<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5510 Allow HTTP traffic between two VLAN's in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-allow-http-traffic-between-two-vlan-s/m-p/2382302#M310018</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By default if you have all interface with &lt;STRONG&gt;"security-level 100"&lt;/STRONG&gt; value for example then they could not communicate in any way. Even if you added ACLs on the interfaces to permit all traffic. Your ASA would give out log messages that wouldnt really give any indication that the &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; was the problem which I think is a problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you only add &lt;STRONG&gt;"same-security-traffic permit inter-interface"&lt;/STRONG&gt; and have NO interface ACLs then all traffic between these same &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; interfaces is permitted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the user above would have a couple of options.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;He could either change the &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; values of each interface so that they are different from eachother and then configure ACLs to the interfaces to allow traffic that is needed and block that which is required. Since no interface has equal &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; with eachother then interface ACLs are enough to control traffic.&lt;/LI&gt;&lt;LI&gt;He could insert &lt;STRONG&gt;"same-security-traffic permit inter-interface"&lt;/STRONG&gt; which would essentially first enable traffic between these equal &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; interfaces and then he could add the interface ACLs suggest to control the traffic as he saw fit.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 30 Oct 2013 18:47:14 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-10-30T18:47:14Z</dc:date>
    <item>
      <title>ASA 5510 Allow HTTP traffic between two VLAN's</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-allow-http-traffic-between-two-vlan-s/m-p/2382298#M310014</link>
      <description>&lt;P&gt;Hi There,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an Cisco ASA 5510 v9.1 with some VLAN subinterfaces. I set all the VLAN Interfaces on security level 100, but i disabled same-security-traffic permit inter-interface option, because i don't want the VLAN's to communicate with each other. There are a few exptions that i want to make.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I Have 7 VLAN Subinterfaces&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;description Inside LAN Interface ASA5510&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0.1&lt;/P&gt;&lt;P&gt;vlan 1&lt;/P&gt;&lt;P&gt;nameif VLAN1&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.1.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0.2&lt;/P&gt;&lt;P&gt;description VLAN2 Interface&lt;/P&gt;&lt;P&gt;vlan 2&lt;/P&gt;&lt;P&gt;nameif VLAN2&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.2.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0.3&lt;/P&gt;&lt;P&gt;description VLAN3 Interface&lt;/P&gt;&lt;P&gt;vlan 3&lt;/P&gt;&lt;P&gt;nameif VLAN3&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.3.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0.4&lt;/P&gt;&lt;P&gt;description VLAN4 Interface&lt;/P&gt;&lt;P&gt;vlan 4&lt;/P&gt;&lt;P&gt;nameif VLAN4&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.4.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0.5&lt;/P&gt;&lt;P&gt;description VLAN5 Interface&lt;/P&gt;&lt;P&gt;vlan 5&lt;/P&gt;&lt;P&gt;nameif VLAN5&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.5.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0.6&lt;/P&gt;&lt;P&gt;description VLAN6 Interface&lt;/P&gt;&lt;P&gt;vlan 6&lt;/P&gt;&lt;P&gt;nameif VLAN6&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.6.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0.7&lt;/P&gt;&lt;P&gt;description VLAN7 Interface&lt;/P&gt;&lt;P&gt;vlan 7&lt;/P&gt;&lt;P&gt;nameif VLAN7&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.7.254 255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At this moment i cannot ping/browse any hosts between the VLAN's. For example if i'm on VLAN5 i cannot ping or browse a server in VLAN3. This is ok&lt;/P&gt;&lt;P&gt;But on VLAN3 i have an Intranet Webserver (192.168.3.5), which must be available in for example VLAN5 and VLAN4.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How do i acomplish this.?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:57:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-allow-http-traffic-between-two-vlan-s/m-p/2382298#M310014</guid>
      <dc:creator>Robbert Tol</dc:creator>
      <dc:date>2019-03-12T02:57:58Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 Allow HTTP traffic between two VLAN's</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-allow-http-traffic-between-two-vlan-s/m-p/2382299#M310015</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Since all subinterfaces have the same security level, you will need to enable 'same-security-trafic permit intra-interface'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would also configure an ACL as well. This should be able to resolve that issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Oct 2013 12:34:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-allow-http-traffic-between-two-vlan-s/m-p/2382299#M310015</guid>
