<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Inter-Vlan Routing in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/inter-vlan-routing/m-p/2297926#M311256</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should take a &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; output from the firewall for the traffic that is not working so we see what rules/configurations the ASA applies to it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Although it does seem that the traffic should pass as you have Static Identity NAT configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside-data tcp &lt;SOURCE ip=""&gt; 12345 &lt;DESTINATION ip=""&gt; &lt;DESTINATION port=""&gt;&lt;/DESTINATION&gt;&lt;/DESTINATION&gt;&lt;/SOURCE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am also kind of wondering how your 2 WAN link setup will work. You wont be able to have 2 default routes active at the same time. I imagine connections formed inbound from the ISP link that doesnt hold the active route migth work but outbound connections from your network should only use the ISP link with active default route.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally if you have specific routes configured for the ISP link with no active default route then outbound connection forming through that ISP should work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am actually not sure which Default route will be active when you have one staticly configured and one coming through DHCP. I would imagine the one configured staticly on the ASA would win but I am not 100% sure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you were running newer software levels you would be able to use NAT to effectively have the DATA and VOIP use separate ISP link for all outbound traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 10 Oct 2013 08:27:36 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-10-10T08:27:36Z</dc:date>
    <item>
      <title>Inter-Vlan Routing</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing/m-p/2297925#M311255</link>
      <description>&lt;P&gt;Hello Everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm running into what seems like a simple issue, however I can't seem to figure out the solution. I've got an ASA 5505 with a Sec Plus license. The current setup uses the following two VLANs (inside-data, outside-data) for internet access however we will soon be adding a voip system and i've created the VLANs inside-voip and outside-voip for this. We will eventually be given a static IP for our SIP that will be assigned to outside-voip, however i need inside-data and inside-voip to be able to communicate. I've been researching inter-vlan routing but haven't had any luck making these two talk. Any help or pointers would be greatly appreciated! I've reverted to my previous running configuration and posted my running-config below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ASA-5505&lt;/P&gt;&lt;P&gt;enable password *** encrypted&lt;/P&gt;&lt;P&gt;passwd *** encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 111.111.111.199 Webserver description Webserver&lt;/P&gt;&lt;P&gt;name 111.111.111.221 SMTP description Barracuda&lt;/P&gt;&lt;P&gt;name 111.111.111.50 Exchange&lt;/P&gt;&lt;P&gt;name 111.111.111.111 PC-Josh&lt;/P&gt;&lt;P&gt;name 111.111.111.48 BlueIris&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; switchport access vlan 4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;switchport access vlan 1&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;switchport access vlan 1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;switchport access vlan 1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; switchport access vlan 3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; switchport access vlan 3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; switchport access vlan 3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside-data&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 111.111.111.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside-data&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address *.*.*.* 255.255.255.252&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt; description inside-voip&lt;/P&gt;&lt;P&gt; nameif inside-voip&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; ip address 111.111.112.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan4&lt;/P&gt;&lt;P&gt; description outside-voip&lt;/P&gt;&lt;P&gt; nameif outside-voip&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address dhcp setroute&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;dns domain-lookup inside-data&lt;/P&gt;&lt;P&gt;dns domain-lookup outside-data&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group protocol TCPUDP&lt;/P&gt;&lt;P&gt; protocol-object udp&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt;object-group network Webserver&lt;/P&gt;&lt;P&gt;object-group service VNC tcp&lt;/P&gt;&lt;P&gt; port-object eq *&lt;/P&gt;&lt;P&gt;object-group service BlueIris&lt;/P&gt;&lt;P&gt; service-object tcp eq *&lt;/P&gt;&lt;P&gt;access-list acl-outside extended permit tcp any interface outside-data eq www&lt;/P&gt;&lt;P&gt;access-list acl-outside extended permit tcp any interface outside-data eq smtp&lt;/P&gt;&lt;P&gt;access-list acl-outside extended permit tcp any interface outside-data eq imap4&lt;/P&gt;&lt;P&gt;access-list acl-outside extended permit tcp any interface outside-data eq pop3&lt;/P&gt;&lt;P&gt;access-list acl-outside extended permit tcp any interface outside-data object-group VNC&lt;/P&gt;&lt;P&gt;access-list acl-outside extended permit tcp any interface outside-data eq