<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5505 Inter-VLAN communication in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-communication/m-p/2345335#M310876</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This section from the 8.2 software Configuration Guide seems to point to the situation I am seeing on the firewall where I tested the above example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;H2&gt; Configuration Examples for NAT Control &lt;/H2&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; When NAT control is disabled with the &lt;STRONG&gt;no-nat control&lt;/STRONG&gt; command, and a NAT and a global command pair are configured for an&amp;nbsp; interface, the real IP addresses cannot go out on other interfaces&amp;nbsp; unless you define those destinations with the &lt;STRONG&gt;nat 0 access-list&lt;/STRONG&gt; command. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; For example, the following NAT is the that one you want performed when going to the outside network: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0
&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;global (outside) 1 209.165.201.2&lt;BR /&gt;&lt;BR /&gt;&lt;/DIV&gt;&lt;P&gt; The above configuration catches everything on the inside network, so if&amp;nbsp; you do not want to translate inside addresses when they go to the DMZ,&amp;nbsp; then you need to match that traffic for NAT exemption, as shown in the&amp;nbsp; following example: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;access-list EXEMPT extended permit ip any 192.168.1.0 255.255.255.0 &lt;/DIV&gt;&lt;DIV&gt;access-list EXEMPT remark This matches any traffic going to DMZ1 &lt;/DIV&gt;&lt;DIV&gt;access-list EXEMPT extended permit ip any 10.1.1.0 255.255.255.0 &lt;/DIV&gt;&lt;DIV&gt;access-list EXEMPT remark This matches any traffic going to DMZ1 &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;nat (inside) 0 access-list EXEMPT&lt;BR /&gt;&lt;BR /&gt;&lt;/DIV&gt;&lt;P&gt; Alternately, you can perform NAT translation on all interfaces: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;nat (inside) 1 0.0.0.0 0.0.0.0 &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;global (outside) 1 209.165.201.2 &lt;/DIV&gt;&lt;DIV&gt;global (dmz1) 1 192.168.1.230 &lt;/DIV&gt;&lt;DIV&gt;global (dmz2) 1 10.1.1.230 &lt;/DIV&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What the above doesnt mention though that you can avoid the situation with the Static Identity NAT also after which the matching &lt;STRONG&gt;"nat"&lt;/STRONG&gt; statement wont be a problem anymore.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess we need to wait for Chip to get back to us whether the Static Identity NAT helped or not and if needed troubleshoot furhter&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 16 Oct 2013 13:07:51 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-10-16T13:07:51Z</dc:date>
    <item>
      <title>ASA 5505 Inter-VLAN communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-communication/m-p/2345329#M310870</link>
      <description>&lt;P&gt;I have a ASA 5505 with the base lisence.&amp;nbsp; I have configured 3 VLANs, one for the outside, one for the office and one for the guest wifi.&amp;nbsp; I cannot get the guest VLAN to communicate with the office VLAN.&amp;nbsp; There is a server I am hosting in the guest WiFi that I would like to be able to access from the office VLAN for administration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have attached my current running config, I have played around with it a lot and could not get anything to work for me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Guest VLAN: 192.168.0.0/24 Security level 50 Server IP: 192.168.0.14&lt;/P&gt;&lt;P&gt;Office VLAN: 10.0.0.0 /24 Security level 100&amp;nbsp;&amp;nbsp; My office machine: 10.0.0.5&lt;/P&gt;&lt;P&gt;3rd VLAN (security level 0) is the WAN connection, both VLANs have an internet connection, but I just cannot get the two to talk to each other.&amp;nbsp;&amp;nbsp; It is my understanding that a higher security level interface can initiate communication with a lower security interface, but that is just not happening here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you in advance.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:52:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-communication/m-p/2345329#M310870</guid>
      <dc:creator>ReikokuKo</dc:creator>
      <dc:date>2019-03-12T02:52:35Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Inter-VLAN communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-communication/m-p/2345330#M310871</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;if you want the 3 VLANs to communicate without restriction you need a security licence.&lt;/P&gt;&lt;P&gt;If you do this then the Guest VLAN won't be able to initiate connection to the Office VLAN but will reply to connection initiated by the Office VLAN:&lt;/P&gt;&lt;P&gt;interface Vlan21&lt;/P&gt;&lt;P&gt;no forward interface vlan 1&lt;/P&gt;&lt;P&gt;Also get rid of the no forward command on VLAN11.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Don't forget to rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Oct 2013 08:58:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-communication/m-p/2345330#M310871</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2013-10-16T08:58:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Inter-VLAN communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-communication/m-p/2345331#M310872</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems to me that the &lt;STRONG&gt;"no forward interface"&lt;/STRONG&gt; command is already set correctly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean its set so that no connection from WAN to WLAN are allowed because of the license limitation and seems that this is not an issue at the moment or even a requirement?