      <dc:creator>JohnTylerPearce</dc:creator>
      <dc:date>2013-10-30T12:34:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Allow HTTP traffic between two VLAN's</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-allow-http-traffic-between-two-vlan-s/m-p/2382300#M310016</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest forgetting the&lt;STRONG&gt; "security-level"&lt;/STRONG&gt; completely with regards to controlling traffic. As soon as you run into a situation where you want to allow some traffic and block rest of the traffic between some interface the&lt;STRONG&gt; "security-level" &lt;/STRONG&gt;wont be able to accomplish what you want. At the moment reinserting the &lt;STRONG&gt;"same-security-traffic permit inter-interface"&lt;/STRONG&gt; would be the quick way to allow traffic but without interface ACLs this would allow all traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can easily mimic the &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; situation at the moment with an interface ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could for example do this for each interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network INTERNAL-NETWORKS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; description All Internal Networks&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 192.168.1.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 192.168.2.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 192.168.3.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 192.168.4.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 192.168.5.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 192.168.6.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 192.168.7.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list VLAN1-IN remark Block traffic to any other VLAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list VLAN1-IN deny ip any object-group INTERNAL-NETWORKS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list VLAN1-IN remark Allow traffic to External networks&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list VLAN1-IN permit ip 192.168.1.0 255.255.255.0 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group VLAN1-IN in interface VLAN1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now before you configure the above ACL to the interface with the &lt;STRONG&gt;"access-group"&lt;/STRONG&gt; command above you could for example allow some traffic that you need to avoid the block. Lets say that VLAN1 needs access to VLAN2 server 192.168.2.100 with TCP/80 you could add this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list VLAN1-IN line 1 remark Allow HTTP to VLAN2 Server&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list VLAN1-IN line 2 permit tcp 192.168.1.0 255.255.255.0 host 192.168.2.100 eq 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And the ACL would look like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list VLAN1-IN remark Allow HTTP to VLAN2 Server&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list VLAN1-IN permit tcp 192.168.1.0 255.255.255.0 host 192.168.2.100 eq 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list VLAN1-IN remark Block traffic to any other VLAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list VLAN1-IN deny ip any object-group INTERNAL-NETWORKS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list VLAN1-IN remark Allow traffic to External networks&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list VLAN1-IN permit ip 192.168.1.0 255.255.255.0 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So what we essentially do above is we first allow the traffic that we want to permit between the Vlans and then block all other communication to other internal networks. After this we further allow all other traffic which would enable connections to the Internet. Since we blocked all the Internal networks earlier in the ACL this last rule would not allow the Internal traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you wanted to add some other Inter Vlan connections you would add them to the top of the interface ACL in question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice I added all the networks to the single &lt;STRONG&gt;"object-group"&lt;/STRONG&gt;. This wont block traffic inside the same Internal Vlan networks as those hosts communicate directly without ASA in between.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should be able to use the above example to build an ACL for each Vlan interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do remember to mark a reply as the correct answer if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feel free to ask more if needed &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Oct 2013 12:34:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-allow-http-traffic-between-two-vlan-s/m-p/2382300#M310016</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-30T12:34:54Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Allow HTTP traffic between two VLAN's</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-allow-http-traffic-between-two-vlan-s/m-p/2382301#M310017</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;JouniForss, I thought by default, that if you have multiple interfaces(sub-interfaces) with the same security level, by default, they could not communicate to each other. Or would you have to configure an ACL to get this working and not use the 'same-security-traffic permit inter-area' which would, like you said, permit all traffic by default?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Oct 2013 18:37:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-allow-http-traffic-between-two-vlan-s/m-p/2382301#M310017</guid>