https&lt;/P&gt;&lt;P&gt;access-list acl-outside extended permit object-group BlueIris any interface outside-data&lt;/P&gt;&lt;P&gt;access-list acl-inside extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any 111.111.111.0 255.255.255.128&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any 111.111.111.0 255.255.255.192&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any 111.111.111.64 255.255.255.224&lt;/P&gt;&lt;P&gt;access-list Split_Tunnel_List remark Network behind ASA&lt;/P&gt;&lt;P&gt;access-list Split_Tunnel_List standard permit 111.111.111.0 255.255.255.0&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm notifications&lt;/P&gt;&lt;P&gt;mtu inside-data 1500&lt;/P&gt;&lt;P&gt;mtu outside-data 1500&lt;/P&gt;&lt;P&gt;mtu inside-voip 1500&lt;/P&gt;&lt;P&gt;mtu outside-voip 1500&lt;/P&gt;&lt;P&gt;ip local pool VPN-Pool 111.111.111.65-111.111.111.80 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (inside-data) 1 interface&lt;/P&gt;&lt;P&gt;global (outside-data) 10 interface&lt;/P&gt;&lt;P&gt;global (inside-voip) 1 111.111.112.2-111.111.112.254 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside-data) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside-data) 10 111.111.111.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside-data,outside-data) tcp interface www Webserver www netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside-data,outside-data) tcp interface smtp SMTP smtp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside-data,outside-data) tcp interface imap4 Exchange imap4 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside-data,outside-data) tcp interface pop3 Exchange pop3 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside-data,inside-data) tcp interface 5900 PC-Josh 5900 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside-data,outside-data) tcp interface https Exchange https netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside-data,outside-data) tcp interface 65513 BlueIris 65513 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside-data,inside-voip) 111.111.111.0 111.111.111.0 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside-voip,inside-data) 111.111.112.0 111.111.112.0 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group acl-inside in interface inside-data&lt;/P&gt;&lt;P&gt;access-group acl-outside in interface outside-data&lt;/P&gt;&lt;P&gt;route outside-data 0.0.0.0 0.0.0.0 *.*.*.&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa-server Users protocol ldap&lt;/P&gt;&lt;P&gt;aaa-server Users (inside-data) host 111.111.111.46&lt;/P&gt;&lt;P&gt; ldap-base-dn dc=***,dc=com&lt;/P&gt;&lt;P&gt; ldap-scope subtree&lt;/P&gt;&lt;P&gt; ldap-naming-attribute sAMAccountName&lt;/P&gt;&lt;P&gt; ldap-login-password *****&lt;/P&gt;&lt;P&gt; ldap-login-dn CN=Administrator,CN=Users,DC=***,DC=com&lt;/P&gt;&lt;P&gt; server-type microsoft&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 111.111.111.0 255.255.255.0 inside-data&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside-data&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside-data&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption des&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 30&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;no vpn-addr-assign dhcp&lt;/P&gt;&lt;P&gt;vpn-addr-assign local reuse-delay 1&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 111.111.111.0 255.255.255.0 inside-data&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd dns 111.111.111.46 111.111.111.54&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 111.111.111.30-111.111.111.45 inside-data&lt;/P&gt;&lt;P&gt;dhcpd dns 111.111.111.46 111.111.111.54 interface inside-data&lt;/P&gt;&lt;P&gt;dhcpd enable inside-data&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;group-policy Remote internal&lt;/P&gt;&lt;P&gt;group-policy Remote attributes&lt;/P&gt;&lt;P&gt; dns-server value 111.111.111.46 111.111.111.54&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec l2tp-ipsec webvpn&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value Split_Tunnel_List&lt;/P&gt;&lt;P&gt;username chfire password X0.FSIdiATUxgDxj encrypted privilege 15&lt;/P&gt;&lt;P&gt;tunnel-group Remote type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group Remote general-attributes&lt;/P&gt;&lt;P&gt; address-pool VPN-Pool&lt;/P&gt;&lt;P&gt; authentication-server-group Users&lt;/P&gt;&lt;P&gt; default-group-policy Remote&lt;/P&gt;&lt;P&gt;tunnel-group -Remote ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *****&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:ee2ddd9e1e79507330a8fc94c40e0649&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:49:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing/m-p/2297925#M311255</guid>
      <dc:creator>vince1327</dc:creator>
      <dc:date>2019-03-12T02:49:29Z</dc:date>
    </item>
    <item>
