<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA connected to 3750 (Layer 3 Switch) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169295#M351518</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I just had someone check the 2960 port that connects to my ASA and it is just an access port that is in the 55 vlan.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I thought it may have been set up differently but its just an access port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That being the case, Vlan 55 is the only vlan that can access the internet. Is there soemway I can take 172.172.1.0 Vlan (for example)&amp;nbsp; and nat it to the VLAN 55?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont know I am just throwing out things...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 19 Apr 2013 18:39:33 GMT</pubDate>
    <dc:creator>Desmond Smith</dc:creator>
    <dc:date>2013-04-19T18:39:33Z</dc:date>
    <item>
      <title>ASA connected to 3750 (Layer 3 Switch)</title>
      <link>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169281#M351496</link>
      <description>&lt;P&gt;I have a an ASA 5520 connected to a Layer 3 (3750) switch (Inside) and a connection to a 2960 switch (Outside) to get to the internet. . I have created vlan interfaces on the 3750 switch and enabled ip routing on the switch to enable the vlans to communicate with each other. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vlan Interfaces on the switch:&lt;/P&gt;&lt;P&gt;Vlan 100 172.17.1&lt;/P&gt;&lt;P&gt;Vlan 200 172.18.1&lt;/P&gt;&lt;P&gt;Vlan 300 192.168.3.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want the devices connected to the 3 vlans to be able to pass through the firewall and get out to the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Question:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have connected the ASA to the 3750 by routed interfaces (10.10.10.1) --------- (10.10.10.2) and they are able to ping each other.&lt;/P&gt;&lt;P&gt;I have also put a default route on the 3750 sending all traffic from the switch to the ASA inside interface (10.10.10.1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The issue that i am having is that the ASA also connects to a 2960 which has a connection to the Internet, and they are handing off an ethernet connection from the 2960 that sits in VLAN 55 (Vlan 55 is the Internet accessible vlan).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How do I configure my ASA to send all traffic from my (3) vlans to the interfaces that connects to the 2960 switch?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:30:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169281#M351496</guid>
      <dc:creator>Desmond Smith</dc:creator>
      <dc:date>2019-03-12T01:30:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASA connected to 3750 (Layer 3 Switch)</title>
      <link>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169282#M351497</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since you are already doing Inter-Vlan routing on the L3 Switch I would suggest configuring a new Vlan that is only configure to provide a link/connectivity between the ASA and the LAN networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally it would be good if the ASA itself was acting as the L3 point of the network but naturally it doesnt have to be. Though you will not be able to control traffic between the LAN networks. Though the ASA5520 model might run into performance problems also&amp;nbsp; if the L3 point was on the ASA. This depends on the amount of traffic between the LAN networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest configuring something like this. The specific configuration/addresses/Vlan id/Port ID depends naturally on your current configurations on the devices.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN style="text-decoration: underline;"&gt;L3 Switch&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;vlan 10&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; name Link to ASA&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Vlan10&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; description Link to ASA&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip add 10.10.10.2 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip route 0.0.0.0 0.0.0.0 10.10.10.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernetx/x&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; description Link to ASA&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; switchport mode access&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; switchport access vlan 10&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; switchport nonegotiate&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; spanning-tree portfast&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no shutdown&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;ASA&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet0/1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; description Link to Core&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nameif inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; security-level 100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip add 10.10.10.1 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route inside 172.17.1.0 255.255.255.0 10.10.10.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route inside 172.18.1.0 255.255.255.0 10.10.10.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route inside 192.168.3.0 255.255.255.0 10.10.10.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For other ASA configurations like NAT and ACLs I would have to see the current ASA configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 13:31:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169282#M351497</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-18T13:31:48Z</dc:date>
    </item>
    <item>
      <title>ASA connected to 3750 (Layer 3 Switch)</title>
