<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Simple security problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3753419#M32483</link>
    <description>&lt;P&gt;I have this config but kids with Kali can enter in the Aironet and access admin network. What im doing wrong? Is any way of resolve issue withou more hardware?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Router#sh run&lt;/P&gt;
&lt;P&gt;Building configuration...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ip dhcp excluded-address 192.168.2.1 192.168.2.2&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;ip dhcp pool STU&lt;/P&gt;
&lt;P&gt;&amp;nbsp;network 192.168.2.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;default-router 192.168.2.1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;dns-server 198.153.192.50 198.153.194.50&lt;/P&gt;
&lt;P&gt;&amp;nbsp;lease 0 2&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;ip dhcp pool ADMIN&lt;/P&gt;
&lt;P&gt;&amp;nbsp;network 192.168.8.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;default-router 192.168.8.1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;dns-server 8.8.8.8 1.1.1.1&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface FastEthernet0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;description CONNECTED TO WAN&lt;/P&gt;
&lt;P&gt;&amp;nbsp;switchport access vlan 100&lt;/P&gt;
&lt;P&gt;&amp;nbsp;no ip address&lt;/P&gt;
&lt;P&gt;&amp;nbsp;spanning-tree portfast&lt;/P&gt;
&lt;P&gt;&amp;nbsp;service-policy output p2p-drop&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface FastEthernet1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;switchport access vlan 200&lt;/P&gt;
&lt;P&gt;&amp;nbsp;no ip address&lt;/P&gt;
&lt;P&gt;&amp;nbsp;spanning-tree portfast&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface FastEthernet2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;switchport access vlan 300&lt;/P&gt;
&lt;P&gt;&amp;nbsp;no ip address&lt;/P&gt;
&lt;P&gt;&amp;nbsp;spanning-tree portfast&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface FastEthernet3&lt;/P&gt;
&lt;P&gt;&amp;nbsp;switchport trunk native vlan 100&lt;/P&gt;
&lt;P&gt;&amp;nbsp;switchport mode trunk&lt;/P&gt;
&lt;P&gt;&amp;nbsp;no ip address&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Vlan100&lt;/P&gt;
&lt;P&gt;&amp;nbsp;description WAN&lt;/P&gt;
&lt;P&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;ip nat outside&lt;/P&gt;
&lt;P&gt;&amp;nbsp;ip virtual-reassembly in&lt;/P&gt;
&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface Vlan200&lt;/P&gt;
&lt;P&gt;&amp;nbsp;description LAN&lt;/P&gt;
&lt;P&gt;&amp;nbsp;ip address 192.168.2.1 255.255.255.0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;ip nat inside&lt;/P&gt;
&lt;P&gt;&amp;nbsp;ip virtual-reassembly in&lt;/P&gt;
&lt;P&gt;&amp;nbsp;service-policy output p2p-drop&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Vlan300&lt;/P&gt;
&lt;P&gt;&amp;nbsp;description LAN_ADMIN&lt;/P&gt;
&lt;P&gt;&amp;nbsp;ip address 192.168.8.1 255.255.255.0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;ip nat inside&lt;/P&gt;
&lt;P&gt;&amp;nbsp;ip virtual-reassembly in&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;ip default-gateway 192.168.1.254&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;ip nat inside source list 100 interface Vlan100 overload&lt;/P&gt;
&lt;P&gt;ip route 0.0.0.0 0.0.0.0 192.168.1.254&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;access-list 100 permit ip 192.168.2.0 0.0.0.255 any&lt;/P&gt;
&lt;P&gt;access-list 100 permit ip 192.168.8.0 0.0.0.255 any&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;end&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Router#&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 16:30:30 GMT</pubDate>
    <dc:creator>Gabritex</dc:creator>
    <dc:date>2020-02-21T16:30:30Z</dc:date>
    <item>
      <title>Simple security problem</title>
      <link>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3753419#M32483</link>
      <description>&lt;P&gt;I have this config but kids with Kali can enter in the Aironet and access admin network. What im doing wrong? Is any way of resolve issue withou more hardware?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Router#sh run&lt;/P&gt;
&lt;P&gt;Building configuration...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ip dhcp excluded-address 192.168.2.1 192.168.2.2&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;ip dhcp pool STU&lt;/P&gt;
&lt;P&gt;&amp;nbsp;network 192.168.2.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;default-router 192.168.2.1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;dns-server 198.153.192.50 198.153.194.50&lt;/P&gt;
&lt;P&gt;&amp;nbsp;lease 0 2&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;ip dhcp pool ADMIN&lt;/P&gt;
&lt;P&gt;&amp;nbsp;network 192.168.8.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;default-router 192.168.8.1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;dns-server 8.8.8.8 1.1.1.1&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface FastEthernet0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;description CONNECTED TO WAN&lt;/P&gt;
&lt;P&gt;&amp;nbsp;switchport access vlan 100&lt;/P&gt;
&lt;P&gt;&amp;nbsp;no ip address&lt;/P&gt;
&lt;P&gt;&amp;nbsp;spanning-tree portfast&lt;/P&gt;
&lt;P&gt;&amp;nbsp;service-policy output p2p-drop&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface FastEthernet1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;switchport access vlan 200&lt;/P&gt;
&lt;P&gt;&amp;nbsp;no ip address&lt;/P&gt;