      <title>Inter-Vlan Routing</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing/m-p/2297926#M311256</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should take a &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; output from the firewall for the traffic that is not working so we see what rules/configurations the ASA applies to it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Although it does seem that the traffic should pass as you have Static Identity NAT configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside-data tcp &lt;SOURCE ip=""&gt; 12345 &lt;DESTINATION ip=""&gt; &lt;DESTINATION port=""&gt;&lt;/DESTINATION&gt;&lt;/DESTINATION&gt;&lt;/SOURCE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am also kind of wondering how your 2 WAN link setup will work. You wont be able to have 2 default routes active at the same time. I imagine connections formed inbound from the ISP link that doesnt hold the active route migth work but outbound connections from your network should only use the ISP link with active default route.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally if you have specific routes configured for the ISP link with no active default route then outbound connection forming through that ISP should work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am actually not sure which Default route will be active when you have one staticly configured and one coming through DHCP. I would imagine the one configured staticly on the ASA would win but I am not 100% sure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you were running newer software levels you would be able to use NAT to effectively have the DATA and VOIP use separate ISP link for all outbound traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Oct 2013 08:27:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing/m-p/2297926#M311256</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-10T08:27:36Z</dc:date>
    </item>
    <item>
      <title>Inter-Vlan Routing</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing/m-p/2297927#M311257</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the help, I've actually got it running with some ACL and NAT, maybe half an hour after the question was approved for posting, haha. With the dual WAN setup, I was going to set up Eth0/0 and Eth0/1 as two seperate static IP's, one to provide connectivity for data-inside VLAN and one for voip-inside VLAN. I didn't realize the ASA was limited in this regard, however I've found a few posts on the forums agreeing with you and a few disagreeing with you as well. I'm really hoping this will work as our ISP will be providing a second static IP to use for SIP. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Vince&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Oct 2013 12:20:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing/m-p/2297927#M311257</guid>
      <dc:creator>vince1327</dc:creator>
      <dc:date>2013-10-10T12:20:54Z</dc:date>
    </item>
    <item>
      <title>Inter-Vlan Routing</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing/m-p/2297928#M311258</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There would be no problem if you had a single ISP link and that same ISP just provided extra IP address and routed it towards your ASAs current external public IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have 2 actual physical ISP connections at your site then you will run into the problems that I mentioned.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems to me that you have configured DHCP on the new external interface so I am thinking its a totally separate WAN connection / ISP link?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Oct 2013 12:24:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing/m-p/2297928#M311258</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-10T12:24:38Z</dc:date>
    </item>
    <item>
      <title>Inter-Vlan Routing</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing/m-p/2297929#M311259</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry to confuse, it's configured as&amp;nbsp; DHCP and down at the moment because our ISP hasn't provided us the new static just yet, i've just left it in that configuration for the moment. As for the two static IP's, we have a fibre line and the ISP is provisioning a VLAN for us comprised of a Data and SIP segement. We have a single "modem" which I will be connecting to a switch support 802.1q tagging, and i'm planning to split those two segements into two seperate ports on the swtich, and then use those access ports to feed Eth0/0 and Eth0/1 on the ASA. Essentially it saves me from having to deal with the trunking on the ASA itself. Hopefully this makes a bit more sense and can shed some light on any problems that i might run into.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks Again!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Oct 2013 12:28:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing/m-p/2297929#M311259</guid>
      <dc:creator>vince1327</dc:creator>
      <dc:date>2013-10-10T12:28:15Z</dc:date>
    </item>
    <item>
      <title>Inter-Vlan Routing</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing/m-p/2297930#M311260</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if I understood you correctly the connection from the ISP is a Trunk to your device which also has a Trunk to a switch which then has Access port for both Vlan (Data&amp;amp;Voice External) that are both connected to the ASA and the ISP provides a public IP address for each Vlan and those public IP addresses will be configured on the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the above is correct then the problem remains.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only easily implemented 2 ISP link setup (to my knowledge or that I can remember) is where the ISP links are configured to fail over (I dont mean device failover). One ISP is Active (and holds the default route out) and it is monitored and when it fails the other ISP will be used for connections for the time the main ISP link is down.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Virtualizing the ASA is sometimes an option also but your model doesnt support Multiple Context mode to my understanding.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If ALL traffic regarding to the Voice was initiated from the external network then there probably would be no problems. I assume though that you need to connect also from the internal Voice network through the external Voice interface on the ASA. And this is where it gets tricky.