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the attached configuration it would seem to me that both networks should be able to communicate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could add a NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (office,WLAN) 10.0.0.0 10.0.0.0 netmask 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And then try the connections again&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IF you need to host the server from WLAN to the WAN then you would need the additional license as mentioned by Alain above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Oct 2013 09:02:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-communication/m-p/2345331#M310872</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-16T09:02:18Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Inter-VLAN communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-communication/m-p/2345332#M310873</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I don't see the point of doing a no forward from WAN to WLAN because WAN won't be able to communicate with WLAN anyway because the security level is lower on the WAN side. Also the ASA will forward traffic from high to low without any NAT needed as no nat-control is the default so I wonder how an identity NAT would solve the problem&amp;nbsp; unless there was another routing hop involved and there was no routing information but that doesn't seem to be the case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Don't forget to rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Oct 2013 10:47:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-communication/m-p/2345332#M310873</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2013-10-16T10:47:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Inter-VLAN communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-communication/m-p/2345333#M310874</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think with Base License you can only activate the 3rd Vlan if you have it configured with&lt;STRONG&gt; "no forward interface"&lt;/STRONG&gt; command. I dont think you can use the 3rd interface unless one interface of the 3 has this configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this case the connections&amp;nbsp; were between&lt;STRONG&gt; "office"&lt;/STRONG&gt; and &lt;STRONG&gt;"WLAN"&lt;/STRONG&gt; so it seemed to me to be the most logical choice to use the &lt;STRONG&gt;"no forward interface"&lt;/STRONG&gt; command from WAN to WLAN as its configured at the moment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a couple of Base License ASA5505 at home and the above setup is actually exactly the way I have done my interface setup. I have a LAN and WLAN and WAN interfaces and WAN interface holds the &lt;STRONG&gt;"no forward interface Vlanx"&lt;/STRONG&gt; which limits traffic from WAN to WLAN. I did this configuration because I dont want to limit traffic between WLAN and LAN and also dont have any need for anyone to connect from WAN to WLAN since there are but wireless devices there. And considering the Base License requirement this was pretty much the only choice to achieve what I wanted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to the NAT,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have already forgotten a lot of the "minor" things with the older NAT format but it would seem to me that even with a firewall that has &lt;STRONG&gt;"no nat-control"&lt;/STRONG&gt; configured and there is only a &lt;STRONG&gt;"nat"&lt;/STRONG&gt; statement for certain ID number but no matching ID &lt;STRONG&gt;"global"&lt;/STRONG&gt; to the destination interface that the packet will be dropped because it matched the &lt;STRONG&gt;"nat"&lt;/STRONG&gt; statement but didnt find the matching &lt;STRONG&gt;"global"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet0/1.7&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; vlan 7&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nameif DESTINATION&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; security-level 0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip address 10.54.7.1 255.255.255.0 standby 10.54.7.254&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet0/1.2500&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; vlan 2500&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nameif SOURCE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; security-level 50&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip address x.x.x.x 255.255.255.240 standby x.x.x.y&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a network behind interface SOURCE which connects to the directly connected network 10.54.7.0/24. There only a matching &lt;STRONG&gt;"nat"&lt;/STRONG&gt; statement for the source network but no matching &lt;STRONG&gt;"global"&lt;/STRONG&gt; for the destination interface. There are no &lt;STRONG&gt;"static"&lt;/STRONG&gt; configurations between these interfaces. The &lt;STRONG&gt;"no nat-control"&lt;/STRONG&gt; setting is configured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;FW# sh run nat-control&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no nat-control&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (SOURCE) 1 10.21.0.0 255.255.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input SOURCE tcp 10.21.1.1 12345 10.54.7.100 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This end with a DROP at the NAT Phase&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 7&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Type: NAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Subtype:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result: DROP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (SOURCE) 1 10.21.0.0 255.255.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; match ip SOURCE 10.21.0.0 255.255.0.0 DESTINATION any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 2, untranslate_hits = 0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above was the reason I was suggesting the Static Identity NAT at this point as I didnt see anything wrong with the configuration otherwise&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Oct 2013 12:18:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-communication/m-p/2345333#M310874</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-16T12:18:51Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Inter-VLAN communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-communication/m-p/2345334#M310875</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;I think with Base License you can only activate the 3rd Vlan if you have it configured with&lt;STRONG&gt; "no forward interface"&lt;/STRONG&gt; command. I dont think you can use the 3rd interface unless one interface of the 3 has this configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this case the connections&amp;nbsp; were between&lt;STRONG&gt; "office"&lt;/STRONG&gt; and &lt;STRONG&gt;"WLAN"&lt;/STRONG&gt; so it seemed to me to be the most logical choice to use the &lt;STRONG&gt;"no forward interface"&lt;/STRONG&gt; command from WAN to WLAN as its configured at the moment.&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt; Yes I agree with the 3rd VLAN restriction and your answer makes sense.