<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hello Aaron, what is your in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5506-need-help-routing-traffic-between-sub-interfaces/m-p/2814357#M174218</link>
    <description>&lt;P&gt;Hello Aaron, what is your particular need with the use of subinterfaces? I may be able to assist you.&lt;/P&gt;</description>
    <pubDate>Mon, 15 Aug 2016 18:37:12 GMT</pubDate>
    <dc:creator>Sergio Ceron Ramirez</dc:creator>
    <dc:date>2016-08-15T18:37:12Z</dc:date>
    <item>
      <title>ASA 5506 - Need help routing traffic between sub interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-need-help-routing-traffic-between-sub-interfaces/m-p/2814352#M174213</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Need assistance with routing network between sub interface on the ASA.&amp;nbsp; Right now, all my devices are in the infrastructure subnet (192.168.100.0/24) b/c i can't figure out how to get the ASA to route traffic between the vlan's on the sub interface.&amp;nbsp; Looking for some asssistance.&lt;/P&gt;
&lt;P&gt;The ASA is connected via a 802.1q trunk on Gig 1/2 to my switch.&amp;nbsp; The ASA is the default gateway for all the VLAN's.&amp;nbsp; I want to allow traffic all traffic between networks 192.168.100.0/24 -&amp;nbsp; 192.168.130.0/24.&amp;nbsp; The guest netwok in (192.168.190.0/24),&amp;nbsp; i only want to allow DHCP/DNS to 192.168.100.10.&amp;nbsp; I could continue to use the ASA for DHCP/DNS for just the Guest network but my goal is to create a single point of administration from a DHCP/DNS perspective.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Eventually i would like to move my DHCP server to the Server network (192.168.110.0) if I can finally get traffic allowed between the various networks.&amp;nbsp; Can anyone please provide the commands to make this happen???&lt;/P&gt;
&lt;P&gt;Below is my ASA config.&amp;nbsp; I can post the switch config if needed but it's just a 802.1q trunk allowing all VLAN's.&amp;nbsp; I have created SVI's for each network on the switch (192.168.x.4) and a layer 2 vlan for each network. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;: Serial Number: &amp;lt;removed&amp;gt;&lt;BR /&gt;: Hardware:&amp;nbsp;&amp;nbsp; ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.3(2)2 &lt;BR /&gt;!&lt;BR /&gt;hostname &amp;lt;removed&amp;gt;&lt;BR /&gt;enable password &amp;lt;removed&amp;gt; encrypted&lt;BR /&gt;names&lt;BR /&gt;ip local pool vpn 192.168.1.200-192.168.1.220 mask 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address dhcp setroute &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;&amp;nbsp;description LAN Connection&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2.100&lt;BR /&gt;&amp;nbsp;description infrastructure&lt;BR /&gt;&amp;nbsp;vlan 100&lt;BR /&gt;&amp;nbsp;nameif infrastructure&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.100.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2.110&lt;BR /&gt;&amp;nbsp;description server&lt;BR /&gt;&amp;nbsp;vlan 110&lt;BR /&gt;&amp;nbsp;nameif server&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.110.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2.120&lt;BR /&gt;&amp;nbsp;description clients&lt;BR /&gt;&amp;nbsp;vlan 120&lt;BR /&gt;&amp;nbsp;nameif clients&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.120.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2.130&lt;BR /&gt;&amp;nbsp;description vpn&lt;BR /&gt;&amp;nbsp;vlan 130&lt;BR /&gt;&amp;nbsp;nameif vpn&lt;BR /&gt;&amp;nbsp;security-level 90&lt;BR /&gt;&amp;nbsp;ip address 192.168.130.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2.190&lt;BR /&gt;&amp;nbsp;description guest&lt;BR /&gt;&amp;nbsp;vlan 190&lt;BR /&gt;&amp;nbsp;nameif Guest&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.190.