<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Take your EtherChannel and in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570202#M197778</link>
    <description>&lt;P&gt;Take your EtherChannel and make it trunk. Put VLAN15 on the trunk and build the SVI for that VLAN on the ASA. You would also trunk your 'inside' VLAN back to the switch.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 19 Jan 2015 18:08:06 GMT</pubDate>
    <dc:creator>Collin Clark</dc:creator>
    <dc:date>2015-01-19T18:08:06Z</dc:date>
    <item>
      <title>ASA5525-X and Cisco 3850 Traffiic routing</title>
      <link>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570201#M197777</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I apologise if this question has been answered already, I tried searching but found nothing.&lt;/P&gt;&lt;P&gt;I have a Cisco 3850X and an ASA5525 firewall, and I want to create a specific route from a particular VLAN in order to filter the traffic.&lt;/P&gt;&lt;P&gt;I am using VLAN 15, which is intended for wireless access only.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to;&lt;/P&gt;&lt;P&gt;Route all wireless hosts traffic on VLAN 15 to the firewall for filtering through two physical interfaces grouped together in a channel-group&lt;/P&gt;&lt;P&gt;Route filtered traffic back from the firewall into&amp;nbsp;the same switch via the same channel-group (same physical interfaces.)&lt;/P&gt;&lt;P&gt;Allow filtered traffic to communicate with other VLANs via their gateways&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If somebody could point me in the right direction with this I would appreciate it. I have attached a drawing of the physical cabling to give you a better idea of how the equipment is connected.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:22:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570201#M197777</guid>
      <dc:creator>danielashleysmith</dc:creator>
      <dc:date>2019-03-12T05:22:01Z</dc:date>
    </item>
    <item>
      <title>Take your EtherChannel and</title>
      <link>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570202#M197778</link>
      <description>&lt;P&gt;Take your EtherChannel and make it trunk. Put VLAN15 on the trunk and build the SVI for that VLAN on the ASA. You would also trunk your 'inside' VLAN back to the switch.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jan 2015 18:08:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570202#M197778</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2015-01-19T18:08:06Z</dc:date>
    </item>
    <item>
      <title>Unfortunately the 5525-x only</title>
      <link>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570203#M197779</link>
      <description>&lt;P&gt;Hi Collin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank for your reply.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately the 5525-x only allows me to create an etherchannel, I can't make trunk. I've made a trunk on the switch side, using two link aggregated ports which includes VLAN 15.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I created port-channel 1 on the firewall, with an address of 10.196.15.1, however I am unable to ping this from a host sitting on VLAN 15 connected to the switch.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know I could probably create a trunk up to the firewall&amp;nbsp;using one cable, and then use the other cable for the downlink back to the switch. Only allowing the downlink port access the gateway to talk to other VLANS. So basically, for any .15 vlan hosts, they are forced to go via the firewall and back into the switch.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But I would prefer to try and do this logically, so have a 2GbE uplink to the firewall, where only traffic that has been filtered can travel back down the 2GbE uplink and access the gateway. Giving 2GbE throughput and 1+1 redundancy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry, I'm stuck on this one. I tried doing what you said but I'm still not sure. I've attached a screenshot of the ASDM interface config if it helps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you could help clarify a bit further I'd really appreciate it.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jan 2015 12:43:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570203#M197779</guid>
      <dc:creator>danielashleysmith</dc:creator>
      <dc:date>2015-01-20T12:43:40Z</dc:date>
    </item>
    <item>
      <title>Lets first address why you</title>
      <link>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570204#M197780</link>
      <description>&lt;P&gt;Lets first address why you can't trunk. Are you getting an error somewhere?&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jan 2015 14:17:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570204#M197780</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2015-01-20T14:17:23Z</dc:date>
