<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA Inter-VLAN with public network not working in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-inter-vlan-with-public-network-not-working/m-p/3937671#M30997</link>
    <description>Your configuration is partial so we are assuming some points. As per the expert Marius Gunnerud you are missing default route in your switch and missing NAT statements for your VLANs/Subnets already mentioned. You should check and verify these configuration and make necessary changes.&lt;BR /&gt;&lt;BR /&gt;Along with this you will also require Route back to your inside networks on ASA as well which I mentioned in my previous post.&lt;BR /&gt;&lt;BR /&gt;route INSIDE 10.20.10.0 255.255.255.0 10.10.10.2&lt;BR /&gt;route INSIDE 10.30.10.0 255.255.255.0 10.10.10.2&lt;BR /&gt;route INSIDE 10.40.10.0 255.255.255.0 10.10.10.2&lt;BR /&gt;&lt;BR /&gt;After making necessary changes, if you still having issue. please post the packet tracer output so that we can investigate further.&lt;BR /&gt;&lt;BR /&gt;packet-tracer input INSIDE tcp 10.0.0.10 80 1.1.1.1 80 detailed&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;### RATE ALL HELPFUL RESPONSES ###</description>
    <pubDate>Wed, 09 Oct 2019 07:34:00 GMT</pubDate>
    <dc:creator>bhargavdesai</dc:creator>
    <dc:date>2019-10-09T07:34:00Z</dc:date>
    <item>
      <title>Cisco ASA Inter-VLAN with public network not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-inter-vlan-with-public-network-not-working/m-p/3935788#M30986</link>
      <description>&lt;P&gt;We have configured total three VLAN . Internal vlan computer are reached at Cisco ASA internal interface IP address. mean I am able to ping internal IP address 10.100.100.1 from vlan 2 system (10.10.10.100) but not able to ping outside IP address from internal VLAN system.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Internal VLAN detail&lt;/P&gt;&lt;P&gt;VLAN 2 =10.10.10.0/24&lt;/P&gt;&lt;P&gt;VLAN 3 =10.20.10.0/24&lt;/P&gt;&lt;P&gt;VLAN 4 =10.30.10.0/24&lt;/P&gt;</description>
      <pubDate>Sat, 05 Oct 2019 13:35:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-inter-vlan-with-public-network-not-working/m-p/3935788#M30986</guid>
      <dc:creator>dinchavan</dc:creator>
      <dc:date>2019-10-05T13:35:08Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Inter-VLAN with public network not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-inter-vlan-with-public-network-not-working/m-p/3935799#M30988</link>
      <description>Hi,&lt;BR /&gt;That's by design, you cannot ping the outside ASA interface if you are connected to an inside ASA interface. When testing, ping through the ASA, to the next hop router. Ensure you are permitting icmp response by entering the command "fixup protocol icmp".&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Sat, 05 Oct 2019 14:33:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-inter-vlan-with-public-network-not-working/m-p/3935799#M30988</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-10-05T14:33:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Inter-VLAN with public network not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-inter-vlan-with-public-network-not-working/m-p/3935821#M30990</link>
      <description>&lt;P&gt;You cannot ping an ASA interface which is not the ingress interface.&amp;nbsp; So you can only ping the ASA interface on which the ICMP traffic enters.&lt;/P&gt;</description>
      <pubDate>Sat, 05 Oct 2019 16:36:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-inter-vlan-with-public-network-not-working/m-p/3935821#M30990</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2019-10-05T16:36:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Inter-VLAN with public network not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-inter-vlan-with-public-network-not-working/m-p/3936203#M30991</link>