      <dc:creator>JohnTylerPearce</dc:creator>
      <dc:date>2013-10-30T18:37:26Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 Allow HTTP traffic between two VLAN's</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-allow-http-traffic-between-two-vlan-s/m-p/2382302#M310018</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By default if you have all interface with &lt;STRONG&gt;"security-level 100"&lt;/STRONG&gt; value for example then they could not communicate in any way. Even if you added ACLs on the interfaces to permit all traffic. Your ASA would give out log messages that wouldnt really give any indication that the &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; was the problem which I think is a problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you only add &lt;STRONG&gt;"same-security-traffic permit inter-interface"&lt;/STRONG&gt; and have NO interface ACLs then all traffic between these same &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; interfaces is permitted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the user above would have a couple of options.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;He could either change the &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; values of each interface so that they are different from eachother and then configure ACLs to the interfaces to allow traffic that is needed and block that which is required. Since no interface has equal &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; with eachother then interface ACLs are enough to control traffic.&lt;/LI&gt;&lt;LI&gt;He could insert &lt;STRONG&gt;"same-security-traffic permit inter-interface"&lt;/STRONG&gt; which would essentially first enable traffic between these equal &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; interfaces and then he could add the interface ACLs suggest to control the traffic as he saw fit.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Oct 2013 18:47:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-allow-http-traffic-between-two-vlan-s/m-p/2382302#M310018</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-30T18:47:14Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 Allow HTTP traffic between two VLAN's</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-allow-http-traffic-between-two-vlan-s/m-p/2382303#M310019</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the information JouniForss, I appreciate it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Oct 2013 19:28:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-allow-http-traffic-between-two-vlan-s/m-p/2382303#M310019</guid>
      <dc:creator>JohnTylerPearce</dc:creator>
      <dc:date>2013-10-30T19:28:30Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Allow HTTP traffic between two VLAN's</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-allow-http-traffic-between-two-vlan-s/m-p/2382304#M310020</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks mate! I will test it next week! It looks good to me. Let you know if it works!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Robbert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Oct 2013 11:35:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-allow-http-traffic-between-two-vlan-s/m-p/2382304#M310020</guid>
      <dc:creator>Robbert Tol</dc:creator>
      <dc:date>2013-10-31T11:35:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Allow HTTP traffic between two VLAN's</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-allow-http-traffic-between-two-vlan-s/m-p/2382305#M310021</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I finally got the time to test it, but it doesn't work. Below is my config. I replaced some IP-Adresses and names in the config, but futhermore there is no change in the config.&lt;/P&gt;&lt;P&gt;If i look in the debuglog, i see te following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2 Nov 14 2013 10:23:44 106001 192.168.5.242 49861 192.168.3.5 80 Inbound TCP connection denied from 192.168.5.242/49861 to 192.168.3.5/80 flags SYN&amp;nbsp; on interface VLAN5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please advise...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; sh config&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;: Written by enable_15 at 10:19:37.637 CEST Thu Nov 14 2013&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ASA Version 9.1(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ASA5510&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; description Inside LAN Interface ASA5510&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0.1&lt;/P&gt;&lt;P&gt; vlan 1&lt;/P&gt;&lt;P&gt; nameif VLAN1&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0.2&lt;/P&gt;&lt;P&gt; description Company_2 VLAN2 Interface&lt;/P&gt;&lt;P&gt; vlan 2&lt;/P&gt;&lt;P&gt; nameif VLAN2&lt;/P&gt;&lt;P&gt; security-level 95&lt;/P&gt;&lt;P&gt; ip address 192.168.2.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0.3&lt;/P&gt;&lt;P&gt; description Company_3 VLAN3 Interface&lt;/P&gt;&lt;P&gt; vlan 3&lt;/P&gt;&lt;P&gt; nameif VLAN3&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.3.