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Concerning NAT:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (WAN) 1 interface&lt;/P&gt;&lt;P&gt;nat (office) 1 10.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (WLAN) 1 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So it seems this is correct, office and wlan are natted on WAN so as nat-control is disabled then there shouldn't need any static identity NAT to make it work here as far as I know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Don't forget to rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Oct 2013 12:54:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-communication/m-p/2345334#M310875</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2013-10-16T12:54:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Inter-VLAN communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-communication/m-p/2345335#M310876</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This section from the 8.2 software Configuration Guide seems to point to the situation I am seeing on the firewall where I tested the above example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;H2&gt; Configuration Examples for NAT Control &lt;/H2&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; When NAT control is disabled with the &lt;STRONG&gt;no-nat control&lt;/STRONG&gt; command, and a NAT and a global command pair are configured for an&amp;nbsp; interface, the real IP addresses cannot go out on other interfaces&amp;nbsp; unless you define those destinations with the &lt;STRONG&gt;nat 0 access-list&lt;/STRONG&gt; command. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; For example, the following NAT is the that one you want performed when going to the outside network: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0
&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;global (outside) 1 209.165.201.2&lt;BR /&gt;&lt;BR /&gt;&lt;/DIV&gt;&lt;P&gt; The above configuration catches everything on the inside network, so if&amp;nbsp; you do not want to translate inside addresses when they go to the DMZ,&amp;nbsp; then you need to match that traffic for NAT exemption, as shown in the&amp;nbsp; following example: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;access-list EXEMPT extended permit ip any 192.168.1.0 255.255.255.0 &lt;/DIV&gt;&lt;DIV&gt;access-list EXEMPT remark This matches any traffic going to DMZ1 &lt;/DIV&gt;&lt;DIV&gt;access-list EXEMPT extended permit ip any 10.1.1.0 255.255.255.0 &lt;/DIV&gt;&lt;DIV&gt;access-list EXEMPT remark This matches any traffic going to DMZ1 &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;nat (inside) 0 access-list EXEMPT&lt;BR /&gt;&lt;BR /&gt;&lt;/DIV&gt;&lt;P&gt; Alternately, you can perform NAT translation on all interfaces: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;nat (inside) 1 0.0.0.0 0.0.0.0 &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;global (outside) 1 209.165.201.2 &lt;/DIV&gt;&lt;DIV&gt;global (dmz1) 1 192.168.1.230 &lt;/DIV&gt;&lt;DIV&gt;global (dmz2) 1 10.1.1.230 &lt;/DIV&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What the above doesnt mention though that you can avoid the situation with the Static Identity NAT also after which the matching &lt;STRONG&gt;"nat"&lt;/STRONG&gt; statement wont be a problem anymore.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess we need to wait for Chip to get back to us whether the Static Identity NAT helped or not and if needed troubleshoot furhter&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Oct 2013 13:07:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-communication/m-p/2345335#M310876</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-16T13:07:51Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Inter-VLAN communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-communication/m-p/2345336#M310878</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was not able to ping or access the webpage on the server with the following set:&lt;/P&gt;&lt;P&gt;static (office,WLAN) 10.0.0.0 10.0.0.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Chip&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Oct 2013 16:38:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-communication/m-p/2345336#M310878</guid>
      <dc:creator>ReikokuKo</dc:creator>
      <dc:date>2013-10-16T16:38:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Inter-VLAN communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-communication/m-p/2345337#M310879</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you issue the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input office tcp 10.0.0.5 12345 192.168.0.14 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It should test the ASA configurations. Depending on what you are going to use to manage the server you can change the port above although for this tests purpose it shouldnt matter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Post the output of the above command here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you confirmed that the server is listening on the port that you are attempting the connection?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Jouni Forss (Changed the destination port in the command)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Oct 2013 16:43:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-communication/m-p/2345337#M310879</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-16T16:43:03Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Inter-VLAN communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-communication/m-p/2345338#M310881</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am able to get to the login webpage on the WLAN VLAN, so the server is indeed working.&amp;nbsp; Attached is the output of:&lt;/P&gt;&lt;P&gt;packet-tracer input office tcp 10.0.0.5 12345 192.168.0.14 443&amp;nbsp; (server does not accept communication on 80.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Oct 2013 17:51:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-communication/m-p/2345338#M310881</guid>
      <dc:creator>ReikokuKo</dc:creator>