      <description>&lt;P&gt;I have Cisco ASA 5506 Firewall and total three Cisco 34XX Switch,&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) Cisco ASA interface Gig1/8 is connected to ISP Router , Cisco ASA 5506 interface Gig 1/1 is connected to Master switch interface Gig 0/1.&amp;nbsp;and two more Tower switch Tower-1 and Tower-2 ,&amp;nbsp;both are connected to master switch&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cisco ASA interface Gig 1/8=&amp;nbsp; IP Address 123.123.X.X /29&lt;/P&gt;&lt;P&gt;Cisco ASA Interface Gig1/1 = IP Address&amp;nbsp; 10.10.10.1/24&amp;nbsp;&lt;/P&gt;&lt;P&gt;Master Switch interface Gig 0/1 = IP Address 10.10.10.2/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are configured total three Internal VLAN detail&amp;nbsp;&lt;/P&gt;&lt;P&gt;VLAN-2 =10.20.10.0/24&lt;/P&gt;&lt;P&gt;VLAN-3 =10.30.10.0/24&lt;/P&gt;&lt;P&gt;VLAN-4 =10.40.10.0/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Inter-VLAN function are working properly, I can access Inter-VLAN environment properly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can access network from VLAN-2 computer IP address 10.20.10.1/24 to Cisco ASA interface IP address 10.10.10.1&lt;/P&gt;&lt;P&gt;I can access network from VLAN-2 computer IP address 10.20.10.1/24 to other computer IP address 10.30.10.1&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can't&amp;nbsp; access from VLAN-2 computer IP address 10.20.10.1/24 to internet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Oct 2019 07:57:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-inter-vlan-with-public-network-not-working/m-p/3936203#M30991</guid>
      <dc:creator>dinchavan</dc:creator>
      <dc:date>2019-10-07T07:57:36Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Inter-VLAN with public network not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-inter-vlan-with-public-network-not-working/m-p/3936211#M30992</link>
      <description>&lt;P&gt;Which ASA interface is in the 10.20.10.0/24 network?&amp;nbsp; You only mention Gig1/1, Gig1/8 and Mgmt switch.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It would be helpful if you posted your full running configuration (remember to remove any public IPs, usernames and passwords).&lt;/P&gt;</description>
      <pubDate>Mon, 07 Oct 2019 08:15:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-inter-vlan-with-public-network-not-working/m-p/3936211#M30992</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2019-10-07T08:15:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Inter-VLAN with public network not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-inter-vlan-with-public-network-not-working/m-p/3936235#M30993</link>
      <description>To simplify and understand better. You have a Core L3 switch which has 3 VLANs configured and L3 interface IP configured on the switch is configured as Gateway for Computers/Devices connected in the respective VLANs. There is a Separate VLAN/Interface/Subnet configured between your ASA and Core Switch (10.10.10.0/24).&lt;BR /&gt;Your inter-VLAN routing is working fine. But your Devices/Computers in this VLANs are not able to reach to internet. This is what my understanding about your query. The following solution is based on this.&lt;BR /&gt;&lt;BR /&gt;1: Your Core L3 Switch should have default Route pointing towards Cisco ASA (interface Gig 1/1 - 10.10.10.1/24).&lt;BR /&gt;Example: "ip route 0.0.0.0 0.0.0.0 10.10.10.1"&lt;BR /&gt;&lt;BR /&gt;2: Your ASA (interface Gig 1/1) should have Routes for all your three VLANs (10.20.10.0/24, 10.30.10.0/24, 10.40.10.0/24) Pointing towards Core Switch L3 interface on 10.10.10.0/24 subnet.&lt;BR /&gt;Example: "route INSIDE 10.20.10.0 255.255.255.0 10.10.10.2&lt;BR /&gt;route INSIDE 10.30.10.0 255.255.255.0 10.10.10.2&lt;BR /&gt;route INSIDE 10.40.10.0 255.255.255.0 10.10.10.2"&lt;BR /&gt;&lt;BR /&gt;3: On your ASA you should have a default route pointing towards ISP on interface GIG 1/8 IP Address 123.123.X.X /29&lt;BR /&gt;Example: "route OUTSIDE 0.0.0.0 0.0.0.0 123.123.123.1"&lt;BR /&gt;&lt;BR /&gt;4: You have NAT configuration for all your VLANs on the ASA.&lt;BR /&gt;Example: "object network VLAN2&lt;BR /&gt;subnet 10.20.10.0 255.255.255.0&lt;BR /&gt;object network VLAN3&lt;BR /&gt;subnet 10.30.10.0 255.255.255.0&lt;BR /&gt;object network VLAN4&lt;BR /&gt;subnet 10.40.10.0 255.255.255.0&lt;BR /&gt;object-group network LAN&lt;BR /&gt;network-object object VLAN2&lt;BR /&gt;network-object object VLAN3&lt;BR /&gt;network-object object VLAN4&lt;BR /&gt;nat (INSIDE,OUTSIDE) dynamic interface"&lt;BR /&gt;&lt;BR /&gt;5: If you are testing your Internet Connectivity through Ping (ICMP) you should inspect the ICMP on ASA for that command is&lt;BR /&gt;"fixup protocol icmp"&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I have not allowed 10.10.10.0/24 network for Internet access assuming it is only used as a internal connection between ASA and Core Switch. If you want you can create another object and add it to object group.