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0.4&lt;/P&gt;&lt;P&gt; description Company_4 VLAN4 Interface&lt;/P&gt;&lt;P&gt; vlan 4&lt;/P&gt;&lt;P&gt; nameif VLAN4&lt;/P&gt;&lt;P&gt; security-level 85&lt;/P&gt;&lt;P&gt; ip address 192.168.4.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0.5&lt;/P&gt;&lt;P&gt; description Company_5 VLAN5 Interface&lt;/P&gt;&lt;P&gt; vlan 5&lt;/P&gt;&lt;P&gt; nameif VLAN5&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.5.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0.6&lt;/P&gt;&lt;P&gt; description Company_6 VLAN6 Interface&lt;/P&gt;&lt;P&gt; vlan 6&lt;/P&gt;&lt;P&gt; nameif VLAN6&lt;/P&gt;&lt;P&gt; security-level 75&lt;/P&gt;&lt;P&gt; ip address 192.168.6.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0.7&lt;/P&gt;&lt;P&gt; description Hotspot VLAN7 Interface&lt;/P&gt;&lt;P&gt; vlan 7&lt;/P&gt;&lt;P&gt; nameif VLAN7&lt;/P&gt;&lt;P&gt; security-level 70&lt;/P&gt;&lt;P&gt; ip address 192.168.7.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; description WAN Interface&amp;nbsp; Cisco ASA&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.10.1.174 255.255.255.240&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; description Management Interface ASA5510&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.100.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CEST 1&lt;/P&gt;&lt;P&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;/P&gt;&lt;P&gt;dns domain-lookup VLAN1&lt;/P&gt;&lt;P&gt;dns domain-lookup VLAN2&lt;/P&gt;&lt;P&gt;dns domain-lookup VLAN3&lt;/P&gt;&lt;P&gt;dns domain-lookup VLAN4&lt;/P&gt;&lt;P&gt;dns domain-lookup VLAN5&lt;/P&gt;&lt;P&gt;dns domain-lookup VLAN6&lt;/P&gt;&lt;P&gt;dns domain-lookup VLAN7&lt;/P&gt;&lt;P&gt;dns domain-lookup outside&lt;/P&gt;&lt;P&gt;dns domain-lookup management&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 8.8.8.8&lt;/P&gt;&lt;P&gt; name-server 8.8.4.4&lt;/P&gt;&lt;P&gt; name-server 209.244.0.3&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object network Company_3APP01_Server_LAN&lt;/P&gt;&lt;P&gt; host 192.168.3.5&lt;/P&gt;&lt;P&gt;object network CAEX01_Server_LAN&lt;/P&gt;&lt;P&gt; host 192.168.5.43&lt;/P&gt;&lt;P&gt;object network CAEX01_Server_WAN&lt;/P&gt;&lt;P&gt; host 10.10.1.162&lt;/P&gt;&lt;P&gt;object network CATS2_Server_LAN&lt;/P&gt;&lt;P&gt; host 192.168.5.14&lt;/P&gt;&lt;P&gt; description Company_5 Terminal Server LAN&lt;/P&gt;&lt;P&gt;object network CATS2_Server_WAN&lt;/P&gt;&lt;P&gt; host 10.10.1.163&lt;/P&gt;&lt;P&gt;object network CABH01_Server_LAN_Port_90&lt;/P&gt;&lt;P&gt; host 192.168.5.44&lt;/P&gt;&lt;P&gt; description Company_5 CABH01 Beheer Server Port 90&lt;/P&gt;&lt;P&gt;object network CAPC033_Server_WAN&lt;/P&gt;&lt;P&gt; host 10.10.1.164&lt;/P&gt;&lt;P&gt;object network CACROW02_Server_LAN&lt;/P&gt;&lt;P&gt; host 192.168.5.200&lt;/P&gt;&lt;P&gt;object network WWWTest_Server_LAN&lt;/P&gt;&lt;P&gt; host 192.168.5.50&lt;/P&gt;&lt;P&gt;object network CABH01_Server_LAN_Port_91&lt;/P&gt;&lt;P&gt; host 192.168.5.44&lt;/P&gt;&lt;P&gt; description Company_5 CABH01 Beheer Server Port 91&lt;/P&gt;&lt;P&gt;object network ASA5510_LAN&lt;/P&gt;&lt;P&gt; host 192.168.5.254&lt;/P&gt;&lt;P&gt;object network CAAP01_Server_LAN&lt;/P&gt;&lt;P&gt; host 192.168.5.46&lt;/P&gt;&lt;P&gt;object network CANAS01_Server_LAN&lt;/P&gt;&lt;P&gt; host 192.168.5.1&lt;/P&gt;&lt;P&gt;object network CANAS02_Server_LAN&lt;/P&gt;&lt;P&gt; host 192.168.5.247&lt;/P&gt;&lt;P&gt;object network Company_5_WAN&lt;/P&gt;&lt;P&gt; host 10.10.1.168&lt;/P&gt;&lt;P&gt;object network Guest_WAN&lt;/P&gt;&lt;P&gt; host 10.10.1.169&lt;/P&gt;&lt;P&gt;object network Camera_WAN&lt;/P&gt;&lt;P&gt; host 10.10.1.170&lt;/P&gt;&lt;P&gt;object network Qompentence_WAN&lt;/P&gt;&lt;P&gt; host 10.10.1.172&lt;/P&gt;&lt;P&gt;object network Company_3_WAN&lt;/P&gt;&lt;P&gt; host 10.10.1.173&lt;/P&gt;&lt;P&gt;object network Camera_LAN&lt;/P&gt;&lt;P&gt; host 192.168.7.1&lt;/P&gt;&lt;P&gt;object network Camera_BeheerPC_LAN&lt;/P&gt;&lt;P&gt; host 192.168.7.2&lt;/P&gt;&lt;P&gt;object network VLAN1-Subnet&lt;/P&gt;&lt;P&gt; subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt; description VLAN1&amp;nbsp; Subnet&lt;/P&gt;&lt;P&gt;object network VLAN2-Subnet&lt;/P&gt;&lt;P&gt; subnet 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt; description VLAN2 Company_2 Subnet&lt;/P&gt;&lt;P&gt;object network VLAN3-Subnet&lt;/P&gt;&lt;P&gt; subnet 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt; description VLAN3 Company_3 Subnet&lt;/P&gt;&lt;P&gt;object network VLAN4-Subnet&lt;/P&gt;&lt;P&gt; subnet 192.168.4.0 255.255.255.0&lt;/P&gt;&lt;P&gt; description VLAN4 Company_4 Subnet&lt;/P&gt;&lt;P&gt;object network VLAN6-Subnet&lt;/P&gt;&lt;P&gt; subnet 192.168.6.0 255.255.255.0&lt;/P&gt;&lt;P&gt; description VLAN6 VWS&amp;nbsp; Subnet&lt;/P&gt;&lt;P&gt;object network VLAN7-Subnet&lt;/P&gt;&lt;P&gt; subnet 192.168.7.0 255.255.255.0&lt;/P&gt;&lt;P&gt; description VLAN7 Hotspot Subnet&lt;/P&gt;&lt;P&gt;object network VLAN5-Subnet&lt;/P&gt;&lt;P&gt; subnet 192.168.