    </item>
    <item>
      <title>The firewall just isn't</title>
      <link>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570205#M197781</link>
      <description>&lt;P&gt;The firewall just isn't accepting any of the commands I would normally use to build a trunk.&lt;/P&gt;&lt;P&gt;For example:&lt;/P&gt;&lt;P&gt;--------------------------------------------------&lt;BR /&gt;ciscoasa(config)# int gi0/3&lt;BR /&gt;ciscoasa(config-if)# switchport mode trunk&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;^&lt;BR /&gt;ERROR: % Invalid input detected at '^' marker.&lt;BR /&gt;ciscoasa(config-if)# vlan 15&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; ^&lt;BR /&gt;ERROR: % Invalid input detected at '^' marker.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ciscoasa(config)# int gi0/2.15&lt;BR /&gt;ciscoasa(config-subif)# switchport mode trunk&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; ^&lt;BR /&gt;ERROR: % Invalid input detected at '^' marker.&lt;/P&gt;&lt;P&gt;--------------------------------------------------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Even when configuring sub-interfaces the CLI just will not accept any form of switchport command.&lt;/P&gt;&lt;P&gt;Is there a separate set of commands for building trunks in ASA5525's? I've googled around a lot and all the examples I have seen show people using the standard trunk commands.&lt;/P&gt;&lt;P&gt;I restored the firewall back to factory defaults, but still no joy.&lt;/P&gt;&lt;P&gt;I've attached a copy of the running config if that reveals any config issues?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jan 2015 16:13:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570205#M197781</guid>
      <dc:creator>danielashleysmith</dc:creator>
      <dc:date>2015-01-20T16:13:58Z</dc:date>
    </item>
    <item>
      <title>Here's an example of creating</title>
      <link>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570206#M197782</link>
      <description>&lt;P&gt;Here's an example of creating a port-channel and then trunking the port-channel in the CLI.&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;speed 1000&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;&amp;nbsp;channel-group 10 mode on&lt;BR /&gt;&amp;nbsp;no nameif &amp;nbsp; &amp;nbsp;&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;speed 1000&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;&amp;nbsp;channel-group 10 mode on&lt;BR /&gt;&amp;nbsp;no nameif &amp;nbsp; &amp;nbsp;&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;interface Port-channel10&lt;BR /&gt;&amp;nbsp;speed 1000&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;&amp;nbsp;no nameif &amp;nbsp; &amp;nbsp;&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel10.225&lt;BR /&gt;&amp;nbsp;vlan 225&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.254 255.255.255.0 standby 192.168.1.253&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel10.226&lt;BR /&gt;&amp;nbsp;vlan 226&lt;BR /&gt;&amp;nbsp;nameif dmz&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.99.254 255.255.255.0 standby 192.168.99.253&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jan 2015 17:17:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570206#M197782</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2015-01-20T17:17:55Z</dc:date>
    </item>
    <item>
      <title>Hi Collin, Thanks, I've now</title>
      <link>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570207#M197783</link>
      <description>&lt;P&gt;Hi Collin,&lt;/P&gt;&lt;P&gt;Thanks, I've now managed to create the trunk following your instructions.&lt;/P&gt;&lt;P&gt;I have set the switch up so that the trunks native vlan is 15, but vlans 10-15 are allowed. As follows:&lt;/P&gt;&lt;P&gt;------------------------------------------&lt;/P&gt;&lt;P&gt;Switch:&lt;/P&gt;&lt;P&gt;------------------------------------------&lt;BR /&gt;interface GigabitEthernet1/0/1&lt;BR /&gt;&amp;nbsp;switchport access vlan 15&lt;BR /&gt;&amp;nbsp;switchport trunk native vlan 10&lt;BR /&gt;&amp;nbsp;switchport trunk allowed vlan 10-15&lt;BR /&gt;&amp;nbsp;switchport mode trunk&lt;BR /&gt;&amp;nbsp;switchport nonegotiate&lt;BR /&gt;&amp;nbsp;speed 1000&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;&amp;nbsp;channel-group 2 mode active&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/2&lt;BR /&gt;&amp;nbsp;switchport access vlan 15&lt;BR /&gt;&amp;nbsp;switchport trunk native vlan 10&lt;BR /&gt;&amp;nbsp;switchport trunk allowed vlan 10-15&lt;BR /&gt;&amp;nbsp;switchport mode trunk&lt;BR /&gt;&amp;nbsp;switchport nonegotiate&lt;BR /&gt;&amp;nbsp;speed 1000&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;&amp;nbsp;channel-group 2 mode active&lt;/P&gt;&lt;P&gt;------------------------------------------&lt;/P&gt;&lt;P&gt;Firewall&lt;/P&gt;&lt;P&gt;------------------------------------------&lt;BR /&gt;interface Port-channel10.10&lt;BR /&gt;&amp;nbsp;vlan 10&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.196.