<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Can't get simple Inside/Outside Access Working on 5510 (VLANs) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/can-t-get-simple-inside-outside-access-working-on-5510-vlans/m-p/2751786#M184305</link>
    <description>&lt;P&gt;Having issues getting VLANs via trunk access to the outside on a 5510, configured via ADSM.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'll admit to a lack of extensive experience with the 5510 up front. &amp;nbsp;I tried configuring via ADSM but am not making much progress.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My configuration is simple: &amp;nbsp;Inside interface to wired network, Outside interface which is nat'd to a single public IP, and a second interface that has 2 VLANs trunked for wifi access. &amp;nbsp;Inside to outside works, although I see a lot of ACL messages on internal routers that lead me to believe that a lot more than I want is getting in. &amp;nbsp;But, the VLANs on the Wifi interface can't get to the outside. &amp;nbsp;The 5510 is the DHCP server for them, and lists itself as the gateway - that all works fine. &amp;nbsp;But no matter how many rules I tried creating in ADSM, no outside access. &amp;nbsp;Using Packet Trace just showed "Denied by rule" but that wasn't much help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All I want to do is give the 2 VLANS (201 and 202) http access to the outside interface, and that's it. &amp;nbsp;Can anyone point me to what I'm missing or doing wrong, please? &amp;nbsp;I'd also be interested to know why I'm seeing ACL deny messages from public IPs on my internal network. &amp;nbsp;Have I opened up too much inside-to-outside?&lt;/P&gt;&lt;P&gt;Thanks all.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here are the relevant lines from the config:&lt;/P&gt;&lt;P&gt;: Hardware: &amp;nbsp; ASA5510, 1024 MB RAM, CPU Pentium 4 Celeron 1599 MHz&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.1(6)&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 62.97.x.x 255.255.255.248&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 172.5.0.1 255.255.248.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;&amp;nbsp;nameif core-trunk&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2.201&lt;BR /&gt;&amp;nbsp;vlan 201&lt;BR /&gt;&amp;nbsp;nameif Wifi&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.0.3 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface Eternet0/2.202&lt;BR /&gt;&amp;nbsp;vlan 202&lt;BR /&gt;&amp;nbsp;nameif GuestWifi&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.100.3 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;object network ANY&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;access-list Wifi_access_in extended permit ip any any&amp;nbsp;&lt;BR /&gt;access-list GuestWifi_access_in extended permit ip any any&amp;nbsp;&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;icmp permit any management&lt;BR /&gt;icmp permit any core-trunk&lt;BR /&gt;asdm image disk0:/asdm-743.bin&lt;BR /&gt;nat (inside,outside) source static any interface&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group wifi_access_in in interface core-trunk&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 62.97.x.x 1&amp;nbsp;&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icm 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;hreat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 209.118.204.201 source outside&lt;BR /&gt;webvpn&lt;BR /&gt;&amp;nbsp;anyconnect-essentials&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns prest_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map inspection_policy&lt;BR /&gt;&amp;nbsp;class ipsecpssthru-traffic&lt;BR /&gt;&amp;nbsp; inspect ipsec-pass-thru&amp;nbsp;&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect ftp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect h323 h225&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect h323 ras&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect rsh&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect rtsp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect esmtp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sqlnet&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sunrpc&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect xdmcp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect netbios&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect tftp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect ip-options&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect http&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect icmp&amp;nbsp;&lt;BR /&gt;policy-map type inspect ipsec-pass-thru ipsecpasstru&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; esp per-client-max 10 timeout 0:00:30&amp;nbsp;&lt;BR /&gt;&amp;nbsp; ah per-client-max 10 timeout 0:00:30&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;service-policy inspection_policy interface outside&lt;BR /&gt;prompt hostname context&amp;nbsp;&lt;BR /&gt;: end&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 06:29:17 GMT</pubDate>
    <dc:creator>jwhitley1</dc:creator>
    <dc:date>2019-03-12T06:29:17Z</dc:date>
    <item>
      <title>Can't get simple Inside/Outside Access Working on 5510 (VLANs)</title>
      <link>https://community.cisco.com/t5/network-security/can-t-get-simple-inside-outside-access-working-on-5510-vlans/m-p/2751786#M184305</link>