&lt;BR /&gt;&lt;BR /&gt;If you still have problem please share your configuration (remove all sensitive information like public ip, username, password etc.).&lt;BR /&gt;You can also run Packet-tracer to see what is wrong on your ASA.&lt;BR /&gt;Example: "packet-tracer input INSIDE tcp 10.20.10.10 80 8.8.8.8 80 detailed"&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;### RATE ALL HELPFUL RESPONSES ###&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 07 Oct 2019 08:32:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-inter-vlan-with-public-network-not-working/m-p/3936235#M30993</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-10-07T08:32:02Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Inter-VLAN with public network not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-inter-vlan-with-public-network-not-working/m-p/3937378#M30994</link>
      <description>&lt;P&gt;All device configuration are here&lt;/P&gt;&lt;P&gt;==========================Cisco ASA Firewall====================&lt;/P&gt;&lt;P&gt;ASA&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.10.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 123.123.123.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;object network LAN&lt;BR /&gt;subnet 10.10.10.0 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 123.123.123.1 1&lt;BR /&gt;!&lt;BR /&gt;access-list in-to-internet extended permit ip any any&lt;BR /&gt;access-list in-to-internet extended permit icmp any any&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;access-group in-to-internet in interface outside&lt;BR /&gt;access-group in-to-internet in interface dmz&lt;BR /&gt;object network LAN&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;!&lt;BR /&gt;class-map inspection-default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;policy-map global-policy&lt;BR /&gt;class inspection-default&lt;BR /&gt;inspect dns&lt;BR /&gt;inspect http&lt;BR /&gt;inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global-policy global&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;==========================Master-Switch =====================&lt;/P&gt;&lt;P&gt;master&lt;/P&gt;&lt;P&gt;interface FastEthernet0/1&lt;BR /&gt;no switchport&lt;BR /&gt;ip address 10.10.10.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/24&lt;BR /&gt;switchport trunk encapsulation dot1q&lt;BR /&gt;switchport mode trunk&lt;BR /&gt;!&lt;BR /&gt;interface range GigabitEthernet0/1-2&lt;BR /&gt;switchport trunk encapsulation dot1q&lt;BR /&gt;switchport mode trunk&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;ip address 10.20.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt;ip address 10.30.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan4&lt;BR /&gt;ip address 10.40.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;access-list 110 permit ip 10.20.10.0 0.0.0.255 any&lt;BR /&gt;access-list 110 permit udp 10.20.10.0 0.0.0.255 any&lt;BR /&gt;access-list 110 permit udp any eq bootps any&lt;BR /&gt;access-list 110 permit icmp 10.20.10.0 0.0.0.255 any&lt;BR /&gt;!&lt;BR /&gt;access-list 111 permit ip 10.30.10.0 0.0.0.255 any&lt;BR /&gt;access-list 111 permit udp 10.30.10.0 0.0.0.255 any&lt;BR /&gt;access-list 110 permit udp any eq bootps any&lt;BR /&gt;access-list 111 permit icmp 10.30.10.0 0.0.0.255 any&lt;BR /&gt;!&lt;BR /&gt;access-list 112 permit ip 10.40.10.0 0.0.0.255 any&lt;BR /&gt;access-list 112 permit udp 10.40.10.0 0.0.0.255 any&lt;BR /&gt;access-list 110 permit udp any eq bootps any&lt;BR /&gt;access-list 112 permit icmp 10.40.10.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;==========================Tower-Switch (Access Switch)=======================&lt;/P&gt;&lt;P&gt;interface range FastEthernet0/5-9&lt;BR /&gt;description 'For IT_Department'&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface range FastEthernet0/10-14&lt;BR /&gt;description 'For Sale_Department'&lt;BR /&gt;switchport access vlan 3&lt;BR /&gt;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface range FastEthernet0/15-19&lt;BR /&gt;description 'For Purchase_Department'&lt;BR /&gt;switchport access vlan 4&lt;BR /&gt;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface range GigabitEthernet0/1-2&lt;BR /&gt;switchport trunk encapsulation dot1q&lt;BR /&gt;switchport mode trunk&lt;BR /&gt;!&lt;/P&gt;</description>
