172.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list outside_access_in extended permit tcp any interface outside eq 3389 &lt;BR /&gt;access-list outside_access_in extended permit icmp any any &lt;BR /&gt;access-list LANtoDMZ extended permit ip 192.168.1.0 255.255.255.0 10.172.192.0 255.255.255.0 &lt;BR /&gt;access-list DMZtoLAN extended permit ip 10.172.192.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat-control&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list LANtoDMZ&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (DMZ) 0 access-list DMZtoLAN&lt;BR /&gt;static (inside,outside) tcp interface 3389 192.168.1.110 3389 netmask 255.255.255.255 &lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set MYSET esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map OUTSIDE_MAP 1 match address HAWKSOL_VPN_TRAFFIC&lt;BR /&gt;crypto map OUTSIDE_MAP 1 set pfs &lt;BR /&gt;crypto map OUTSIDE_MAP 1 set peer 86.96.28.55 &lt;BR /&gt;crypto map OUTSIDE_MAP 1 set transform-set MYSET&lt;BR /&gt;crypto map OUTSIDE_MAP interface outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;console timeout 0&lt;BR /&gt;vpdn group hawksol request dialout pppoe&lt;BR /&gt;vpdn group hawksol localname nh1304&lt;BR /&gt;vpdn group hawksol ppp authentication pap&lt;BR /&gt;vpdn username nh1304 password ***** &lt;BR /&gt;dhcpd dns 8.8.8.8&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;dhcpd option 150 ip 10.172.192.1&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.50-192.168.1.80 inside&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 128.138.141.172 source outside&lt;BR /&gt;webvpn&lt;BR /&gt;username admin password FSSr.BWCYVdYyR3l encrypted privilege 15&lt;BR /&gt;tunnel-group HAWKSOL-BURDUBAI-HQ-VPN type ipsec-l2l&lt;BR /&gt;tunnel-group HAWKSOL-BURDUBAI-HQ-VPN ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map &lt;BR /&gt; inspect ftp &lt;BR /&gt; inspect h323 h225 &lt;BR /&gt; inspect h323 ras &lt;BR /&gt; inspect rsh &lt;BR /&gt; inspect rtsp &lt;BR /&gt; inspect esmtp &lt;BR /&gt; inspect sqlnet &lt;BR /&gt; inspect skinny &lt;BR /&gt; inspect sunrpc &lt;BR /&gt; inspect xdmcp &lt;BR /&gt; inspect sip &lt;BR /&gt; inspect netbios &lt;BR /&gt; inspect tftp &lt;BR /&gt; inspect ip-options &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:65b036723a684ccb0d439bcc28133a01&lt;BR /&gt;: end&lt;BR /&gt;HAWK-ASA#&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:12:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-5505-unable-to-communicate-multiple-vlans/m-p/2806983#M160294</guid>
      <dc:creator>haider.rizwan</dc:creator>
      <dc:date>2019-03-12T07:12:09Z</dc:date>
    </item>
    <item>
      <title>Are the switch ports</title>
      <link>https://community.cisco.com/t5/network-security/cisco-5505-unable-to-communicate-multiple-vlans/m-p/2806984#M160295</link>
      <description>&lt;P&gt;Are the switch ports configured as access-ports? what is the show int ip brief on the firewall? I take it that the E0/0 and E0/2 connect to different switches?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Gareth&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jan 2016 15:32:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-5505-unable-to-communicate-multiple-vlans/m-p/2806984#M160295</guid>
      <dc:creator>gaowen</dc:creator>
      <dc:date>2016-01-28T15:32:16Z</dc:date>
    </item>
    <item>
      <title>The ASA5505 with the Base</title>
      <link>https://community.cisco.com/t5/network-security/cisco-5505-unable-to-communicate-multiple-vlans/m-p/2806985#M160296</link>
      <description>&lt;P&gt;The ASA5505 with the Base license has restrictions on the use of the third vlan, part of which is seen in this config command&lt;/P&gt;
&lt;P&gt;interface Vlan10&lt;BR /&gt; no forward interface Vlan1&lt;/P&gt;
&lt;P&gt;I believe this is why the Inside and the DMZ are not able to communicate. Using the Plus license removes the restriction on the third vlan but I am assuming that this ASA probably has the Base license.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Rick&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jan 2016 16:09:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-5505-unable-to-communicate-multiple-vlans/m-p/2806985#M160296</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2016-01-28T16:09:46Z</dc:date>
    </item>
    <item>
      <title>Hi, ASA is connected to same</title>
      <link>https://community.cisco.com/t5/network-security/cisco-5505-unable-to-communicate-multiple-vlans/m-p/2806986#M160297</link>
      <description>&lt;P&gt;Hi, ASA is connected to same switch but difference VLANs. I got it that third VLAN cannot communicate with other inside VLAN but third VLANs is also not going to internet.&lt;/P&gt;