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If there was only certain public destination IP addresses to which the Voice section of the network needed to connect then you could simply route those destination IP addresses through the Voice external interface on the ASA. However this usually is not the case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the newer softares (8.3 and above) you would be able to manipulate the traffic a lot better because of the completely changed NAT configuration format. You could essentially define the Data LAN network to only use Data external ISP link and Voice LAN network to only use Voice external ISP link. Though this solution is something Cisco doesnt recommend and&amp;nbsp; I would personally be hesitant to suggest also since I dont know if there are some possible problems in the long run (that you dont run into in lab environments). (we handle 2 ISP setups with routers in front of ASA firewalls)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Oct 2013 12:47:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing/m-p/2297930#M311260</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-10T12:47:58Z</dc:date>
    </item>
    <item>
      <title>Inter-Vlan Routing</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing/m-p/2297931#M311261</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is there any solution you would suggest? We only really have an ASA 5505 and 3548XL at our disposal for this. I was under the assumption that you could just create two default routes in the routing table and assign them to each VLAN respectively. Would it make any difference if I were to handle the trunks internally in the ASA rather than split them at the swtich?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Oct 2013 12:58:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing/m-p/2297931#M311261</guid>
      <dc:creator>vince1327</dc:creator>
      <dc:date>2013-10-10T12:58:40Z</dc:date>
    </item>
    <item>
      <title>Inter-Vlan Routing</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing/m-p/2297932#M311262</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the ASA has 2 intefaces and both have default route configured for them then only one of those default routes will be in use. So the ASA without any tricks will only use one interface for outbound traffic according to the default route.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The trick we need is to use NAT to first force the egress interface for the traffic based on its source and destination IP address. When the egress interface is chosen by the ASA then it will use that interfaces routes. And in that case even a lower value default route could be applied for the traffic even though wihtout the NAT tricks it wouldnt be used ever.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would personally just have a single ISP link on the ASA and request the ISP to provide the needed public IP addresses for that interface. Then there would only a single default route and nothing special would be required configuration wise. Both internal networks could be NATed to a different public IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If that is not the option then I dont really see any other option with the ASA55505 other than to upgrade it to new software and use the NAT to get the desired results.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Whether you Trunk the Vlans directly to the ASA or have 2 different Vlans on the ASA and Access ports for them doesnt change the fact that you will still have 2 Vlan interfaces on the ASA that both would need to forward traffic to any destination address (hold the default route)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Oct 2013 13:25:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing/m-p/2297932#M311262</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-10T13:25:56Z</dc:date>
    </item>
    <item>
      <title>Inter-Vlan Routing</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing/m-p/2297933#M311263</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our ISP is providing a single physical link, with trunking to allow for the 2 VLANS (voice and data) to exist. Each one will have its own static IP. When you mentioned that you would want a single ISP link and then request the ISP to provide the needed public IP's, how would this be done (forgive me if that question sounds silly)? What I don't understand is why the ASA won't just allow me to set the proper NAT for each interface, a default route for each interface, and then go? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Oct 2013 13:34:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing/m-p/2297933#M311263</guid>
      <dc:creator>vince1327</dc:creator>
      <dc:date>2013-10-10T13:34:54Z</dc:date>
    </item>
    <item>