      <pubDate>Tue, 08 Oct 2019 19:54:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-inter-vlan-with-public-network-not-working/m-p/3937378#M30994</guid>
      <dc:creator>dinchavan</dc:creator>
      <dc:date>2019-10-08T19:54:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Inter-VLAN with public network not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-inter-vlan-with-public-network-not-working/m-p/3937403#M30995</link>
      <description>&lt;P&gt;All device configuration are share here&lt;/P&gt;</description>
      <pubDate>Tue, 08 Oct 2019 20:13:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-inter-vlan-with-public-network-not-working/m-p/3937403#M30995</guid>
      <dc:creator>dinchavan</dc:creator>
      <dc:date>2019-10-08T20:13:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Inter-VLAN with public network not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-inter-vlan-with-public-network-not-working/m-p/3937465#M30996</link>
      <description>&lt;P&gt;If this is the full configuration of all your devices then you are missing a default route on the&amp;nbsp;&lt;SPAN&gt;Master-Switch pointing to 10.10.10.1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You are also missing a NAT statment for the 10.20.10.0/24, 10.30.10.0/24 and 10.40.10.0/24 networks.&amp;nbsp; The NAT statment you have only matches the 10.10.10.0/24 network.&amp;nbsp; So on the ASA you need to add three more NAT statments. Or you can creat an object that matches on any IP (0.0.0.0 0.0.0.0) and create a NAT for that.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Config for ASA:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;object network LAN&lt;BR /&gt;subnet 10.20.10.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) dynamic interface&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;object network LAN&lt;BR /&gt;subnet 10.30.10.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) dynamic interface&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;object network LAN&lt;BR /&gt;subnet 10.40.10.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) dynamic interface&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Configuration for Master-Switch:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;ip route 0.0.0.0 0.0.0.0 10.10.10.1&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Oct 2019 21:20:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-inter-vlan-with-public-network-not-working/m-p/3937465#M30996</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2019-10-08T21:20:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Inter-VLAN with public network not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-inter-vlan-with-public-network-not-working/m-p/3937671#M30997</link>
      <description>Your configuration is partial so we are assuming some points. As per the expert Marius Gunnerud you are missing default route in your switch and missing NAT statements for your VLANs/Subnets already mentioned. You should check and verify these configuration and make necessary changes.&lt;BR /&gt;&lt;BR /&gt;Along with this you will also require Route back to your inside networks on ASA as well which I mentioned in my previous post.&lt;BR /&gt;&lt;BR /&gt;route INSIDE 10.20.10.0 255.255.255.0 10.10.10.2&lt;BR /&gt;route INSIDE 10.30.10.0 255.255.255.0 10.10.10.2&lt;BR /&gt;route INSIDE 10.40.10.0 255.255.255.0 10.10.10.2&lt;BR /&gt;&lt;BR /&gt;After making necessary changes, if you still having issue. please post the packet tracer output so that we can investigate further.&lt;BR /&gt;&lt;BR /&gt;packet-tracer input INSIDE tcp 10.0.0.10 80 1.1.1.1 80 detailed&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;### RATE ALL HELPFUL RESPONSES ###</description>
      <pubDate>Wed, 09 Oct 2019 07:34:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-inter-vlan-with-public-network-not-working/m-p/3937671#M30997</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-10-09T07:34:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Inter-VLAN with public network not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-inter-vlan-with-public-network-not-working/m-p/3938901#M30998</link>