&lt;P&gt;&amp;nbsp;spanning-tree portfast&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface FastEthernet2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;switchport access vlan 300&lt;/P&gt;
&lt;P&gt;&amp;nbsp;no ip address&lt;/P&gt;
&lt;P&gt;&amp;nbsp;spanning-tree portfast&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface FastEthernet3&lt;/P&gt;
&lt;P&gt;&amp;nbsp;switchport trunk native vlan 100&lt;/P&gt;
&lt;P&gt;&amp;nbsp;switchport mode trunk&lt;/P&gt;
&lt;P&gt;&amp;nbsp;no ip address&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Vlan100&lt;/P&gt;
&lt;P&gt;&amp;nbsp;description WAN&lt;/P&gt;
&lt;P&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;ip nat outside&lt;/P&gt;
&lt;P&gt;&amp;nbsp;ip virtual-reassembly in&lt;/P&gt;
&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface Vlan200&lt;/P&gt;
&lt;P&gt;&amp;nbsp;description LAN&lt;/P&gt;
&lt;P&gt;&amp;nbsp;ip address 192.168.2.1 255.255.255.0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;ip nat inside&lt;/P&gt;
&lt;P&gt;&amp;nbsp;ip virtual-reassembly in&lt;/P&gt;
&lt;P&gt;&amp;nbsp;service-policy output p2p-drop&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Vlan300&lt;/P&gt;
&lt;P&gt;&amp;nbsp;description LAN_ADMIN&lt;/P&gt;
&lt;P&gt;&amp;nbsp;ip address 192.168.8.1 255.255.255.0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;ip nat inside&lt;/P&gt;
&lt;P&gt;&amp;nbsp;ip virtual-reassembly in&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;ip default-gateway 192.168.1.254&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;ip nat inside source list 100 interface Vlan100 overload&lt;/P&gt;
&lt;P&gt;ip route 0.0.0.0 0.0.0.0 192.168.1.254&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;access-list 100 permit ip 192.168.2.0 0.0.0.255 any&lt;/P&gt;
&lt;P&gt;access-list 100 permit ip 192.168.8.0 0.0.0.255 any&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;end&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Router#&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:30:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3753419#M32483</guid>
      <dc:creator>Gabritex</dc:creator>
      <dc:date>2020-02-21T16:30:30Z</dc:date>
    </item>
    <item>
      <title>Re: Simple security problem</title>
      <link>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3753446#M32484</link>
      <description>&lt;P&gt;its probably more usefull to drill into who you have setup security on your wifi network. can you tell us how it is configured?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;also, please sanitise your config in this post, as it has weak encyption and anyone can decrypt it in 4 seconds flat.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Nov 2018 11:16:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3753446#M32484</guid>
      <dc:creator>Dennis Mink</dc:creator>
      <dc:date>2018-11-27T11:16:03Z</dc:date>
    </item>
    <item>
      <title>Re: Simple security problem</title>
      <link>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3753486#M32485</link>
      <description>&lt;P&gt;hi, thanks for reply.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the wifi i have 2 ssid, one with access vlan 200 and SECOND with acces to vlan 300..&lt;/P&gt;</description>
      <pubDate>Tue, 27 Nov 2018 12:27:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3753486#M32485</guid>
      <dc:creator>Gabritex</dc:creator>
      <dc:date>2018-11-27T12:27:53Z</dc:date>
    </item>
    <item>
      <title>Re: Simple security problem</title>
      <link>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3754068#M32486</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As dennis mentioned, remove the passwords from your config output because anyone can decrypt '7' encrypted passwords within 1 second.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;for your problem, i am suggesting to create ACLs in router and apply to interfaces accordingly.&amp;nbsp; find below for sample,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN&gt;access-list 100&amp;nbsp;den ip 192.168.2.0 0.0.0.255 192.168.8.0 0.0.0.255&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN&gt;access-list 100 permit ip 192.168.2.0 0.0.0.255 any&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;apply this to interface 300 for in side&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;int vlan 300&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;ip access-g 100 in&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="helvetica"&gt;then your 192.168.2.0 range IPs will not be able to access 192.168.8.0 range IPs. which going through the router.&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="helvetica"&gt;if you have correctly&amp;nbsp;configured wireless network with correct VLANs, this should work.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="helvetica"&gt;regards,&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Nov 2018 05:11:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3754068#M32486</guid>
      <dc:creator>Kasun Bandara</dc:creator>
      <dc:date>2018-11-28T05:11:39Z</dc:date>
    </item>
    <item>
      <title>Re: Simple security problem</title>
      <link>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3754218#M32487</link>
      <description>&lt;P&gt;Ok, i will try your sugestion.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But i dont now if i explained well.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;kids with kali can gain complete control of aironet 1832i and join Admin wifi without knowing the password.. And them Scann IP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I think that's what's happening.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Nov 2018 10:00:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3754218#M32487</guid>
