<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5505 Inter-VLAN Problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-problem/m-p/2889500#M172288</link>
    <description>&lt;P&gt;I have an ASA 5505 with a Security license at a remote site connected via VPN.&amp;nbsp; VLAN 1 functions correctly.&amp;nbsp; In process, of deploying VoIP phones and some web based security cameras.&amp;nbsp; I have created the necessary VLANs and assigned them to interface 0/5 which is trunked to allowed VLANS inside1,voice20,video30; other interfaces are shutdown.&lt;/P&gt;
&lt;P&gt;inside&amp;nbsp;- VLAN1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Security level (100)&lt;/P&gt;
&lt;P&gt;VOICE - VLAN20&amp;nbsp;&amp;nbsp; Security level (90)&lt;/P&gt;
&lt;P&gt;VIDEO - VLAN30&amp;nbsp;&amp;nbsp; Security level (80)&lt;/P&gt;
&lt;P&gt;outside - VLAN2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Security level (0)&lt;/P&gt;
&lt;P&gt;The interfaces and VLANs are all "up" and I can ping each gateway&amp;nbsp;only from its own interface.&amp;nbsp; No inter VLAN access or internet access from VOICE or VIDEO interfaces?!&amp;nbsp; I cannot access the lower level VLANs from the inside VLAN1 (100).&amp;nbsp; I have already done this config on an ASA 5512 with sub-interfaces&amp;nbsp;and the security levels work perfectly.&amp;nbsp; On the ASA 5505, the security levels don't seem&amp;nbsp;to be&amp;nbsp;working...what am I missing??&amp;nbsp; Config is posted below:&amp;nbsp; Thx in advance!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;================================================================================&lt;/P&gt;
&lt;P&gt;Result of the command: "sh conf"&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;ASA Version 8.2(5) &lt;BR /&gt;!&lt;BR /&gt;hostname WH&lt;BR /&gt;&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;&amp;nbsp;switchport trunk allowed vlan 1,20,30&lt;BR /&gt;&amp;nbsp;switchport trunk native vlan 1&lt;BR /&gt;&amp;nbsp;switchport mode trunk&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;description Internal Gateway&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 172.16.13.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp;description External Gateway&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address x.x.x.x 255.255.255.240 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan20&lt;BR /&gt;&amp;nbsp;description VOICE Gateway&lt;BR /&gt;&amp;nbsp;nameif VOICE&lt;BR /&gt;&amp;nbsp;security-level 90&lt;BR /&gt;&amp;nbsp;ip address 172.16.23.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan30&lt;BR /&gt;&amp;nbsp;description VIDEO Gateway&lt;BR /&gt;&amp;nbsp;nameif VIDEO&lt;BR /&gt;&amp;nbsp;security-level 80&lt;BR /&gt;&amp;nbsp;ip address 172.16.33.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;access-list outside_1_cryptomap extended permit ip 172.16.13.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 172.16.13.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu VOICE 1500&lt;BR /&gt;mtu VIDEO 1500&lt;BR /&gt;ipv6 access-list VIDEO_access_ipv6_in deny ip any any &lt;BR /&gt;ipv6 access-list inside_access_ipv6_in deny ip any any &lt;BR /&gt;ipv6 access-list VOICE_access_ipv6_in deny ip any any &lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (VOICE) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;access-group inside_access_ipv6_in in interface inside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 x.x.x.x 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http 172.16.13.0 255.255.255.0 inside&lt;BR /&gt;http x.x.x.x 255.255.255.255 outside&lt;BR /&gt;http x.x.x.x 255.255.255.224 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 1 match address outside_1_cryptomap&lt;BR /&gt;crypto map outside_map 1 set pfs &lt;BR /&gt;crypto map outside_map 1 set peer x.x.x.x &lt;BR /&gt;crypto map outside_map 1 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 172.16.13.0 255.255.255.0 inside&lt;BR /&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;ssh 192.168.10.0 255.255.255.0 inside&lt;BR /&gt;ssh x.x.x.x 