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa932-2-lfbff-k8.SPA&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network INSIDE_HOST&lt;BR /&gt;&amp;nbsp;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network &amp;lt;removed&amp;gt;&lt;BR /&gt;&amp;nbsp;subnet 198.200.139.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;description &amp;lt;removed&amp;gt;&lt;BR /&gt;object network infrastructure&lt;BR /&gt;&amp;nbsp;subnet 192.168.100.0 255.255.255.0&lt;BR /&gt;object network clients&lt;BR /&gt;&amp;nbsp;subnet 192.168.120.0 255.255.255.0&lt;BR /&gt;object network vpn&lt;BR /&gt;&amp;nbsp;subnet 192.168.130.0 255.255.255.0&lt;BR /&gt;object network Guest&lt;BR /&gt;&amp;nbsp;subnet 192.168.190.0 255.255.255.0&lt;BR /&gt;object network server&lt;BR /&gt;&amp;nbsp;subnet 192.168.110.0 255.255.255.0&lt;BR /&gt;access-list outside_access_in remark all connections for IP phone&lt;BR /&gt;access-list outside_access_in extended permit ip object &amp;lt;removed&amp;gt; 192.168.1.0 255.255.255.0 &lt;BR /&gt;no pager&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu infrastructure 1500&lt;BR /&gt;mtu server 1500&lt;BR /&gt;mtu clients 1500&lt;BR /&gt;mtu Guest 1500&lt;BR /&gt;mtu vpn 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network infrastructure&lt;BR /&gt;&amp;nbsp;nat (infrastructure,outside) dynamic interface&lt;BR /&gt;object network clients&lt;BR /&gt;&amp;nbsp;nat (clients,outside) dynamic interface&lt;BR /&gt;object network Guest&lt;BR /&gt;&amp;nbsp;nat (Guest,outside) dynamic interface&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.100.0 255.255.255.0 infrastructure&lt;BR /&gt;http 192.168.110.0 255.255.255.0 server&lt;BR /&gt;http 192.168.120.0 255.255.255.0 clients&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server community *****&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt;&amp;nbsp;protocol esp encryption aes-256&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt;&amp;nbsp;protocol esp encryption aes-192&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt;&amp;nbsp;protocol esp encryption aes&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt;&amp;nbsp;protocol esp encryption 3des&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt;&amp;nbsp;protocol esp encryption des&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;&amp;nbsp;no validation-usage&lt;BR /&gt;&amp;nbsp;crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_Launcher_Access_TrustPoint_0&lt;BR /&gt;&amp;nbsp;enrollment self&lt;BR /&gt;&amp;nbsp;subject-name CN=&amp;lt;removed&amp;gt;,CN=&amp;lt;removed&amp;gt;&lt;BR /&gt;&amp;nbsp;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca certificate chain _SmartCallHome_ServerCA&lt;BR /&gt;&amp;nbsp;certificate &amp;lt;removed&amp;gt;&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;crypto ca certificate chain ASDM_Launcher_Access_TrustPoint_0&lt;BR /&gt;&amp;nbsp;certificate 8&amp;lt;removed&amp;gt;&lt;BR /&gt;&amp;nbsp;quit&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt;&amp;nbsp;encryption aes-192&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 20&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 30&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 40&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 enable outside&lt;BR /&gt;crypto ikev2 remote-access trustpoint ASDM_Launcher_Access_TrustPoint_0&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;no ssh stricthostkeycheck&lt;BR /&gt;ssh 192.168.100.0 255.255.255.0 infrastructure&lt;BR /&gt;ssh 192.168.110.0 255.255.255.0 server&lt;BR /&gt;ssh 192.168.120.0 255.255.255.0 clients&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd dns 8.8.8.8 8.8.4.4&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.100.50-192.168.100.150 infrastructure&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.110.50-192.168.110.150 server&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.120.50-192.168.120.150 clients&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.190.50-192.168.190.150 Guest&lt;BR /&gt;dhcpd enable Guest&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.130.50-192.168.130.150 