      <dc:creator>Gabritex</dc:creator>
      <dc:date>2018-11-28T10:00:16Z</dc:date>
    </item>
    <item>
      <title>Re: Simple security problem</title>
      <link>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3754227#M32488</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;i guess, then it should be issue with wireless security. use high secured encryption methods such as WAP2 in wireless SSID. becasue WEP and WPA keys are crackable. KALI contains lot of tools which can crack those methods. also use strong password without using dictionary word or only letters. use some complex password with symbols, numeric and alpha characters.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;regards,&lt;/P&gt;</description>
      <pubDate>Wed, 28 Nov 2018 10:23:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3754227#M32488</guid>
      <dc:creator>Kasun Bandara</dc:creator>
      <dc:date>2018-11-28T10:23:15Z</dc:date>
    </item>
    <item>
      <title>Re: Simple security problem</title>
      <link>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3755007#M32489</link>
      <description>&lt;P&gt;Thanks for the reply,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You are right, the problem are the ACL.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I tryed to do what you sugested and succes vlan 200 cannot ping vlan 300 but vlan 300 as no internet and vlan 200 have.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I will try to make ACL that waorks but having dificulty with that.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any sugestion more???&lt;/P&gt;</description>
      <pubDate>Thu, 29 Nov 2018 09:56:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3755007#M32489</guid>
      <dc:creator>Gabritex</dc:creator>
      <dc:date>2018-11-29T09:56:11Z</dc:date>
    </item>
    <item>
      <title>Re: Simple security problem</title>
      <link>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3755009#M32490</link>
      <description>&lt;P&gt;thanks for the reply but after all the problem are the ACL.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Trying to make one that work..&lt;/P&gt;</description>
      <pubDate>Thu, 29 Nov 2018 09:57:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3755009#M32490</guid>
      <dc:creator>Gabritex</dc:creator>
      <dc:date>2018-11-29T09:57:12Z</dc:date>
    </item>
    <item>
      <title>Re: Simple security problem</title>
      <link>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3755071#M32491</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;can you share the Interfaces and ACL part of the configuration?&lt;/P&gt;</description>
      <pubDate>Thu, 29 Nov 2018 12:08:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3755071#M32491</guid>
      <dc:creator>Kasun Bandara</dc:creator>
      <dc:date>2018-11-29T12:08:38Z</dc:date>
    </item>
    <item>
      <title>Re: Simple security problem</title>
      <link>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3755168#M32492</link>
      <description>&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;interface FastEthernet0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt; description CONNECTED TO WAN&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt; switchport access vlan 100&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt; no ip address&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt; spanning-tree portfast&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt; service-policy output p2p-drop&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;interface FastEthernet1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt; switchport access vlan 200&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt; no ip address&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt; spanning-tree portfast&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;interface FastEthernet2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt; switchport access vlan 300&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt; no ip address&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt; spanning-tree portfast&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;interface FastEthernet3&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt; switchport trunk native vlan 100&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt; switchport mode trunk&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt; no ip address&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;interface Vlan1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt; no ip address&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;interface Vlan100&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt; description WAN&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt; ip address 192.168.1.1 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt; ip nat outside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt; ip virtual-reassembly in&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;interface Vlan200&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt; description LAN&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt; ip address 192.168.2.1 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt; ip access-group 101 out&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt; ip