      <description>&lt;P&gt;Having issues getting VLANs via trunk access to the outside on a 5510, configured via ADSM.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'll admit to a lack of extensive experience with the 5510 up front. &amp;nbsp;I tried configuring via ADSM but am not making much progress.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My configuration is simple: &amp;nbsp;Inside interface to wired network, Outside interface which is nat'd to a single public IP, and a second interface that has 2 VLANs trunked for wifi access. &amp;nbsp;Inside to outside works, although I see a lot of ACL messages on internal routers that lead me to believe that a lot more than I want is getting in. &amp;nbsp;But, the VLANs on the Wifi interface can't get to the outside. &amp;nbsp;The 5510 is the DHCP server for them, and lists itself as the gateway - that all works fine. &amp;nbsp;But no matter how many rules I tried creating in ADSM, no outside access. &amp;nbsp;Using Packet Trace just showed "Denied by rule" but that wasn't much help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All I want to do is give the 2 VLANS (201 and 202) http access to the outside interface, and that's it. &amp;nbsp;Can anyone point me to what I'm missing or doing wrong, please? &amp;nbsp;I'd also be interested to know why I'm seeing ACL deny messages from public IPs on my internal network. &amp;nbsp;Have I opened up too much inside-to-outside?&lt;/P&gt;&lt;P&gt;Thanks all.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here are the relevant lines from the config:&lt;/P&gt;&lt;P&gt;: Hardware: &amp;nbsp; ASA5510, 1024 MB RAM, CPU Pentium 4 Celeron 1599 MHz&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.1(6)&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 62.97.x.x 255.255.255.248&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 172.5.0.1 255.255.248.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;&amp;nbsp;nameif core-trunk&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2.201&lt;BR /&gt;&amp;nbsp;vlan 201&lt;BR /&gt;&amp;nbsp;nameif Wifi&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.0.3 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface Eternet0/2.202&lt;BR /&gt;&amp;nbsp;vlan 202&lt;BR /&gt;&amp;nbsp;nameif GuestWifi&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.100.3 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;object network ANY&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;access-list Wifi_access_in extended permit ip any any&amp;nbsp;&lt;BR /&gt;access-list GuestWifi_access_in extended permit ip any any&amp;nbsp;&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;icmp permit any management&lt;BR /&gt;icmp permit any core-trunk&lt;BR /&gt;asdm image disk0:/asdm-743.bin&lt;BR /&gt;nat (inside,outside) source static any interface&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group wifi_access_in in interface core-trunk&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 62.97.x.x 1&amp;nbsp;&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icm 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;hreat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 209.118.204.201 source outside&lt;BR /&gt;webvpn&lt;BR /&gt;&amp;nbsp;anyconnect-essentials&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns prest_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map inspection_policy&lt;BR /&gt;&amp;nbsp;class ipsecpssthru-traffic&lt;BR /&gt;&amp;nbsp; inspect ipsec-pass-thru&amp;nbsp;&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect ftp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect h323 h225&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect h323 ras&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect rsh&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect rtsp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect esmtp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sqlnet&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sunrpc&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect xdmcp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect netbios&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect tftp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect ip-options&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect http&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect icmp&amp;nbsp;&lt;BR /&gt;policy-map type inspect ipsec-pass-thru ipsecpasstru&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; esp per-client-max 10 timeout 0:00:30&amp;nbsp;&lt;BR /&gt;&amp;nbsp; ah per-client-max 10 timeout 0:00:30&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;service-policy inspection_policy interface outside&lt;BR /&gt;prompt hostname context&amp;nbsp;&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:29:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-get-simple-inside-outside-access-working-on-5510-vlans/m-p/2751786#M184305</guid>
      <dc:creator>jwhitley1</dc:creator>
      <dc:date>2019-03-12T06:29:17Z</dc:date>
    </item>
    <item>
      <title>First thing i would do is</title>
      <link>https://community.cisco.com/t5/network-security/can-t-get-simple-inside-outside-access-working-on-5510-vlans/m-p/2751787#M184307</link>
      <description>&lt;P&gt;First thing i would do is create another NAT rule for wifi and guestwifi. I can only see a single NAT entry for inside to outside. Another thing is to increase the security levels of your subinterfaces to something higher than 0. perhaps 50&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let us know if this solves your issue.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2015 14:39:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-get-simple-inside-outside-access-working-on-5510-vlans/m-p/2751787#M184307</guid>
      <dc:creator>Robert Hillcoat</dc:creator>
      <dc:date>2015-08-24T14:39:50Z</dc:date>
    </item>
    <item>
      <title>Can you make the following</title>
      <link>https://community.cisco.com/t5/network-security/can-t-get-simple-inside-outside-access-working-on-5510-vlans/m-p/2751788#M184309</link>
      <description>&lt;P&gt;Can you make the following changes -&lt;/P&gt;&lt;P&gt;1) change the security level for wireless interfaces to be greater than outside interface and lower than inside interface.&lt;/P&gt;&lt;P&gt;2) replace -&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static any interface&lt;/P&gt;&lt;P&gt;with this -&lt;/P&gt;&lt;P&gt;nat (any,outside) after-auto source dynamic any interface&lt;/P&gt;&lt;P&gt;then do a "clear xlate" and retest.&lt;/P&gt;&lt;P&gt;Edit - sorry Robert, didn't see you reply.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2015 14:48:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-get-simple-inside-outside-access-working-on-5510-vlans/m-p/2751788#M184309</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-08-24T14:48:51Z</dc:date>
    </item>
  </channel>
</rss>