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel10.15&lt;BR /&gt;&amp;nbsp;vlan 15&lt;BR /&gt;&amp;nbsp;nameif dmz&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 10.196.15.1 255.255.255.0&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;-------------------------------------------------------&lt;/P&gt;&lt;P&gt;I am able to ping the .15 gateway from a host sitting on VLAN15 on the switch,&amp;nbsp;however, even with the 'same-security' configuration I am still unable to ping across to the .10 gateway.&lt;/P&gt;&lt;P&gt;I tried creating a route, 'route inside 10.196.15.0 255.255.255.0 10.196.10.0' however was returned an error message 'Cannot add route connected route exists'. However when I looked at sh route, no such route exists:&lt;/P&gt;&lt;P&gt;-------------------------&lt;/P&gt;&lt;P&gt;C &amp;nbsp; &amp;nbsp;10.196.15.0 255.255.255.0 is directly connected, dmz&lt;BR /&gt;C &amp;nbsp; &amp;nbsp;10.196.10.0 255.255.255.0 is directly connected, inside&lt;BR /&gt;C &amp;nbsp; &amp;nbsp;192.168.1.0 255.255.255.0 is directly connected, management&lt;/P&gt;&lt;P&gt;-------------------------&lt;/P&gt;&lt;P&gt;I should not that I have only used the gateway addresses 10.196.10.1 and&amp;nbsp;10.196.15.1 in the firewalls configuration, I have removed these gateway addresses&amp;nbsp;from&amp;nbsp;the switch, as I assumed the firewall should be used as the gateway, and didn't want the switch to route between the vlans internally bypassing the firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm obviously still missing something, might I have to setup NAT to translate the two addresses?&lt;/P&gt;&lt;P&gt;Thanks again for your help&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jan 2015 10:05:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570207#M197783</guid>
      <dc:creator>danielashleysmith</dc:creator>
      <dc:date>2015-01-21T10:05:40Z</dc:date>
    </item>
    <item>
      <title>Have you tried configuring</title>
      <link>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570208#M197784</link>
      <description>&lt;P&gt;Have you tried configuring the Port Channel interface on the switch with the trunk configurations?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jan 2015 11:02:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570208#M197784</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-01-21T11:02:40Z</dc:date>
    </item>
    <item>
      <title>Hi Andre,For the port channel</title>
      <link>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570209#M197785</link>
      <description>&lt;P&gt;Hi Andre,&lt;/P&gt;&lt;P&gt;For the port channel config on the switch I have:&lt;/P&gt;&lt;P&gt;------------------------------------&lt;BR /&gt;interface Port-channel2&lt;BR /&gt;&amp;nbsp;switchport trunk allowed vlan 10-15&lt;BR /&gt;&amp;nbsp;switchport mode trunk&lt;BR /&gt;&amp;nbsp;switchport nonegotiate&lt;BR /&gt;&amp;nbsp;duplex full&lt;/P&gt;&lt;P&gt;------------------------------------&lt;/P&gt;&lt;P&gt;I assumed this would be ok?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;UPDATE:&lt;/P&gt;&lt;P&gt;I tried setting the security levels for both interfaces to 100, however still no joy. Which leads to think it may be something to do with the trunk itself?&lt;/P&gt;&lt;P&gt;I've uploaded the configs for both the switch and the firewall in case in helps.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jan 2015 13:04:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570209#M197785</guid>
      <dc:creator>danielashleysmith</dc:creator>
      <dc:date>2015-01-21T13:04:49Z</dc:date>
    </item>
    <item>
      <title>Hi Daniel.The 2 interfaces do</title>
      <link>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570210#M197786</link>
      <description>&lt;P&gt;Hi Daniel.&lt;/P&gt;&lt;P&gt;The 2 interfaces do not have the same security level.&amp;nbsp;If you are trying to connect from a host on the .15 subnet to a host on the .10 subnet, by default the flow will not be allowed, because you are trying to connect from an interface with a lower security level, to an interface with a higher security level. You may need an access rule to permit the traffic from lower to higher security level. Alternatively, you can set&amp;nbsp;both security levels to 100, then the "Same-security" statements will take effect.&lt;/P&gt;&lt;P&gt;You do not need a route because both the routes are connected so the ASA will know how to route traffic between the 2 interfaces.&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jan 2015 13:18:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570210#M197786</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-01-21T13:18:35Z</dc:date>
    </item>
    <item>
      <title>ICMP is not inspected by</title>
      <link>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570211#M197787</link>