nat inside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt; ip virtual-reassembly in&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt; service-policy output p2p-drop&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;interface Vlan300&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt; description LAN_ADMIN&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt; ip address 192.168.8.1 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt; ip access-group 100 in&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt; ip nat inside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt; ip virtual-reassembly in&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;ip default-gateway 192.168.1.254&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;ip forward-protocol nd&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;no ip http server&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;no ip http secure-server&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;ip nat inside source list 100 interface Vlan100 overload&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;ip route 0.0.0.0 0.0.0.0 192.168.1.254&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;access-list 100 deny &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;ip 192.168.2.0 0.0.0.255 192.168.8.0 0.0.0.255&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;access-list 100 permit ip 192.168.2.0 0.0.0.255 any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Nov 2018 14:39:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3755168#M32492</guid>
      <dc:creator>Gabritex</dc:creator>
      <dc:date>2018-11-29T14:39:02Z</dc:date>
    </item>
    <item>
      <title>Re: Simple security problem</title>
      <link>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3755170#M32493</link>
      <description>&lt;P&gt;Now they cannot connect but one vlan 300 cant access internet.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Nov 2018 14:41:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3755170#M32493</guid>
      <dc:creator>Gabritex</dc:creator>
      <dc:date>2018-11-29T14:41:56Z</dc:date>
    </item>
    <item>
      <title>Re: Simple security problem</title>
      <link>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3755194#M32494</link>
      <description>&lt;P&gt;only works with&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;access-list 100 permit ip 192.168.2.0 0.0.0.255 any&lt;/P&gt;
&lt;P class="p1"&gt;access-list 100 permit ip 192.168.8.0 0.0.0.255 any&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;but from vlan 200 can ping vlan 300&lt;/P&gt;</description>
      <pubDate>Thu, 29 Nov 2018 15:03:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3755194#M32494</guid>
      <dc:creator>Gabritex</dc:creator>
      <dc:date>2018-11-29T15:03:13Z</dc:date>
    </item>
    <item>
      <title>Re: Simple security problem</title>
      <link>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3755208#M32495</link>
      <description>&lt;P&gt;Hi try with below,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;interface Vlan200&lt;BR /&gt;description LAN&lt;BR /&gt;ip address 192.168.2.1 255.255.255.0&lt;BR /&gt;ip access-group 100 in&lt;BR /&gt;ip nat inside&lt;BR /&gt;interface Vlan300&lt;BR /&gt;description LAN_ADMIN&lt;BR /&gt;ip address 192.168.8.1 255.255.255.0&lt;BR /&gt;ip access-group 101 in&lt;BR /&gt;ip nat inside&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip nat inside source list 102 interface Vlan100 overload&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 192.168.1.254&lt;BR /&gt;!&lt;BR /&gt;access-list 100 deny ip 192.168.2.0 0.0.0.255 192.168.8.0 0.0.0.255&lt;BR /&gt;access-list 100 permit ip 192.168.2.0 0.0.0.255 any&lt;BR /&gt;access-list 101 permit ip 192.168.8.0 0.0.0.255 any&lt;BR /&gt;access-list 102 permit ip any any&lt;/P&gt;</description>
      <pubDate>Thu, 29 Nov 2018 15:19:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3755208#M32495</guid>
      <dc:creator>Kasun Bandara</dc:creator>
      <dc:date>2018-11-29T15:19:19Z</dc:date>
    </item>
    <item>
      <title>Re: Simple security problem</title>
      <link>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3755226#M32496</link>
      <description>&lt;P&gt;no access on any network,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;maybe this is wrong too---&amp;gt;&amp;nbsp;&lt;SPAN&gt;access-list 100 deny ip 192.168.2.0 0.0.0.255 192.168.8.0 0.0.0.255&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;this access&lt;/SPAN&gt;&lt;SPAN&gt; list is to add to vlan 300&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Nov 2018 15:33:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3755226#M32496</guid>
      <dc:creator>Gabritex</dc:creator>
      <dc:date>2018-11-29T15:33:48Z</dc:date>
    </item>
    <item>
      <title>Re: Simple security problem</title>
      <link>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3755237#M32497</link>
      <description>&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;interface Vlan200&lt;BR /&gt; description LAN&lt;BR /&gt; ip address 192.168.2.1 255.255.255.0&lt;BR /&gt; ip access-group 101 in&lt;BR /&gt; ip nat inside&lt;BR /&gt; interface Vlan300&lt;BR /&gt; description LAN_ADMIN&lt;BR /&gt; ip address 192.168.8.1 255.255.255.0&lt;BR /&gt; ip access-group 100 in&lt;BR /&gt; ip nat inside&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; ip nat inside source list 102 interface Vlan100 overload&lt;BR /&gt; ip route 0.0.0.0 0.0.0.0 192.168.1.254&lt;BR /&gt; !&lt;BR /&gt; access-list 100 deny ip 192.168.2.0 0.0.0.255 192.168.8.0 0.0.0.255&lt;BR /&gt; access-list 100 permit ip 192.168.8.0 0.0.0.255 any&lt;BR /&gt; access-list 101 permit ip 192.168.2.0 0.0.0.255 any&lt;BR /&gt; access-list 102 permit ip any any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;maybe?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Nov 2018 15:42:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3755237#M32497</guid>