      <title>Inter-Vlan Routing</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing/m-p/2297934#M311264</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problems come from the fact that the ASA has one global routing table, 2 ISP links and both have default route.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So essentially when the traffic comes from behind a LAN interface and is targetting some external IP address the ASA will forward the packet according to the route-lookup and will only use one of the external interfaces holding the default route.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In your sofware the NAT configurations doesnt really give the same options to choose which interface the packet is forwarded out of. Its forwarded according to the routing table. I think there are some configurations to do similiar things in the old software but I dont think they enabled you to actually forward ALL traffic from one LAN to one ISP and ALL traffic from another LAN to another ISP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the new software you have an option to disable the typical route-lookup done by the ASA at the start and use the NAT configuration to determine the egress interface. This is the things that enables you to use both of the default routes. In some newer software it seemed to have problems and some additional measures in the NAT configuration were required to get the ASA perform as required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can easily confirm how the ASA behaves and forwards the traffic when you use &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command in the CLI of the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you had both the ISP links and LANs active you could then confirm what happens to the traffic from each LAN when connecting towards some external IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside-voip tcp &lt;INTERNAL ip=""&gt; 12345 8.8.8.8 80&lt;/INTERNAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside-data tcp &lt;INTERNAL ip=""&gt; 12345 8.8.8.8 80&lt;/INTERNAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; You can see what output interface is chosen, you can see what ACL rule is applied, you can see what NAT/PAT is applied, among other things.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Oct 2013 13:56:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing/m-p/2297934#M311264</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-10T13:56:42Z</dc:date>
    </item>
    <item>
      <title>Inter-Vlan Routing</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing/m-p/2297935#M311265</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll check with our Cisco rep to see if we're eligible for an IOS update as the unit is almost brand-new, it sounds like it'll make life a lot easier. Thanks for the explanation, it makes a lot of sense now, it's unfortunate that there's this limitation but I'll see what we can do. In the meantime, I'll see if our ISP can provision that second VLAN a bit quicker so that I can do some tests with the second static ip and packet-tracer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for all of your help, i'll post any results!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Oct 2013 14:21:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing/m-p/2297935#M311265</guid>
      <dc:creator>vince1327</dc:creator>
      <dc:date>2013-10-10T14:21:16Z</dc:date>
    </item>
    <item>
      <title>Inter-Vlan Routing</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing/m-p/2297936#M311266</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This post mentions the limitation of a single default route as well, however it also mentions that I can have a second external network configured and active, as long as I setup a static route. Is this possible?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/thread/2174976"&gt;https://supportforums.cisco.com/thread/2174976&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Oct 2013 14:41:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing/m-p/2297936#M311266</guid>
      <dc:creator>vince1327</dc:creator>
      <dc:date>2013-10-10T14:41:57Z</dc:date>
    </item>
    <item>
      <title>Inter-Vlan Routing</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing/m-p/2297937#M311267</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you only need to reach certain networks through the external VOIP/Voice interface of the ASA and know those network ranges then you can naturally configure static routes for them in the VOIP/Voice external interface and connections will use that ISP link because they are more specific routes than the default route.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also mentioned this in the first reply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;Naturally if you have specific routes configured for the ISP link with&amp;nbsp; no active default route then outbound connection forming through that&amp;nbsp; ISP should work.&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though I should add to that the outbound connections will work for those destination networks which you have routed towards the VOIP/Voice external interface on the ASA. The specific routes will naturally also mean that traffic from the Data LAN to those destination networks would also try to use the VOIP/Voice external interface on the ASA rather than their own DATA external interface. Again because of the more specific route to the destination network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Oct 2013 14:51:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing/m-p/2297937#M311267</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-10T14:51:46Z</dc:date>
    </item>
    <item>
      <title>Inter-Vlan Routing</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing/m-p/2297938#M311268</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok great, i'll do some testing and be sure to post back the results. Thanks a million for all of your help and clarifications, I really appreciate it!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Oct 2013 15:25:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing/m-p/2297938#M311268</guid>
      <dc:creator>vince1327</dc:creator>
      <dc:date>2013-10-10T15:25:41Z</dc:date>
    </item>
  </channel>
</rss>