255.255.255.255 outside&lt;BR /&gt;ssh x.x.x.x 255.255.255.224 outside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;dhcpd address 172.16.13.10-172.16.13.15 inside&lt;BR /&gt;dhcpd dns&amp;nbsp;x.x.x.x x.x.x.x interface inside&lt;BR /&gt;dhcpd domain harcofittings.com interface inside&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server x.x.x.x source outside prefer&lt;BR /&gt;ntp server 192.168.1.21 source inside&lt;BR /&gt;webvpn&lt;BR /&gt;group-policy GroupPolicy1 internal&lt;BR /&gt;group-policy GroupPolicy1 attributes&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol IPSec &lt;BR /&gt;username admin password&amp;nbsp;.... encrypted privilege 15&lt;BR /&gt;username alieng password&amp;nbsp;.... encrypted privilege 15&lt;BR /&gt;tunnel-group&amp;nbsp;x.x.x.x type ipsec-l2l&lt;BR /&gt;tunnel-group&amp;nbsp;x.x.x.x ipsec-attributes&lt;BR /&gt;&amp;nbsp;pre-shared-key *&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:871248220b89f6a6d2e8143acdf9ead4&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 07:22:44 GMT</pubDate>
    <dc:creator>mrouton72</dc:creator>
    <dc:date>2019-03-12T07:22:44Z</dc:date>
    <item>
      <title>ASA 5505 Inter-VLAN Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-problem/m-p/2889500#M172288</link>
      <description>&lt;P&gt;I have an ASA 5505 with a Security license at a remote site connected via VPN.&amp;nbsp; VLAN 1 functions correctly.&amp;nbsp; In process, of deploying VoIP phones and some web based security cameras.&amp;nbsp; I have created the necessary VLANs and assigned them to interface 0/5 which is trunked to allowed VLANS inside1,voice20,video30; other interfaces are shutdown.&lt;/P&gt;
&lt;P&gt;inside&amp;nbsp;- VLAN1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Security level (100)&lt;/P&gt;
&lt;P&gt;VOICE - VLAN20&amp;nbsp;&amp;nbsp; Security level (90)&lt;/P&gt;
&lt;P&gt;VIDEO - VLAN30&amp;nbsp;&amp;nbsp; Security level (80)&lt;/P&gt;
&lt;P&gt;outside - VLAN2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Security level (0)&lt;/P&gt;
&lt;P&gt;The interfaces and VLANs are all "up" and I can ping each gateway&amp;nbsp;only from its own interface.&amp;nbsp; No inter VLAN access or internet access from VOICE or VIDEO interfaces?!&amp;nbsp; I cannot access the lower level VLANs from the inside VLAN1 (100).&amp;nbsp; I have already done this config on an ASA 5512 with sub-interfaces&amp;nbsp;and the security levels work perfectly.&amp;nbsp; On the ASA 5505, the security levels don't seem&amp;nbsp;to be&amp;nbsp;working...what am I missing??&amp;nbsp; Config is posted below:&amp;nbsp; Thx in advance!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;================================================================================&lt;/P&gt;
&lt;P&gt;Result of the command: "sh conf"&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;ASA Version 8.2(5) &lt;BR /&gt;!&lt;BR /&gt;hostname WH&lt;BR /&gt;&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;&amp;nbsp;switchport trunk allowed vlan 1,20,30&lt;BR /&gt;&amp;nbsp;switchport trunk native vlan 1&lt;BR /&gt;&amp;nbsp;switchport mode trunk&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;description Internal Gateway&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 172.16.13.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp;description External Gateway&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address x.x.x.x 255.255.255.240 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan20&lt;BR /&gt;&amp;nbsp;description VOICE Gateway&lt;BR /&gt;&amp;nbsp;nameif VOICE&lt;BR /&gt;&amp;nbsp;security-level 90&lt;BR /&gt;&amp;nbsp;ip address 172.16.23.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan30&lt;BR /&gt;&amp;nbsp;description VIDEO Gateway&lt;BR /&gt;&amp;nbsp;nameif VIDEO&lt;BR /&gt;&amp;nbsp;security-level 80&lt;BR /&gt;&amp;nbsp;ip address 172.16.33.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;access-list outside_1_cryptomap extended permit ip 172.16.13.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 172.16.13.