      <description>&lt;P&gt;ICMP is not inspected by default on the ASA. Try a different protocol, other than ping.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jan 2015 13:33:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570211#M197787</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-01-21T13:33:47Z</dc:date>
    </item>
    <item>
      <title>I tried pinging a host that</title>
      <link>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570212#M197788</link>
      <description>&lt;P&gt;I tried pinging a host that was on the switch on vlan 11 however that did not work either. However the ping does work to vlan 15 gateway, setup on the firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried some other things like tracert but I just can't get connectivity outside of vlan 15 through the firewall.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jan 2015 13:43:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570212#M197788</guid>
      <dc:creator>danielashleysmith</dc:creator>
      <dc:date>2015-01-21T13:43:15Z</dc:date>
    </item>
    <item>
      <title> Ping and traceroute both use</title>
      <link>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570213#M197789</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ping and traceroute both use ICMP. Try RDP or any other TCP protocol. Also try to ping devices on both networks from the Asa.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jan 2015 14:56:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570213#M197789</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-01-21T14:56:51Z</dc:date>
    </item>
    <item>
      <title>Hi Andre,I've tried pinging</title>
      <link>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570214#M197790</link>
      <description>&lt;P&gt;Hi Andre,&lt;/P&gt;&lt;P&gt;I've tried pinging hosts on both the .15 and .10 network from the firewall and both hosts are responding. Both hosts are also able to ping their native gateways, ie. 10.196.10.21 can successfully ping 10.196.10.1 and 10.196.15.21 can ping 10.196.15.1.&lt;/P&gt;&lt;P&gt;However, 10.196.10.21 cannot ping 10.196.15.21.&lt;/P&gt;&lt;P&gt;I tried issuing an RDP command through telnet however it was not successful.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the basis that both hosts can ping their gateways which only exist in the firewall and the firewall can ping back it looks as though the trunk may be working fine but the intervlan route between .10 and .15 is still not working.&lt;/P&gt;&lt;P&gt;I have tried some basic routing commands form googling around but to no avail. I may try restoring factory defaults and re-setting the firewall up again in case I've issued a command that's stopping it somehow, though&amp;nbsp;I can't see anything obvious.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jan 2015 15:14:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570214#M197790</guid>
      <dc:creator>danielashleysmith</dc:creator>
      <dc:date>2015-01-21T15:14:32Z</dc:date>
    </item>
    <item>
      <title>You will never be able to</title>
      <link>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570215#M197791</link>
      <description>&lt;P&gt;You will never be able to ping the far side IP of the firewall (security feature). Please add these lines&amp;nbsp;for ICMP:&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;BR /&gt;icmp permit any dmz&lt;/P&gt;&lt;P&gt;For DMZ to Inside traffic, like Andre stated, you will need to either NAT from DMZ to inside or set the security levels of bother interfaces to 100 and turn on same-security.&lt;/P&gt;&lt;P&gt;From a server on the inside you should be able to telnet to a server running RDP in the DMZ with the following command-&lt;/P&gt;&lt;P&gt;telnet&amp;nbsp;&lt;SPAN style="font-size: 14px;"&gt;10.196.15.x 3389&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jan 2015 17:50:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570215#M197791</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2015-01-21T17:50:26Z</dc:date>
    </item>
    <item>
      <title>Hi Collin and Andre,Thanks, I</title>
      <link>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570216#M197792</link>
      <description>&lt;P&gt;Hi Collin and Andre,&lt;/P&gt;&lt;P&gt;Thanks, I can now ping across both vlans after permitting icmp.&lt;/P&gt;&lt;P&gt;I do however need to change the security levels back to DMZ 50 inside 100 however. I've been trying NAT configurations that I've found online all morning however I'm really struggling to get anything working.&lt;/P&gt;&lt;P&gt;Hosts on .15 vlan are issued IP's from a DHCP pool by the switch, I want to translate these into the&amp;nbsp;.10 subnet range.&lt;/P&gt;&lt;P&gt;Do you have an example configuration I could look at?&lt;/P&gt;&lt;P&gt;Apologies I know I should read a bit more and work this out however I'm struggling and running out of time, if anybody could share an example config I'd really appreciate it.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jan 2015 11:34:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570216#M197792</guid>