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt; description VLAN5 Company_5 Subnet&lt;/P&gt;&lt;P&gt;object network Public_Network&lt;/P&gt;&lt;P&gt; range 10.10.1.161 10.10.1.173&lt;/P&gt;&lt;P&gt;object network ASA5510_WAN&lt;/P&gt;&lt;P&gt; host 10.10.1.165&lt;/P&gt;&lt;P&gt;object network Company_4_WAN&lt;/P&gt;&lt;P&gt; host 10.10.1.171&lt;/P&gt;&lt;P&gt;object network Company_2_WAN&lt;/P&gt;&lt;P&gt; host 10.10.1.172&lt;/P&gt;&lt;P&gt;object network CAAP01_Server_LAN_HTTP&lt;/P&gt;&lt;P&gt; host 192.168.5.46&lt;/P&gt;&lt;P&gt; description Company_5 CAAP01 Server HTTP&lt;/P&gt;&lt;P&gt;object network CAAP01_Server_LAN_HTTPS&lt;/P&gt;&lt;P&gt; host 192.168.5.46&lt;/P&gt;&lt;P&gt; description Company_5 CAAP01 Afas Application Server HTTPS Port&lt;/P&gt;&lt;P&gt;object network CAAP01_Server_WAN&lt;/P&gt;&lt;P&gt; host 10.10.1.166&lt;/P&gt;&lt;P&gt; description Company_5 CAAP01 Afas Application Server&lt;/P&gt;&lt;P&gt;object network CACAM_Video_FTP&lt;/P&gt;&lt;P&gt; host 192.168.7.1&lt;/P&gt;&lt;P&gt; description Company_5 Video FTP Port&lt;/P&gt;&lt;P&gt;object network CACAM_Video_HTTP&lt;/P&gt;&lt;P&gt; host 192.168.7.1&lt;/P&gt;&lt;P&gt; description Company_5 Video Netwerk HTTP Port&lt;/P&gt;&lt;P&gt;object network CACROW02_Server_LAN_HTTP&lt;/P&gt;&lt;P&gt; host 192.168.5.200&lt;/P&gt;&lt;P&gt; description Company_5 CACROW02 Crow Server HTTP Port&lt;/P&gt;&lt;P&gt;object network CADC01_Server_LAN_LDAP&lt;/P&gt;&lt;P&gt; host 192.168.5.32&lt;/P&gt;&lt;P&gt; description Company_5 CADC01 Server LDAP Port&lt;/P&gt;&lt;P&gt;object network CAEX01_Server_LAN_HTTPS&lt;/P&gt;&lt;P&gt; host 192.168.5.43&lt;/P&gt;&lt;P&gt; description Company_5 CAEX01 Exchange Server HTTPS Port&lt;/P&gt;&lt;P&gt;object network CAEX01_Server_LAN_SMTP&lt;/P&gt;&lt;P&gt; host 192.168.5.43&lt;/P&gt;&lt;P&gt; description Company_5 CAEX01 Exchange Server SMTP Port&lt;/P&gt;&lt;P&gt;object network CAPC033_Server_LAN_Bibliotheek_8080&lt;/P&gt;&lt;P&gt; host 192.168.5.48&lt;/P&gt;&lt;P&gt; description Company_5 CAPC033 Server Bibliotheek Port 8080&lt;/P&gt;&lt;P&gt;object network CAPC033_Server_LAN_Intranet_HTTP&lt;/P&gt;&lt;P&gt; host 192.168.5.48&lt;/P&gt;&lt;P&gt; description Company_5 CAPC033 Intranet HTTP Port&lt;/P&gt;&lt;P&gt;object network CAPC033_Server_LAN_Intranet_HTTPS&lt;/P&gt;&lt;P&gt; host 192.168.5.48&lt;/P&gt;&lt;P&gt; description Company_5 CAPC033 Intranet HTTPS Port&lt;/P&gt;&lt;P&gt;object network CATS2_Server_LAN_Lift_HTTP&lt;/P&gt;&lt;P&gt; host 192.168.5.14&lt;/P&gt;&lt;P&gt; description Company_5 CATS2 Lift HTTP Port&lt;/P&gt;&lt;P&gt;object network CATS2_Server_LAN_RDP3389&lt;/P&gt;&lt;P&gt; host 192.168.5.14&lt;/P&gt;&lt;P&gt; description Company_5 CATS2 Terminal Server RDP Port&lt;/P&gt;&lt;P&gt;object network Company_3SBS01_Server_LAN_RDP33891&lt;/P&gt;&lt;P&gt; host 192.168.3.3&lt;/P&gt;&lt;P&gt;object network Company_3SBS01_Server_LAN_HTTPS&lt;/P&gt;&lt;P&gt; host 192.168.3.3&lt;/P&gt;&lt;P&gt; description Company_3 SBS Server HTTPS Port&lt;/P&gt;&lt;P&gt;object network Company_3SBS01_Server_LAN_PPTP&lt;/P&gt;&lt;P&gt; host 192.168.3.3&lt;/P&gt;&lt;P&gt; description Company_3 SBS01 Server PPTP Port (VPN)&lt;/P&gt;&lt;P&gt;object network Company_3SBS01_Server_LAN_SMTP&lt;/P&gt;&lt;P&gt; host 192.168.3.3&lt;/P&gt;&lt;P&gt; description Company_3 SBS01 Server SMTP Port&lt;/P&gt;&lt;P&gt;object service HTTP&lt;/P&gt;&lt;P&gt; service tcp source eq www destination eq www&lt;/P&gt;&lt;P&gt; description HTTP&lt;/P&gt;&lt;P&gt;object network CABH01_Server_LAN&lt;/P&gt;&lt;P&gt; host 192.168.5.44&lt;/P&gt;&lt;P&gt; description Company_5 CABH01 Beheer Server&lt;/P&gt;&lt;P&gt;object network Company_3SBS01_Server_LAN&lt;/P&gt;&lt;P&gt; host 192.168.3.3&lt;/P&gt;&lt;P&gt; description Company_3 SBS Server&lt;/P&gt;&lt;P&gt;object network CAPC033_Server_LAN&lt;/P&gt;&lt;P&gt; host 192.168.5.48&lt;/P&gt;&lt;P&gt; description Company_5 CAPC033 Lift en Intranet Server&lt;/P&gt;&lt;P&gt;object network HTTP_VLAN5_to_VLAN3&lt;/P&gt;&lt;P&gt; host 192.168.3.5&lt;/P&gt;&lt;P&gt; description Company_3APP01&lt;/P&gt;&lt;P&gt;object network KTAPP01_Server_VLAN3_HTTP&lt;/P&gt;&lt;P&gt;object network KTSAPP01_Server_LAN_HTTP&lt;/P&gt;&lt;P&gt; host 192.168.3.5&lt;/P&gt;&lt;P&gt;object network KTAPP01_VLAN3_HTTP&lt;/P&gt;&lt;P&gt; host 192.168.3.5&lt;/P&gt;&lt;P&gt;object-group service CAEX01-Services&lt;/P&gt;&lt;P&gt; service-object tcp destination eq smtp&lt;/P&gt;&lt;P&gt; service-object tcp destination eq https&lt;/P&gt;&lt;P&gt;object-group service CAPC033-Services&lt;/P&gt;&lt;P&gt; service-object tcp destination eq www&lt;/P&gt;&lt;P&gt; service-object tcp destination eq https&lt;/P&gt;&lt;P&gt; service-object tcp destination eq 8080&lt;/P&gt;&lt;P&gt;object-group service CABH01-Services&lt;/P&gt;&lt;P&gt; service-object tcp destination eq 90&lt;/P&gt;&lt;P&gt; service-object tcp destination eq 91&lt;/P&gt;&lt;P&gt;object-group service CADC01-Services&lt;/P&gt;&lt;P&gt; service-object tcp destination eq ldap&lt;/P&gt;&lt;P&gt;object-group service CATS2-Services&lt;/P&gt;&lt;P&gt; service-object tcp destination eq www&lt;/P&gt;&lt;P&gt; service-object tcp destination eq 3389&lt;/P&gt;&lt;P&gt;object-group service Company_3SBS01-Services&lt;/P&gt;&lt;P&gt; service-object tcp destination eq https&lt;/P&gt;&lt;P&gt; service-object tcp destination eq pptp&lt;/P&gt;&lt;P&gt; service-object tcp destination eq smtp&lt;/P&gt;&lt;P&gt; service-object tcp destination eq 3389&lt;/P&gt;&lt;P&gt;object-group service Company_3APP01-Services&lt;/P&gt;&lt;P&gt; service-object tcp destination eq www&lt;/P&gt;&lt;P&gt;object-group service CAAP01-Services&lt;/P&gt;&lt;P&gt; service-object tcp destination eq www&lt;/P&gt;&lt;P&gt; service-object tcp destination eq https&lt;/P&gt;&lt;P&gt;object-group service CACROW02-Services&lt;/P&gt;&lt;P&gt; service-object tcp destination eq www&lt;/P&gt;&lt;P&gt;object-group service CACAM-Services&lt;/P&gt;&lt;P&gt; service-object tcp destination eq www&lt;/P&gt;&lt;P&gt; service-object tcp destination eq ftp&lt;/P&gt;&lt;P&gt;object-group protocol TCPUDP&lt;/P&gt;&lt;P&gt; protocol-object udp&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt;object-group network INTERNAL-NETWORKS&lt;/P&gt;&lt;P&gt; description All Internal Networks&lt;/P&gt;&lt;P&gt; network-object 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.168.4.