      <dc:creator>Gabritex</dc:creator>
      <dc:date>2018-11-29T15:42:08Z</dc:date>
    </item>
    <item>
      <title>Re: Simple security problem</title>
      <link>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3755263#M32498</link>
      <description>&lt;P&gt;yes exactly.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Nov 2018 16:08:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3755263#M32498</guid>
      <dc:creator>Kasun Bandara</dc:creator>
      <dc:date>2018-11-29T16:08:59Z</dc:date>
    </item>
    <item>
      <title>Re: Simple security problem</title>
      <link>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3755265#M32499</link>
      <description>Yes Exactly</description>
      <pubDate>Thu, 29 Nov 2018 16:10:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3755265#M32499</guid>
      <dc:creator>Kasun Bandara</dc:creator>
      <dc:date>2018-11-29T16:10:23Z</dc:date>
    </item>
    <item>
      <title>Re: Simple security problem</title>
      <link>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3755267#M32500</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;it should be as earlier.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface Vlan200&lt;BR /&gt;description LAN&lt;BR /&gt;ip address 192.168.2.1 255.255.255.0&lt;BR /&gt;ip access-group 100 in&lt;BR /&gt;ip nat inside&lt;BR /&gt;interface Vlan300&lt;BR /&gt;description LAN_ADMIN&lt;BR /&gt;ip address 192.168.8.1 255.255.255.0&lt;BR /&gt;ip access-group 101 in&lt;BR /&gt;ip nat inside&lt;BR /&gt;!&lt;BR /&gt;ip nat inside source list 102 interface Vlan100 overload&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 192.168.1.254&lt;BR /&gt;!&lt;BR /&gt;access-list 100 deny ip 192.168.2.0 0.0.0.255 192.168.8.0 0.0.0.255&lt;BR /&gt;access-list 100 permit ip 192.168.2.0 0.0.0.255 any&lt;BR /&gt;access-list 101 permit ip 192.168.8.0 0.0.0.255 any&lt;BR /&gt;access-list 102 permit ip any any&lt;/P&gt;</description>
      <pubDate>Thu, 29 Nov 2018 16:13:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3755267#M32500</guid>
      <dc:creator>Kasun Bandara</dc:creator>
      <dc:date>2018-11-29T16:13:10Z</dc:date>
    </item>
    <item>
      <title>Re: Simple security problem</title>
      <link>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3755272#M32501</link>
      <description>&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;with this Vlan 200&amp;nbsp;cant connect to internet&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;interface Vlan200&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;description LAN&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;ip address 192.168.2.1 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;ip access-group 101 out&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;ip nat inside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;ip virtual-reassembly in&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;service-policy output p2p-drop&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;interface Vlan300&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;description LAN_ADMIN&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;ip address 192.168.8.1 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;ip access-group 100 in&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;ip nat inside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;ip virtual-reassembly in&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;ip default-gateway 192.168.1.254&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;ip forward-protocol nd&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;no ip http server&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;no ip http secure-server&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;ip nat inside source list 102 interface Vlan100 overload&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;ip route 0.0.0.0 0.0.0.0 192.168.1.254&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;access-list 101 deny&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;ip 192.168.2.0 0.0.0.255 192.168.8.0 0.0.0.255&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;access-list 101 permit ip 192.168.2.0 0.0.0.255 any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;access-list 102 permit ip any any&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Nov 2018 16:16:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3755272#M32501</guid>
      <dc:creator>Gabritex</dc:creator>
      <dc:date>2018-11-29T16:16:39Z</dc:date>
    </item>
    <item>
      <title>Re: Simple security problem</title>
      <link>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3755298#M32502</link>
      <description>&lt;P&gt;whenever I block access from one&amp;nbsp;vlan to another,&amp;nbsp;one&amp;nbsp;of them do not have web access!!!!&lt;/P&gt;</description>
      <pubDate>Thu, 29 Nov 2018 16:36:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-security-problem/m-p/3755298#M32502</guid>
      <dc:creator>Gabritex</dc:creator>
      <dc:date>2018-11-29T16:36:57Z</dc:date>
    </item>
  </channel>
</rss>