      <dc:date>2013-10-16T17:51:45Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Inter-VLAN communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-communication/m-p/2345339#M310883</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I presume you mean that you can access the server when you connect to it from the local WLAN network? Is it still unreachable from the OFFICE network?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; goes through just fine and matches the &lt;STRONG&gt;"static" &lt;/STRONG&gt;configuration I suggested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If connections from OFFICE to WLAN server are still not working then the next step for me would be to check the network settings on the actual server. A possible reason for not reaching the server from the OFFICE network would be if the WLAN network server is not configured with default gateway or is configured with wrong default gateway. This would explain the fact that the server could be reached from the same WLAN network (doesnt need to use default gateway) but could not be reached from another network (needs defaulte gateway to forward the return traffic back to ASA and to the OFFICE user)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Oct 2013 18:07:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-communication/m-p/2345339#M310883</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-16T18:07:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Inter-VLAN communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-communication/m-p/2345340#M310885</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alright, I got to the root of the problem.&amp;nbsp; I took out the server and attached a normal host and was able to access it with the identity NAT rules.&amp;nbsp; I've narrowed the issue down to the server, It's not accepting requests from addresses outside of it's own network.&amp;nbsp; I will have to troubleshoot that, but as far as network connectivity, the 2 VLANs are able to talk to one another now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Quick question, is there way to limit a just a specific host from one VLAN to only talk to one other host on the other VLAN with this NAT rule? Or will that have to be done through ACLs?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;EDIT:&amp;nbsp; Sorry, got ahead of myself.&amp;nbsp; I set up the static NAT rules with a /32 netmask and that seemed to do the trick.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Chip&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Oct 2013 20:29:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-communication/m-p/2345340#M310885</guid>
      <dc:creator>ReikokuKo</dc:creator>
      <dc:date>2013-10-16T20:29:38Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Inter-VLAN communication</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-communication/m-p/2345341#M310886</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The traffic controlling is best done through the ACL while keeping the NAT as simple as possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets say your requirement are the following&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Both WLAN and OFFICE can access Internet without restriction&lt;/LI&gt;&lt;LI&gt;Only single OFFICE host can access the single host on the WLAN network&lt;/LI&gt;&lt;LI&gt;All other traffic blocked between these local networks&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then if your ACL configuration is still the same as the one in the attached configuration you could do these additions&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list office line 1 remark Allow management access to WLAN network server&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list office line 2 permit tcp host 10.0.0.5 host 192.168.0.14 eq 443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list office line 3 remark Deny all traffic from OFFICE to WLAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list office line 4 deny ip any 192.168.0.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list office line 5 remark Allow Internet traffic&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list WLAN line 1 remark Deny all traffic from WLAN to OFFICE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list WLAN line 2 deny ip any 10.0.0.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list WLAN line 3 remark Allow Internet traffic&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After the additions your ACL should look like this (lines marked red are those which we added)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;access-list office remark Allow management access to WLAN network server&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;access-list office permit tcp host 10.0.0.5 host 192.168.0.14 eq 443&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;access-list office remark Deny all traffic from OFFICE to WLAN&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;access-list office deny ip any 192.168.0.0 255.255.255.0&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;access-list office remark Allow Internet traffic&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list office extended permit ip any any &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;access-list WLAN line 1 remark Deny all traffic from WLAN to OFFICE&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;access-list WLAN line 2 deny ip any 10.0.0.0 255.255.255.0&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt; &lt;STRONG&gt;access-list WLAN line 3 remark Allow Internet traffic&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list WLAN extended permit ip any any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So in short the connection you need to the WLAN network server from OFFICE host would be allowed. All other traffic would be blocked from forming from OFFICE to WLAN. Also all traffic from WLAN to OFFICE would be blocked. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since you already have the &lt;STRONG&gt;"permit ip any any"&lt;/STRONG&gt; in the existing ACLs and we insert the above ACL rules with line numbers to the top of the ACL means that Internet traffic from both WLAN and OFFICE networks would be allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you would need to allow some other traffic between the local networks you would simply add &lt;STRONG&gt;"permit" &lt;/STRONG&gt;statements/rules to the top of the ACL or atleast before the &lt;STRONG&gt;"deny"&lt;/STRONG&gt; statement/rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do remember to mark a reply as the correct answer if it answered your question and/or rate helpfull answers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feel free to ask more if needed though &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Oct 2013 20:43:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-inter-vlan-communication/m-p/2345341#M310886</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-16T20:43:41Z</dc:date>
    </item>
  </channel>
</rss>