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.168.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.168.6.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.168.7.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_inside extended permit object-group CAEX01-Services any object CAEX01_Server_LAN&lt;/P&gt;&lt;P&gt;access-list outside_inside extended permit object-group CADC01-Services any object CAEX01_Server_LAN&lt;/P&gt;&lt;P&gt;access-list outside_inside extended permit object-group CATS2-Services any object CATS2_Server_LAN&lt;/P&gt;&lt;P&gt;access-list outside_inside extended permit object-group Company_3SBS01-Services any object Company_3SBS01_Server_LAN&lt;/P&gt;&lt;P&gt;access-list outside_inside extended permit object-group Company_3APP01-Services any object Company_3APP01_Server_LAN&lt;/P&gt;&lt;P&gt;access-list outside_inside extended permit object-group CAAP01-Services any object CAAP01_Server_LAN&lt;/P&gt;&lt;P&gt;access-list outside_inside extended permit object-group CACROW02-Services any object CACROW02_Server_LAN&lt;/P&gt;&lt;P&gt;access-list outside_inside extended permit object-group CACAM-Services any object Camera_LAN&lt;/P&gt;&lt;P&gt;access-list outside_inside extended permit object-group CAPC033-Services any object CAPC033_Server_LAN&lt;/P&gt;&lt;P&gt;access-list outside_inside extended permit object-group CABH01-Services any object CABH01_Server_LAN&lt;/P&gt;&lt;P&gt;access-list outside_inside extended permit icmp any any echo&lt;/P&gt;&lt;P&gt;access-list outside_inside extended permit udp any any range 33434 33523&lt;/P&gt;&lt;P&gt;access-list outside_inside extended permit icmp any any time-exceeded&lt;/P&gt;&lt;P&gt;access-list outside_inside extended permit icmp any any source-quench&lt;/P&gt;&lt;P&gt;access-list outside_inside extended permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list outside_inside extended permit icmp any any unreachable&lt;/P&gt;&lt;P&gt;access-list ICMPACL extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list VLAN3-IN remark Allow HTTP and HTTPS to VLAN3 WebServer&lt;/P&gt;&lt;P&gt;access-list VLAN3-IN extended permit tcp 192.168.5.0 255.255.255.0 host 192.168.3.5 eq www&lt;/P&gt;&lt;P&gt;access-list VLAN3-IN extended permit tcp 192.168.5.0 255.255.255.0 host 192.168.3.5 eq https&lt;/P&gt;&lt;P&gt;access-list VLAN3-IN remark Block traffic to any other VLAN&lt;/P&gt;&lt;P&gt;access-list VLAN3-IN extended deny ip any object-group INTERNAL-NETWORKS&lt;/P&gt;&lt;P&gt;access-list VLAN3-IN remark Allow traffic to External networks&lt;/P&gt;&lt;P&gt;access-list VLAN3-IN extended permit ip 192.168.3.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu VLAN1 1500&lt;/P&gt;&lt;P&gt;mtu VLAN2 1500&lt;/P&gt;&lt;P&gt;mtu VLAN3 1500&lt;/P&gt;&lt;P&gt;mtu VLAN4 1500&lt;/P&gt;&lt;P&gt;mtu VLAN5 1500&lt;/P&gt;&lt;P&gt;mtu VLAN6 1500&lt;/P&gt;&lt;P&gt;mtu VLAN7 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-713.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;arp permit-nonconnected&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network CAEX01_Server_LAN&lt;/P&gt;&lt;P&gt; nat (VLAN5,outside) static CAEX01_Server_WAN&lt;/P&gt;&lt;P&gt;object network CATS2_Server_LAN&lt;/P&gt;&lt;P&gt; nat (VLAN5,outside) static CATS2_Server_WAN&lt;/P&gt;&lt;P&gt;object network CABH01_Server_LAN_Port_90&lt;/P&gt;&lt;P&gt; nat (VLAN5,outside) static CAPC033_Server_WAN service tcp 90 90&lt;/P&gt;&lt;P&gt;object network CACROW02_Server_LAN&lt;/P&gt;&lt;P&gt; nat (VLAN5,outside) static Company_4_WAN&lt;/P&gt;&lt;P&gt;object network CABH01_Server_LAN_Port_91&lt;/P&gt;&lt;P&gt; nat (VLAN5,outside) static CAPC033_Server_WAN service tcp 91 91&lt;/P&gt;&lt;P&gt;object network CAAP01_Server_LAN&lt;/P&gt;&lt;P&gt; nat (VLAN5,outside) static CAAP01_Server_WAN&lt;/P&gt;&lt;P&gt;object network Camera_LAN&lt;/P&gt;&lt;P&gt; nat (VLAN7,outside) static Camera_WAN&lt;/P&gt;&lt;P&gt;object network CAAP01_Server_LAN_HTTP&lt;/P&gt;&lt;P&gt; nat (VLAN5,outside) static CAAP01_Server_WAN service tcp www www&lt;/P&gt;&lt;P&gt;object network CAAP01_Server_LAN_HTTPS&lt;/P&gt;&lt;P&gt; nat (VLAN5,outside) static CAAP01_Server_WAN service tcp https https&lt;/P&gt;&lt;P&gt;object network CACAM_Video_FTP&lt;/P&gt;&lt;P&gt; nat (VLAN7,outside) static Camera_WAN service tcp ftp ftp&lt;/P&gt;&lt;P&gt;object network CACAM_Video_HTTP&lt;/P&gt;&lt;P&gt; nat (VLAN7,outside) static Camera_WAN service tcp www www&lt;/P&gt;&lt;P&gt;object network CACROW02_Server_LAN_HTTP&lt;/P&gt;&lt;P&gt; nat (VLAN5,outside) static Company_4_WAN service tcp www www&lt;/P&gt;&lt;P&gt;object network CADC01_Server_LAN_LDAP&lt;/P&gt;&lt;P&gt; nat (VLAN5,outside) static CAEX01_Server_WAN service tcp ldap ldap&lt;/P&gt;&lt;P&gt;object network CAEX01_Server_LAN_HTTPS&lt;/P&gt;&lt;P&gt; nat (VLAN5,outside) static CAEX01_Server_WAN service tcp https https&lt;/P&gt;&lt;P&gt;object network CAEX01_Server_LAN_SMTP&lt;/P&gt;&lt;P&gt; nat (VLAN5,outside) static CAEX01_Server_WAN service tcp smtp smtp&lt;/P&gt;&lt;P&gt;object network CAPC033_Server_LAN_Bibliotheek_8080&lt;/P&gt;&lt;P&gt; nat (VLAN5,outside) static CAPC033_Server_WAN service tcp 8080 8080&lt;/P&gt;&lt;P&gt;object network CAPC033_Server_LAN_Intranet_HTTP&lt;/P&gt;&lt;P&gt; nat (VLAN5,outside) static CAPC033_Server_WAN service tcp www