<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Which license do you have for in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/getting-vlans-to-communicate/m-p/2617144#M195791</link>
    <description>&lt;P&gt;Which license do you have for the ASA5505? Issue the show version command and you should see it towards the bottom of the output.&amp;nbsp; If the outage wiped your ASA completely then it might have also cleared the installed license.&amp;nbsp; You need a security plus license to be able to have more than 2 VLANs communicating with eachother.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remembner to select a correct answer and rate helpful posts&lt;/P&gt;</description>
    <pubDate>Mon, 23 Mar 2015 21:45:14 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2015-03-23T21:45:14Z</dc:date>
    <item>
      <title>Getting vlans to communicate.</title>
      <link>https://community.cisco.com/t5/network-security/getting-vlans-to-communicate/m-p/2617142#M195789</link>
      <description>&lt;P&gt;First i would like to state that I have zero experience with the asa 5505 but I am a fast learner. We recently experienced a power surge that wiped our asa 5505 completely.&amp;nbsp;We have since reloaded the software and created a fresh configuration file using a putty output file we had. the network consists of four vlans (vlan1 inside, vlan 2 outside, vlan 4 ATT, vlan 201 PLC). My issue is that vlan 4 and vlan 201 will not communicate with each other. I have used the packet-tracer command and it doesn't show a drop. I have also tried pinging from vlan 201 to vlan 4 and vice a versa. Any guidance would be much appreciated.&lt;/P&gt;&lt;P&gt;My running configuration is as follows:&lt;/P&gt;&lt;P&gt;sho run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(1)&lt;BR /&gt;!&lt;BR /&gt;hostname SCADAFirewall&lt;BR /&gt;domain-name scadanet.local&lt;BR /&gt;enable password 0s8uhgiYA16dXSsN encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;name 198.100.147.0 inside-network147&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 198.100.146.199 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 12.48.31.26 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface Vlan4&lt;BR /&gt;&amp;nbsp;nameif ATT&lt;BR /&gt;&amp;nbsp;security-level 10&lt;BR /&gt;&amp;nbsp;ip address 192.168.199.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan201&lt;BR /&gt;&amp;nbsp;nameif PLC&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 10.11.12.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;&amp;nbsp;no shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;&amp;nbsp;no shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;&amp;nbsp;switchport access vlan 4&lt;BR /&gt;&amp;nbsp;no shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;&amp;nbsp;switchport access vlan 201&lt;BR /&gt;&amp;nbsp;no shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;&amp;nbsp;no shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;&amp;nbsp;no shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;&amp;nbsp;no shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;&amp;nbsp;switchport access vlan 3&lt;BR /&gt;&amp;nbsp;no shutdown&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa821-k8.bin&lt;BR /&gt;no ftp mode passive&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;name-server 12.127.16.67&lt;BR /&gt;&amp;nbsp;domain-name scadanet.local&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;access-list inside_access_in extended permit ip host 198.100.146.154 any&lt;BR /&gt;access-list inside_access_in extended permit ip host 198.100.146.177 any&lt;BR /&gt;access-list inside_access_in extended permit ip host 198.100.146.153 any&lt;BR /&gt;access-list inside_access_in remark Temp access list to allow for windows updates&lt;BR /&gt;access-list inside_access_in extended permit ip any any inactive&lt;BR /&gt;access-list ATT_access_out extended permit ip 10.11.12.0 255.255.255.0 any&lt;BR /&gt;access-list ATT_access_out extended permit icmp 10.11.12.0 255.255.255.0 any&lt;BR /&gt;access-list PLC_in extended permit ip any any&lt;BR /&gt;access-list PLC_in extended permit icmp any any&lt;BR /&gt;access-list att extended permit icmp any any&lt;BR /&gt;access-list plc extended permit icmp any any&lt;BR /&gt;access-list PLC_access_out extended permit icmp any any&lt;BR /&gt;access-list PLC_access_out extended permit ip any any&lt;BR /&gt;access-list ATT_access_in extended permit ip 192.168.201.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list ATT_access_in extended permit icmp 192.168.201.0 255.255.255.0 any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu ATT 1500&lt;BR /&gt;mtu PLC 1500&lt;BR /&gt;ip local pool WEBVPN 172.16.20.2-172.16.20.20 mask 255.255.255.0&lt;BR /&gt;ip verify reverse-path interface outside&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-621.