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu VOICE 1500&lt;BR /&gt;mtu VIDEO 1500&lt;BR /&gt;ipv6 access-list VIDEO_access_ipv6_in deny ip any any &lt;BR /&gt;ipv6 access-list inside_access_ipv6_in deny ip any any &lt;BR /&gt;ipv6 access-list VOICE_access_ipv6_in deny ip any any &lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (VOICE) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;access-group inside_access_ipv6_in in interface inside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 x.x.x.x 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http 172.16.13.0 255.255.255.0 inside&lt;BR /&gt;http x.x.x.x 255.255.255.255 outside&lt;BR /&gt;http x.x.x.x 255.255.255.224 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 1 match address outside_1_cryptomap&lt;BR /&gt;crypto map outside_map 1 set pfs &lt;BR /&gt;crypto map outside_map 1 set peer x.x.x.x &lt;BR /&gt;crypto map outside_map 1 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 172.16.13.0 255.255.255.0 inside&lt;BR /&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;ssh 192.168.10.0 255.255.255.0 inside&lt;BR /&gt;ssh x.x.x.x 255.255.255.255 outside&lt;BR /&gt;ssh x.x.x.x 255.255.255.224 outside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;dhcpd address 172.16.13.10-172.16.13.15 inside&lt;BR /&gt;dhcpd dns&amp;nbsp;x.x.x.x x.x.x.x interface inside&lt;BR /&gt;dhcpd domain harcofittings.com interface inside&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server x.x.x.x source outside prefer&lt;BR /&gt;ntp server 192.168.1.21 source inside&lt;BR /&gt;webvpn&lt;BR /&gt;group-policy GroupPolicy1 internal&lt;BR /&gt;group-policy GroupPolicy1 attributes&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol IPSec &lt;BR /&gt;username admin password&amp;nbsp;.... encrypted privilege 15&lt;BR /&gt;username alieng password&amp;nbsp;.... encrypted privilege 15&lt;BR /&gt;tunnel-group&amp;nbsp;x.x.x.x type ipsec-l2l&lt;BR /&gt;tunnel-group&amp;nbsp;x.x.x.x ipsec-attributes&lt;BR /&gt;&amp;nbsp;pre-shared-key *&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:871248220b89f6a6d2e8143acdf9ead4&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:22:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-problem/m-p/2889500#M172288</guid>
      <dc:creator>mrouton72</dc:creator>
      <dc:date>2019-03-12T07:22:44Z</dc:date>
    </item>
    <item>
      <title>The code on the 5512-X does</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-problem/m-p/2889501#M172292</link>
      <description>&lt;P&gt;Most likely, the code you're running on&amp;nbsp;the 5512-X does not require NAT/NAT exemption between interfaces on the ASA which is probably why it works there.&lt;/P&gt;
&lt;P&gt;You are running 8.2(5) on a 5505 so you will need to NAT exempt the traffic from inside-&amp;gt;voice/video and voice/video-&amp;gt;inside.&lt;/P&gt;
&lt;P&gt;You can accomplish that using your existing nat 0 statement, plus adding a couple more. &amp;nbsp;Give the following a try:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;SPAN&gt;access-list inside_nat0_outbound extended permit ip 172.16.13.0 255.255.255.0 172.16.23.0 255.255.255.0&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;access-list inside_nat0_outbound extended permit ip 172.16.13.0 255.255.255.0 172.16.33.0 255.255.255.0&lt;BR /&gt;access-list VOICE_nat0_outbound extended permit ip 172.16.23.0 255.255.255.0 172.16.13.0 255.255.255.0&lt;BR /&gt;access-list VOICE_nat0_outbound extended permit ip 172.16.23.0 255.255.255.0 172.16.33.0 255.255.255.0&lt;BR /&gt;&lt;BR /&gt;access-list VIDEO_nat0_outbound extended permit ip 172.16.33.0 255.255.255.0 172.16.13.0 255.255.255.0&lt;BR /&gt;access-list VIDEO_nat0_outbound extended permit ip 172.16.33.0 255.255.255.0 172.16.23.0 255.255.255.0&lt;BR /&gt;&lt;BR /&gt;nat (VOICE) 0 access-list VOICE_nat0_outbound&lt;BR /&gt;nat (VIDEO) 0 access-list VIDEO_nat0_outbound&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 23 Feb 2016 00:26:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-problem/m-p/2889501#M172292</guid>