www&lt;/P&gt;&lt;P&gt;object network CAPC033_Server_LAN_Intranet_HTTPS&lt;/P&gt;&lt;P&gt; nat (VLAN5,outside) static CAPC033_Server_WAN service tcp https https&lt;/P&gt;&lt;P&gt;object network CATS2_Server_LAN_Lift_HTTP&lt;/P&gt;&lt;P&gt; nat (VLAN5,outside) static CATS2_Server_WAN service tcp www www&lt;/P&gt;&lt;P&gt;object network CATS2_Server_LAN_RDP3389&lt;/P&gt;&lt;P&gt; nat (VLAN5,outside) static CAEX01_Server_WAN service tcp 3389 3389&lt;/P&gt;&lt;P&gt;object network Company_3SBS01_Server_LAN_RDP33891&lt;/P&gt;&lt;P&gt; nat (VLAN3,outside) static Company_3_WAN service tcp 3389 33891&lt;/P&gt;&lt;P&gt;object network Company_3SBS01_Server_LAN_HTTPS&lt;/P&gt;&lt;P&gt; nat (VLAN3,outside) static Company_3_WAN service tcp https https&lt;/P&gt;&lt;P&gt;object network Company_3SBS01_Server_LAN_PPTP&lt;/P&gt;&lt;P&gt; nat (VLAN3,outside) static Company_3_WAN service tcp pptp pptp&lt;/P&gt;&lt;P&gt;object network Company_3SBS01_Server_LAN_SMTP&lt;/P&gt;&lt;P&gt; nat (VLAN3,outside) static Company_3_WAN service tcp smtp smtp&lt;/P&gt;&lt;P&gt;object network KTSAPP01_Server_LAN_HTTP&lt;/P&gt;&lt;P&gt; nat (VLAN3,outside) static Company_3_WAN service tcp www www&lt;/P&gt;&lt;P&gt;object network KTAPP01_VLAN3_HTTP&lt;/P&gt;&lt;P&gt; nat (VLAN3,VLAN5) static 192.168.3.5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (VLAN1,outside) after-auto source dynamic VLAN1-Subnet ASA5510_WAN&lt;/P&gt;&lt;P&gt;nat (VLAN2,outside) after-auto source dynamic VLAN2-Subnet Company_2_WAN&lt;/P&gt;&lt;P&gt;nat (VLAN3,outside) after-auto source dynamic VLAN3-Subnet Company_3_WAN&lt;/P&gt;&lt;P&gt;nat (VLAN4,outside) after-auto source dynamic VLAN4-Subnet Company_4_WAN&lt;/P&gt;&lt;P&gt;nat (VLAN5,outside) after-auto source dynamic VLAN5-Subnet Company_5_WAN&lt;/P&gt;&lt;P&gt;nat (VLAN6,outside) after-auto source dynamic VLAN6-Subnet Guest_WAN&lt;/P&gt;&lt;P&gt;nat (VLAN7,outside) after-auto source dynamic VLAN7-Subnet Camera_WAN&lt;/P&gt;&lt;P&gt;access-group VLAN3-IN in interface VLAN3&lt;/P&gt;&lt;P&gt;access-group outside_inside in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 10.10.1.161 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 192.168.5.0 255.255.255.0 VLAN5&lt;/P&gt;&lt;P&gt;http 192.168.100.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association pmtu-aging infinite&lt;/P&gt;&lt;P&gt;crypto ca trustpool policy&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.5.0 255.255.255.0 VLAN5&lt;/P&gt;&lt;P&gt;ssh 192.168.100.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics host&lt;/P&gt;&lt;P&gt;threat-detection statistics port&lt;/P&gt;&lt;P&gt;threat-detection statistics protocol&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ntp server 80.84.224.85 prefer&lt;/P&gt;&lt;P&gt;ntp server 92.63.173.24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map ICMP_CLASS&lt;/P&gt;&lt;P&gt; match access-list ICMPACL&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;class-map class-ttl&lt;/P&gt;&lt;P&gt; match any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map ICMP_POLICY&lt;/P&gt;&lt;P&gt; class ICMP_CLASS&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp error&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect pptp&lt;/P&gt;&lt;P&gt; class class-ttl&lt;/P&gt;&lt;P&gt;&amp;nbsp; set connection decrement-ttl&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; user-statistics accounting&lt;/P&gt;&lt;P&gt;policy-map type inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination address http &lt;/P&gt;&lt;P&gt;&lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination address email &lt;/P&gt;&lt;P&gt;&lt;A href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Nov 2013 09:39:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-allow-http-traffic-between-two-vlan-s/m-p/2382305#M310021</guid>
      <dc:creator>Robbert Tol</dc:creator>
      <dc:date>2013-11-14T09:39:49Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 Allow HTTP traffic between two VLAN's</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-allow-http-traffic-between-two-vlan-s/m-p/2382306#M310022</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is the fact that for traffic to pass between 2 interfaces with equal &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; you will have to have &lt;STRONG&gt;"same-security-traffic permit inter-interface"&lt;/STRONG&gt; command enabled. An &lt;STRONG&gt;"access-list"&lt;/STRONG&gt; attached to the interface alone wont be able to accomplish.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to prevent traffic between all the interfaces which now have &lt;STRONG&gt;"security-level 100"&lt;/STRONG&gt; then you would have to created the &lt;STRONG&gt;"access-list"&lt;/STRONG&gt; for each interface like I described earlier where you first block all internal traffic and then allow all other traffic (external traffic)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For actual traffic to flow then between the local interfaces you would have to add additional rules to the top of the interface ACL behind which the needed connection is initiated from.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Nov 2013 09:50:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-allow-http-traffic-between-two-vlan-s/m-p/2382306#M310022</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-11-14T09:50:52Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 Allow HTTP traffic between two VLAN's</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-allow-http-traffic-between-two-vlan-s/m-p/2382307#M310025</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for your reply!