&lt;P&gt;what can be the possible issue.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Also, i wants to setup UDP port range forwarding for Cisco Jabber MRA, can you please advise 36,000 to 59,999 UDP port configuration?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;current version of ASA is 8.2(5)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thank you a lot .&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jan 2016 16:27:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-5505-unable-to-communicate-multiple-vlans/m-p/2806986#M160297</guid>
      <dc:creator>haider.rizwan</dc:creator>
      <dc:date>2016-01-28T16:27:12Z</dc:date>
    </item>
    <item>
      <title>I believe that the reason why</title>
      <link>https://community.cisco.com/t5/network-security/cisco-5505-unable-to-communicate-multiple-vlans/m-p/2806987#M160298</link>
      <description>&lt;P&gt;I believe that the reason why the third vlan does not get to the Internet is that there is no NAT configured for it. The only NAT that I see for DMZ is the nat exemption that is configured (and it puzzles me why that nat exemption is configured since the Inside vlan and the DMZ vlan would not talk to each other).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am not clear what you want to&amp;nbsp;do about port forwarding. Can you clarify this?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Rick&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jan 2016 17:04:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-5505-unable-to-communicate-multiple-vlans/m-p/2806987#M160298</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2016-01-28T17:04:13Z</dc:date>
    </item>
    <item>
      <title>Hi Richard,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-5505-unable-to-communicate-multiple-vlans/m-p/2806988#M160299</link>
      <description>&lt;P&gt;Hi Richard,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I wants to configure udp port forwarding range 36,000 to 59,000 in Cisco asa 5505 9.2(4) to allow outside access of Cisco jabber for my internal resources.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have already done static NAT in router but it's not possible to put list of commands in router so i decided to use ASA to use range command instead of manually adding.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Cisco router 2800 / 2900 doesn't support UDP port range command for port forwarding.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;please advise how i can setup this port range in ASA.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thank you a lot.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jan 2016 19:29:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-5505-unable-to-communicate-multiple-vlans/m-p/2806988#M160299</guid>
      <dc:creator>haider.rizwan</dc:creator>
      <dc:date>2016-01-28T19:29:49Z</dc:date>
    </item>
    <item>
      <title>I believe this question was</title>
      <link>https://community.cisco.com/t5/network-security/cisco-5505-unable-to-communicate-multiple-vlans/m-p/2806989#M160300</link>
      <description>&lt;P&gt;I believe this question was asked and answered in this discussion&lt;/P&gt;
&lt;P&gt;https://supportforums.cisco.com/discussion/11508181/how-configure-nat-port-range-asa-5510&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Rick&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jan 2016 19:51:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-5505-unable-to-communicate-multiple-vlans/m-p/2806989#M160300</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2016-01-28T19:51:21Z</dc:date>
    </item>
    <item>
      <title>Hi Richard,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-5505-unable-to-communicate-multiple-vlans/m-p/2806990#M160301</link>
      <description>&lt;P&gt;Hi Richard,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;i followed the link but i have 2 questions.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;1. it's translating range of ports however, i just wanted to port forward&lt;/P&gt;
&lt;P&gt;2. second host which 10.2.2.2 i put WAN ip which ASA didn't accept.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;please help to fix the issue.&lt;/P&gt;
&lt;P&gt;"I wants to port forward UDP range (36,000 to 59,999)."&lt;/P&gt;
&lt;P&gt;internal IP: 192.168.1.207&lt;/P&gt;
&lt;P&gt;WAN IP: PPPoE ip address&lt;/P&gt;
&lt;P&gt;thank you a lot.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jan 2016 20:05:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-5505-unable-to-communicate-multiple-vlans/m-p/2806990#M160301</guid>
      <dc:creator>haider.rizwan</dc:creator>
      <dc:date>2016-01-28T20:05:37Z</dc:date>
    </item>
  </channel>
</rss>