      <dc:creator>jj27</dc:creator>
      <dc:date>2016-02-23T00:26:07Z</dc:date>
    </item>
    <item>
      <title>Thank you for the quick</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-problem/m-p/2889502#M172294</link>
      <description>&lt;P&gt;Thank you for the quick response...but still no joy.&amp;nbsp; If I do a packet trace, it will always drop the packet on the default Implicit Deny rule for interface.&amp;nbsp; I have even added an Explicit Permit Any-Any rule for the interface to over ride it above the implicit Deny rule and it still drops on the implicit Deny rule...how is this possible??&lt;/P&gt;
&lt;P&gt;Also, I read about a few other people having this same problem and Cisco TAC told them to upgrade their firmware and that fixed the problem but I cannot officially confirm this...as I do not have SmartNet for this device.&amp;nbsp; Have you heard of any problems like this with the firmware?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Feb 2016 13:04:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-problem/m-p/2889502#M172294</guid>
      <dc:creator>mrouton72</dc:creator>
      <dc:date>2016-02-23T13:04:00Z</dc:date>
    </item>
    <item>
      <title>  Well, I have upgraded my</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-problem/m-p/2889503#M172296</link>
      <description>&lt;P&gt;&amp;nbsp; Well, I have upgraded my firmware from 8.2(5) to 9.2(4) to see if that would resolve my inter-VLAN issue...but no joy.&amp;nbsp; I had to do some cleanup after the upgrade, ended up deleting all of the NAT rules and new VLAN interfaces and starting over.&amp;nbsp; I added some Permit Any-Any rules to the interfaces just to get the functionality tested and operational.&amp;nbsp;All the VLANs are on the same physical interface (0/5) which is set to Trunk allowing VLANs 1,20,30 and set to Native 1.&amp;nbsp; I have&amp;nbsp;checked the "Enable traffic between two or more hosts connected to the same interface" option. I&amp;nbsp;currently, don't have any NAT rules setup between the VLANs.&amp;nbsp; I did try your rules but no joy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp; I am using some web based security cameras on the VIDEO VLAN30 to test my functionality.&amp;nbsp; My VIDEO VLAN does not need Internet access.&amp;nbsp; I just need the ability to access the VIDEO VLAN from the Inside VLAN which should be inherently provided via the Security Levels.&lt;/P&gt;
&lt;P&gt;&amp;nbsp; There is still&amp;nbsp;No inter-VLAN connectivity...and I cannot&amp;nbsp;ping the webcams from the VIDEO interface.&amp;nbsp;&amp;nbsp;I just don't understand why this is not working properly...&amp;nbsp;Any ideas??&amp;nbsp; (updated config is posted below).&amp;nbsp; Thanks in advance!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Result of the command: "sh conf"&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;ASA Version 9.2(4) &lt;BR /&gt;!&lt;BR /&gt;hostname ASA5505&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;&amp;nbsp;switchport trunk allowed vlan 1,20,30&lt;BR /&gt;&amp;nbsp;switchport trunk native vlan 1&lt;BR /&gt;&amp;nbsp;switchport mode trunk&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;description Internal Gateway&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 172.16.13.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp;description External Gateway&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address&amp;nbsp;x.x.x.x 255.255.255.240 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan20&lt;BR /&gt;&amp;nbsp;description VOICE Gateway&lt;BR /&gt;&amp;nbsp;nameif VOICE&lt;BR /&gt;&amp;nbsp;security-level 90&lt;BR /&gt;&amp;nbsp;ip address 172.16.23.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan30&lt;BR /&gt;&amp;nbsp;description VIDEO Gateway&lt;BR /&gt;&amp;nbsp;nameif VIDEO&lt;BR /&gt;&amp;nbsp;security-level 80&lt;BR /&gt;&amp;nbsp;ip address 172.16.33.