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't understand one thing (sorry for my bad english).&lt;/P&gt;&lt;P&gt;I now created the following and it seems to work&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list VLAN3-IN remark Allow HTTP and HTTPS to VLAN3 WebServer&lt;BR /&gt;access-list VLAN3-IN extended permit tcp 192.168.5.0 255.255.255.0 host 192.168.3.5 eq www&lt;BR /&gt;access-list VLAN3-IN extended permit tcp 192.168.5.0 255.255.255.0 host 192.168.3.5 eq https&lt;BR /&gt;access-list VLAN3-IN remark Block traffic to any other VLAN&lt;BR /&gt;access-list VLAN3-IN extended deny ip any object-group INTERNAL-NETWORKS&lt;BR /&gt;access-list VLAN3-IN remark Allow traffic to External networks&lt;BR /&gt;access-list VLAN3-IN extended permit ip 192.168.3.0 255.255.255.0 any&lt;BR /&gt;&lt;STRONG&gt;access-list VLAN5-IN remark Allow HTTP and HTTPS to VLAN3 WebServer&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;access-list VLAN5-IN extended permit tcp 192.168.5.0 255.255.255.0 host 192.168.3.5 eq www&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;access-list VLAN5-IN extended permit tcp 192.168.5.0 255.255.255.0 host 192.168.3.5 eq https&lt;/STRONG&gt;&lt;BR /&gt;access-list VLAN5-IN remark Block traffic to any other VLAN&lt;BR /&gt;access-list VLAN5-IN extended deny ip any object-group INTERNAL-NETWORKS&lt;BR /&gt;access-list VLAN5-IN remark Allow traffic to External networks&lt;BR /&gt;access-list VLAN5-IN extended permit ip 192.168.5.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I Also created the two access groups&lt;/P&gt;&lt;P&gt;Access-Group VLAN3-IN in interface VLAN3&lt;BR /&gt;Access-Group VLAN5-IN in interface VLAN5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is that without the bolded lines, it won't work. Why do i have to put the same rules into VLAN5 ? Or is there an more readable way ? Sorry for asking, but i'm trying to understand the Cisco Way &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; I'm still new in the ASA World.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;all the other traffic between VLAN5 and VLAN3 seems to be correctly blocked. So it looks what i wanted to accomplish.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Nov 2013 10:20:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-allow-http-traffic-between-two-vlan-s/m-p/2382307#M310025</guid>
      <dc:creator>Robbert Tol</dc:creator>
      <dc:date>2013-11-14T10:20:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Allow HTTP traffic between two VLAN's</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-allow-http-traffic-between-two-vlan-s/m-p/2382308#M310028</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems to me that you have correct ACL names and the corresponding interfaces but the address spaces are in the reverse order in the ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should be controlling the traffic FROM the network behind that interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean these ACL lines&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list VLAN3-IN remark Allow HTTP and HTTPS to VLAN3 WebServer&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list VLAN3-IN extended permit tcp 192.168.5.0 255.255.255.0 host 192.168.3.5 eq www&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list VLAN3-IN extended permit tcp 192.168.5.0 255.255.255.0 host 192.168.3.5 eq https&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Source address is from Vlan5 although this ACL is for Vlan3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Nov 2013 10:54:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-allow-http-traffic-between-two-vlan-s/m-p/2382308#M310028</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-11-14T10:54:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Allow HTTP traffic between two VLAN's</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-allow-http-traffic-between-two-vlan-s/m-p/2382309#M310030</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry i feel myself as an complete morron &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; I translated your first post wrong! Sorry for my bad english translation... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You helped me excelent! i'm beginning to ASA more and more... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx for youre patience!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Nov 2013 11:41:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-allow-http-traffic-between-two-vlan-s/m-p/2382309#M310030</guid>
      <dc:creator>Robbert Tol</dc:creator>
      <dc:date>2013-11-14T11:41:04Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 Allow HTTP traffic between two VLAN's</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-allow-http-traffic-between-two-vlan-s/m-p/2382310#M310032</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Absolutely no problem &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good thing it got sorted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Don't hesitate to post on the forums if/when you have some additional questions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Nov 2013 11:45:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-allow-http-traffic-between-two-vlan-s/m-p/2382310#M310032</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-11-14T11:45:12Z</dc:date>
    </item>
  </channel>
</rss>