      <dc:creator>danielashleysmith</dc:creator>
      <dc:date>2015-01-22T11:34:21Z</dc:date>
    </item>
    <item>
      <title>Do you need to NAT? Or do you</title>
      <link>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570217#M197793</link>
      <description>&lt;P&gt;Do you need to NAT? Or do you need to allow access? If both are internal address ranges, than you may just route the 2 subnets/VLANS in your internal network without changing the addressing.&lt;/P&gt;&lt;P&gt;If you are not comfortable with the CLI on the ASA, maybe you should use ASDM or Prime Security Manager to manage your policies. It will be much easier.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you just need access from the DMZ (Security level 50) interface, to the INSIDE (security level 100) interface, you can achieve this by Access Rules. Which services/protocols do you want to allow between the DMZ and INSIDE interfaces?&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jan 2015 12:24:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570217#M197793</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-01-22T12:24:29Z</dc:date>
    </item>
    <item>
      <title>Hi Andre,I managed to get RDP</title>
      <link>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570218#M197794</link>
      <description>&lt;P&gt;Hi Andre,&lt;/P&gt;&lt;P&gt;I managed to get RDP working across the two vlans, I tried ASDM and created an access rule as suggested and it works fine.&lt;/P&gt;&lt;P&gt;The only real remaining issue I'm having is communicating back to the gateways on the switch and their related hosts.&lt;/P&gt;&lt;P&gt;When I setup gateways 10 and 15 on the firewall&amp;nbsp;and remove them from the switch, it works fine, hosts on vlan 15&amp;nbsp;can talk to hosts on vlan 10. However, hosts on vlan 15 cannot talk to hosts on vlan 11, even though a rule is in place. The gateway for vlan 11 resides in the switch, if I remove the gateway IP address from the switch and configure it inside the firewall instead it works. But that means that all vlan 11 traffic then has to use the gateway within the firewall, even if it's to communicate with adjacent trusted vlans, which isn't what I want.&lt;/P&gt;&lt;P&gt;What I want is for vlan 15 traffic to communicate back to the switch via the gateways on the switch.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've attached a&amp;nbsp;drawing of what I mean, apologies for its crudeness.&lt;/P&gt;&lt;P&gt;Thanks again.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;UPDATE: I tried pinging the gateways on the switch form the firewalls CLI but had no success. So that explains why traffic routed via the firewall coming back down the trunk cannot access gateways on the switch.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jan 2015 15:17:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570218#M197794</guid>
      <dc:creator>danielashleysmith</dc:creator>
      <dc:date>2015-01-23T15:17:08Z</dc:date>
    </item>
    <item>
      <title>If I understand your problem</title>
      <link>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570219#M197795</link>
      <description>&lt;P&gt;If I understand your problem correctly, you will need to put an IP for vlan 15 on the switch (not the gateway IP). Then on the ASA you will need to add a route to the other networks.&lt;/P&gt;&lt;P&gt;Example-&lt;BR /&gt;route inside 10.196.11.0 255.255.255.0 10.196.15.254&lt;BR /&gt;route inside 10.196.12.0 255.255.255.0 10.196.15.254&lt;BR /&gt;route inside 10.196.13.0 255.255.255.0 10.196.15.254&lt;BR /&gt;&lt;BR /&gt;10.196.15.254 is the IP you would put on the switch for vlan 15.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jan 2015 15:26:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570219#M197795</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2015-01-23T15:26:45Z</dc:date>
    </item>
    <item>
      <title>Hi Collin,But surely if the</title>
      <link>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570220#M197796</link>
      <description>&lt;P&gt;Hi Collin,&lt;/P&gt;&lt;P&gt;But surely if the .15.1 (DMZ) IP address is allocated to vlan 15 on the switch, with IP routing turned on won't traffic bypass the firewall&amp;nbsp;altogether?&lt;/P&gt;&lt;P&gt;That's why I wondered if the address 10.196.15.1 should be allocated to vlan 15 in the firewall instead, so to access other vlans traffic has no choice but to go via the firewall first.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jan 2015 17:09:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5525-x-and-cisco-3850-traffiic-routing/m-p/2570220#M197796</guid>
      <dc:creator>danielashleysmith</dc:creator>
      <dc:date>2015-01-23T17:09:49Z</dc:date>
    </item>
  </channel>
</rss>