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 1 198.100.146.0 255.255.255.0&lt;BR /&gt;nat (inside) 1 inside-network147 255.255.255.0&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group ATT_access_in in interface ATT&lt;BR /&gt;access-group ATT_access_out out interface ATT&lt;BR /&gt;access-group PLC_in in interface PLC&lt;BR /&gt;access-group PLC_access_out out interface PLC&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 12.48.31.25 1&lt;BR /&gt;route ATT 192.168.0.0 255.255.255.0 192.168.199.2 1&lt;BR /&gt;route ATT 192.168.1.0 255.255.255.0 192.168.199.2 1&lt;BR /&gt;route ATT 192.168.201.0 255.255.255.0 192.168.199.2 1&lt;BR /&gt;route inside inside-network147 255.255.255.0 198.100.146.254 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;&amp;nbsp;webvpn&lt;BR /&gt;&amp;nbsp; url-list value RemoteDesktop&lt;BR /&gt;&amp;nbsp; file-browsing disable&lt;BR /&gt;&amp;nbsp; file-entry disable&lt;BR /&gt;&amp;nbsp; http-proxy disable&lt;BR /&gt;&amp;nbsp; url-entry enable&lt;BR /&gt;&amp;nbsp; svc ask none default webvpn&lt;BR /&gt;aaa-server RADIUS protocol radius&lt;BR /&gt;aaa-server RADIUS (inside) host 198.100.146.154&lt;BR /&gt;&amp;nbsp;key RADIUSCLWA1&lt;BR /&gt;&amp;nbsp;radius-common-pw RADIUSCOMMON1&lt;BR /&gt;aaa-server RSA protocol sdi&lt;BR /&gt;&amp;nbsp;max-failed-attempts 5&lt;BR /&gt;aaa-server RSA (inside) host 198.100.146.154&lt;/P&gt;&lt;P&gt;http server enable&lt;BR /&gt;http 198.100.146.0 255.255.255.0 inside&lt;BR /&gt;http 192.100.146.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;no snmp-server enable&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet 198.100.146.0 255.255.255.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 198.100.146.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection scanning-threat shun&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;&amp;nbsp;enable outside&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;&amp;nbsp;webvpn&lt;BR /&gt;&amp;nbsp; url-list value RemoteDesktop&lt;BR /&gt;&amp;nbsp; file-entry disable&lt;BR /&gt;&amp;nbsp; file-browsing disable&lt;BR /&gt;&amp;nbsp; url-entry disable&lt;BR /&gt;group-policy WEBVPN internal&lt;BR /&gt;group-policy WEBVPN attributes&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol webvpn&lt;BR /&gt;&amp;nbsp;webvpn&lt;BR /&gt;&amp;nbsp; url-list value RemoteDesktop&lt;BR /&gt;&amp;nbsp; hidden-shares none&lt;BR /&gt;&amp;nbsp; file-entry disable&lt;BR /&gt;&amp;nbsp; file-browsing disable&lt;BR /&gt;&amp;nbsp; url-entry disable&lt;BR /&gt;tunnel-group DefaultWEBVPNGroup general-attributes&lt;BR /&gt;&amp;nbsp;address-pool WEBVPN&lt;BR /&gt;&amp;nbsp;authentication-server-group RSA&lt;BR /&gt;&amp;nbsp;accounting-server-group RADIUS&lt;BR /&gt;&amp;nbsp;default-group-policy WEBVPN&lt;BR /&gt;!&lt;BR /&gt;!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:40:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/getting-vlans-to-communicate/m-p/2617142#M195789</guid>
      <dc:creator>rpulido71</dc:creator>
      <dc:date>2019-03-12T05:40:22Z</dc:date>
    </item>
    <item>
      <title>What is your Source and</title>
      <link>https://community.cisco.com/t5/network-security/getting-vlans-to-communicate/m-p/2617143#M195790</link>
      <description>&lt;P&gt;What is your Source and destination ip you are using for your ping tests?&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2015 10:23:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/getting-vlans-to-communicate/m-p/2617143#M195790</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-03-23T10:23:48Z</dc:date>
    </item>
    <item>
      <title>Which license do you have for</title>
      <link>https://community.cisco.com/t5/network-security/getting-vlans-to-communicate/m-p/2617144#M195791</link>
      <description>&lt;P&gt;Which license do you have for the ASA5505? Issue the show version command and you should see it towards the bottom of the output.&amp;nbsp; If the outage wiped your ASA completely then it might have also cleared the installed license.&amp;nbsp; You need a security plus license to be able to have more than 2 VLANs communicating with eachother.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remembner to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2015 21:45:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/getting-vlans-to-communicate/m-p/2617144#M195791</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2015-03-23T21:45:14Z</dc:date>
    </item>
  </channel>
</rss>