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa924-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network obj_172.16.13.0_24&lt;BR /&gt;&amp;nbsp;subnet 172.16.13.0 255.255.255.0&lt;BR /&gt;object network obj_192.168.1.0_24&lt;BR /&gt;&amp;nbsp;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network obj_172.16.33.0_24&lt;BR /&gt;&amp;nbsp;subnet 172.16.33.0 255.255.255.0&lt;BR /&gt;access-list outside_1_cryptomap extended permit ip 172.16.13.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 172.16.13.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list VOICE_access_in extended permit ip any4 any4 &lt;BR /&gt;access-list VOICE_access_in extended deny ip any6 any6 &lt;BR /&gt;access-list VIDEO_access_in extended permit ip any4 any4 &lt;BR /&gt;access-list VIDEO_access_in extended deny ip any6 any6 &lt;BR /&gt;access-list outside_access_in extended deny ip any6 any6 &lt;BR /&gt;access-list inside_access_in extended permit ip any4 any4 &lt;BR /&gt;access-list inside_access_in extended deny ip any6 any6 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu VOICE 1500&lt;BR /&gt;mtu VIDEO 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-743.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,outside) source static obj_172.16.13.0_24 obj_172.16.13.0_24 destination static obj_192.168.1.0_24 obj_192.168.1.0_24 no-proxy-arp route-lookup description VA VPN&lt;BR /&gt;nat (inside,outside) source dynamic obj_172.16.13.0_24 interface description Internet Access&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group VOICE_access_in in interface VOICE&lt;BR /&gt;access-group VIDEO_access_in in interface VIDEO&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 x.x.x.x 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http 172.16.13.0 255.255.255.0 inside&lt;BR /&gt;http x.x.x.x 255.255.255.255 outside&lt;BR /&gt;http x.x.x.x 255.255.255.224 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto map outside_map 1 match address outside_1_cryptomap&lt;BR /&gt;crypto map outside_map 1 set pfs &lt;BR /&gt;crypto map outside_map 1 set peer 65.213.218.210 &lt;BR /&gt;crypto map outside_map 1 set ikev1 transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 172.16.13.0 255.255.255.0 inside&lt;BR /&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;ssh 192.168.10.0 255.255.255.0 inside&lt;BR /&gt;ssh x.x.x.x 255.255.255.255 outside&lt;BR /&gt;ssh x.x.x.x 255.255.255.224 outside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;/P&gt;
&lt;P&gt;dhcpd address 172.16.13.10-172.16.13.15 inside&lt;BR /&gt;dhcpd dns x.x.x.x&amp;nbsp;x.x.x.x interface inside&lt;BR /&gt;dhcpd domain harcofittings.com interface inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server x.x.x.x source outside prefer&lt;BR /&gt;ntp server 192.168.1.21 source inside&lt;BR /&gt;group-policy GroupPolicy1 internal&lt;BR /&gt;group-policy GroupPolicy1 attributes&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ikev1 &lt;BR /&gt;tunnel-group x.x.x.x type ipsec-l2l&lt;BR /&gt;tunnel-group x.x.x.x ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:cae4c8e16b67b1355edad8d62966af88&lt;/P&gt;</description>
      <pubDate>Wed, 24 Feb 2016 16:18:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-problem/m-p/2889503#M172296</guid>
      <dc:creator>mrouton72</dc:creator>
      <dc:date>2016-02-24T16:18:54Z</dc:date>
    </item>
    <item>
      <title>Good news!  I got it working!</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-problem/m-p/2889504#M172298</link>
      <description>&lt;P&gt;Good news!&amp;nbsp; I got it working!&amp;nbsp; The firmware upgrade was the overall fix but apparently when an upgrade is performed for 9.0 or above the xlate rules start blocking everything.&amp;nbsp; Had to run the "clear configure xlate" command.&amp;nbsp; No additional NAT rules required, the security levels seems to be working now.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Thank you for your assistance.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Feb 2016 19:21:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-problem/m-p/2889504#M172298</guid>
      <dc:creator>mrouton72</dc:creator>
      <dc:date>2016-02-24T19:21:46Z</dc:date>
    </item>
  </channel>
</rss>