vpn&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ssl trust-point ASDM_Launcher_Access_TrustPoint_0 infrastructure vpnlb-ip&lt;BR /&gt;ssl trust-point ASDM_Launcher_Access_TrustPoint_0 outside&lt;BR /&gt;webvpn&lt;BR /&gt;&amp;nbsp;enable outside&lt;BR /&gt;&amp;nbsp;anyconnect image disk0:/anyconnect-macosx-i386-4.1.02011-k9.pkg 1&lt;BR /&gt;&amp;nbsp;anyconnect profiles &amp;lt;removed&amp;gt;&lt;BR /&gt;&amp;nbsp;anyconnect enable&lt;BR /&gt;&amp;nbsp;tunnel-group-list enable&lt;BR /&gt;&amp;nbsp;error-recovery disable&lt;BR /&gt;group-policy &amp;lt;removed&amp;gt;&lt;BR /&gt;group-policy &amp;lt;removed&amp;gt;&lt;BR /&gt;&amp;nbsp;wins-server none&lt;BR /&gt;&amp;nbsp;dns-server value 8.8.8.8 8.8.4.4&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ikev2 ssl-client ssl-clientless&lt;BR /&gt;&amp;nbsp;default-domain none&lt;BR /&gt;&amp;nbsp;webvpn&lt;BR /&gt;&amp;nbsp; anyconnect profiles value &amp;lt;removed&amp;gt; type user&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username &amp;lt;removed&amp;gt; password &amp;lt;removed&amp;gt; encrypted privilege 15&lt;BR /&gt;tunnel-group &amp;lt;removed&amp;gt; type remote-access&lt;BR /&gt;tunnel-group &amp;lt;removed&amp;gt; general-attributes&lt;BR /&gt;&amp;nbsp;address-pool vpn&lt;BR /&gt;&amp;nbsp;default-group-policy &amp;lt;removed&amp;gt;&lt;BR /&gt;tunnel-group &amp;lt;removed&amp;gt; webvpn-attributes&lt;BR /&gt;&amp;nbsp;group-alias &amp;lt;removed&amp;gt; enable&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; sfr fail-open&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:&amp;lt;removed&amp;gt;&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 00:57:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-need-help-routing-traffic-between-sub-interfaces/m-p/2814352#M174213</guid>
      <dc:creator>Gary Culler</dc:creator>
      <dc:date>2019-03-26T00:57:37Z</dc:date>
    </item>
    <item>
      <title>Everything looks OK. For the</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-need-help-routing-traffic-between-sub-interfaces/m-p/2814353#M174214</link>
      <description>&lt;P&gt;Everything looks OK. For the DHCP of the guests you can add an ACL to permit bootp and dns and apply it inbound on the guest interface.&lt;/P&gt;
&lt;P&gt;enable DHCP relay.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color: black; font-style: normal;"&gt;dhcprelay server&lt;/SPAN&gt; &amp;lt;IP of Server&amp;gt; &amp;lt;interface name where server is&amp;gt;&lt;/STRONG&gt;&lt;SPAN style="color: black; font-style: normal; font-weight: normal;"&gt; &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;dhcprelay enable Guest&lt;SPAN style="color: black; font-style: normal; font-weight: normal;"&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;I browsed through it very quickly, and the rest of your config looks ok. Just a question............ what is the purpose of the VPN interface?&lt;/P&gt;</description>
      <pubDate>Tue, 08 Dec 2015 11:45:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-need-help-routing-traffic-between-sub-interfaces/m-p/2814353#M174214</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-12-08T11:45:29Z</dc:date>
    </item>
    <item>
      <title>Hey Andre,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-need-help-routing-traffic-between-sub-interfaces/m-p/2814354#M174215</link>
      <description>&lt;P&gt;Hey Andre,&lt;/P&gt;
&lt;P&gt;Routing between networks in the sub interfaces is not working&lt;/P&gt;