      <description>&lt;P&gt;All changes has been done but still facing problem&lt;/P&gt;</description>
      <pubDate>Thu, 10 Oct 2019 21:24:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-inter-vlan-with-public-network-not-working/m-p/3938901#M30998</guid>
      <dc:creator>dinchavan</dc:creator>
      <dc:date>2019-10-10T21:24:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Inter-VLAN with public network not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-inter-vlan-with-public-network-not-working/m-p/3939030#M30999</link>
      <description>&lt;P&gt;For testing purpose , I configure network environment into Cisco packet Tracer. Please find Attachment&lt;/P&gt;&lt;P&gt;Public IP address are changed into attached file.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tested:-&lt;/P&gt;&lt;P&gt;1. InterVLAN are working fine.&lt;/P&gt;&lt;P&gt;2. LAN and DMZ are communicate properly.&lt;/P&gt;&lt;P&gt;3. DMZ AV server are ping to Live AV server properly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;problem is:&lt;/P&gt;&lt;P&gt;1. LAN network computer not able to communicate to Live AV server (124.124.124.2) . It is use for download AV package for update LAN computer.&lt;/P&gt;&lt;P&gt;2. Live AV server are not able to ping to DMZ server for daily AV update.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Oct 2019 06:08:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-inter-vlan-with-public-network-not-working/m-p/3939030#M30999</guid>
      <dc:creator>dinchavan</dc:creator>
      <dc:date>2019-10-11T06:08:38Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Inter-VLAN with public network not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-inter-vlan-with-public-network-not-working/m-p/3939040#M31000</link>
      <description>&lt;P&gt;We need to see you full running configuration (remember to remove any public IPs, usernames and passwords).&lt;/P&gt;
&lt;P&gt;Also I am unable to open the file you attached.&amp;nbsp; Could you post it as a .pcap file please.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Oct 2019 06:33:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-inter-vlan-with-public-network-not-working/m-p/3939040#M31000</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2019-10-11T06:33:23Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Inter-VLAN with public network not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-inter-vlan-with-public-network-not-working/m-p/3939080#M31001</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Your configuration is good but you are using ASA 5506 in PT and It is having some bug with NAT. NAT is not working ASA 5506 in PT. You can use the same configuration on Cisco ASA 5505 and it will work.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We faced the same NAT issue on 5506 with many users.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Oct 2019 07:45:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-inter-vlan-with-public-network-not-working/m-p/3939080#M31001</guid>
      <dc:creator>Deepak Kumar</dc:creator>
      <dc:date>2019-10-11T07:45:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Inter-VLAN with public network not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-inter-vlan-with-public-network-not-working/m-p/3939134#M31003</link>
      <description>&lt;P&gt;Just testing purpose ,Configure into PT. Actually My network used ASA 5510. We are not able to solve my problem which is mention here&lt;/P&gt;</description>
      <pubDate>Fri, 11 Oct 2019 09:01:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-inter-vlan-with-public-network-not-working/m-p/3939134#M31003</guid>
      <dc:creator>dinchavan</dc:creator>
      <dc:date>2019-10-11T09:01:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Inter-VLAN with public network not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-inter-vlan-with-public-network-not-working/m-p/3939142#M31006</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Currently, we can't with using of 5506 in PT due to bug. You can 5505 in the LAB file and it will work for you.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Oct 2019 09:17:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-inter-vlan-with-public-network-not-working/m-p/3939142#M31006</guid>
      <dc:creator>Deepak Kumar</dc:creator>
      <dc:date>2019-10-11T09:17:15Z</dc:date>
    </item>
  </channel>
</rss>