&lt;P&gt;I tried these commands &amp;amp; it's working somewhat but not everything.&amp;nbsp; Ping between all subnets is working but i can't SSH or HTTPS to my devices on different subnets for reason.. but I can RDP from a device in the client subnet to a device in the server subnet...???&amp;nbsp; but that same device in the client subnet cant' SSH or HTTPS to the WLC in the server subnet??? it's really odd. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object network obj_nat_infrastructure&lt;BR /&gt;&amp;nbsp;subnet 192.168.100.0 255.255.255.0&lt;BR /&gt;object network obj_nat_server&lt;BR /&gt;&amp;nbsp;subnet 192.168.110.0 255.255.255.0&lt;BR /&gt;object network obj_nat_clients&lt;BR /&gt;&amp;nbsp;subnet 192.168.120.0 255.255.255.0&lt;BR /&gt;object network obj_nat_vpn&lt;BR /&gt;&amp;nbsp;subnet 192.168.130.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;nat (infrastructure,server) source static obj_nat_infrastructure obj_nat_infrastructure&lt;BR /&gt;nat (infrastructure,clients) source static obj_nat_infrastructure obj_nat_infrastructure&lt;BR /&gt;nat (infrastructure,vpn) source static obj_nat_infrastructure obj_nat_infrastructure&lt;BR /&gt;nat (clients,infrastructure) source static obj_nat_clients obj_nat_clients&lt;BR /&gt;nat (clients,server) source static obj_nat_clients obj_nat_clients&lt;BR /&gt;nat (clients,vpn) source static obj_nat_clients obj_nat_clients&lt;BR /&gt;nat (vpn,infrastructure) source static obj_nat_vpn obj_nat_vpn&lt;BR /&gt;nat (vpn,server) source static obj_nat_vpn obj_nat_vpn&lt;BR /&gt;nat (vpn,clients) source static obj_nat_vpn obj_nat_vpn&lt;BR /&gt;nat (server,infrastructure) source static obj_nat_server obj_nat_server&lt;BR /&gt;nat (server,clients) source static obj_nat_server obj_nat_server&lt;BR /&gt;nat (server,vpn) source static obj_nat_server obj_nat_server&lt;BR /&gt;!&lt;/P&gt;</description>
      <pubDate>Thu, 10 Dec 2015 05:16:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-need-help-routing-traffic-between-sub-interfaces/m-p/2814354#M174215</guid>
      <dc:creator>Gary Culler</dc:creator>
      <dc:date>2015-12-10T05:16:25Z</dc:date>
    </item>
    <item>
      <title>Is there a reason why you</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-need-help-routing-traffic-between-sub-interfaces/m-p/2814355#M174216</link>
      <description>&lt;P&gt;Is there a reason why you have NAT rules between your client, infrastructure and server vlans? You don't need to NAT between them, and it's probably better if you don't.&lt;/P&gt;
&lt;P&gt;Remove the NAT rules between those interfaces, then test again.&lt;/P&gt;
&lt;P&gt;Do you have communication between your DHCP/DNS and the guests?&lt;/P&gt;</description>
      <pubDate>Thu, 10 Dec 2015 08:41:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-need-help-routing-traffic-between-sub-interfaces/m-p/2814355#M174216</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-12-10T08:41:37Z</dc:date>
    </item>
    <item>
      <title>Gary-</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-need-help-routing-traffic-between-sub-interfaces/m-p/2814356#M174217</link>
      <description>&lt;P&gt;Gary-&lt;/P&gt;
&lt;P&gt;Did you ever get this solved. We have a couple dozen ASA5506's deployed and the need has come up for using subinterfaces. I'm curious if you were able to get this working properly.&lt;/P&gt;
&lt;P&gt;Unfortunately, there isn't a lot of real-world documentation / forum examples of these kinds of things on the 5506 platform.&lt;/P&gt;</description>
      <pubDate>Sun, 14 Aug 2016 17:38:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-need-help-routing-traffic-between-sub-interfaces/m-p/2814356#M174217</guid>
      <dc:creator>Aaron Ekinaka</dc:creator>
      <dc:date>2016-08-14T17:38:33Z</dc:date>
    </item>
    <item>
      <title>Hello Aaron, what is your</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-need-help-routing-traffic-between-sub-interfaces/m-p/2814357#M174218</link>
      <description>&lt;P&gt;Hello Aaron, what is your particular need with the use of subinterfaces? I may be able to assist you.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Aug 2016 18:37:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-need-help-routing-traffic-between-sub-interfaces/m-p/2814357#M174218</guid>
      <dc:creator>Sergio Ceron Ramirez</dc:creator>
      <dc:date>2016-08-15T18:37:12Z</dc:date>
    </item>
  </channel>
</rss>