      <link>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169283#M351498</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Jouni thank you so much for your response!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am replacing a SOHO firewall that is currently connected that only allows one subnet (Vlan) out to the Internet, according to the previous engineer. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So for the traffic going to the internet I would put a nat statement for the 3 vlans to the outside interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Desmond&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 13:46:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169283#M351498</guid>
      <dc:creator>Desmond Smith</dc:creator>
      <dc:date>2013-04-18T13:46:36Z</dc:date>
    </item>
    <item>
      <title>ASA connected to 3750 (Layer 3 Switch)</title>
      <link>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169284#M351499</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you saying that you have another device connected to the L3 Switch that is currently handling Internet traffic? You already have a default route pointing to another device?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 13:50:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169284#M351499</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-18T13:50:34Z</dc:date>
    </item>
    <item>
      <title>ASA connected to 3750 (Layer 3 Switch)</title>
      <link>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169285#M351500</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Sorry for the confusion.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The current setup has a 3750 switch connected to a Linksys SOHO router that is handling traffic for the Internet&lt;/P&gt;&lt;P&gt;Currently, this set up only allows one of my vlans to access the Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am replacing the Linksys device with an ASA 5520 and I want all 3 of the vlans to have Internet access which is the reason for the replacement. I hope I am explaining this with some clarity. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Desmond&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 13:58:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169285#M351500</guid>
      <dc:creator>Desmond Smith</dc:creator>
      <dc:date>2013-04-18T13:58:55Z</dc:date>
    </item>
    <item>
      <title>ASA connected to 3750 (Layer 3 Switch)</title>
      <link>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169286#M351501</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you plan to make this change gradually or do you simply want to prepare the ASA configuration for the complete replacement of the Linksys and then do the change?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There might be a possibility to for example do Policy Based Routing on the 3750 for the 2 Vlans that dont have Internet access and forward all their Internet bound traffic to the ASA while still leaving the 1 Vlan to use the Linksys.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would let you test the Internet through the ASA while still having the original Internet connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure how the Policy Based Routing (PBR) will affect the 3750 performance. I have had one occasion where it caused slight problems with the performance of the device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What will the ASA use for Internet connection? Does it have a new Internet connection OR will the current Linksys connection be changed to provide the connection to the ASA and the ASA would then handle the firewalling etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully I made sense &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 14:07:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169286#M351501</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-18T14:07:55Z</dc:date>
    </item>
    <item>
      <title>ASA connected to 3750 (Layer 3 Switch)</title>
      <link>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169287#M351502</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am actually looking just to replace the older, less featured device with a new ASA 5520.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA 5520 will replace the Lnksys so the same currently used connections will also be used for the ASA connection..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am usisng the ASA to firewall off my new created&amp;nbsp; network from the other production network they have in place.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Desmond&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 14:35:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169287#M351502</guid>
      <dc:creator>Desmond Smith</dc:creator>
      <dc:date>2013-04-18T14:35:44Z</dc:date>
    </item>
    <item>
      <title>ASA connected to 3750 (Layer 3 Switch)</title>
      <link>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169288#M351503</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I guess you just have to make sure that he L3 Switch is configured with the new link to the ASA and the default route is configured to point to the ASA "inside" interface IP address so that all traffic not destined for the LAN networks is forwarded to the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA should be configured with the basic settings&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Configure one ASA interface as the one facing the ISP with the public IP address&lt;/LI&gt;&lt;LI&gt;Default route towards the ISP gateway IP&lt;/LI&gt;&lt;LI&gt;Configure one ASA interface as the "inside" interace towards the L3 Switch&lt;/LI&gt;&lt;LI&gt;Configure basic Dynamic PAT translation for all the 3 Vlan networks on the L3 Switch&lt;/LI&gt;&lt;LI&gt;Configure routes on the ASA for all the 3 Vlan networks pointing to the IP address on the new link network located on the L3 Switch&lt;/LI&gt;&lt;LI&gt;Allow traffic with ACL on the "inside" interface&lt;/LI&gt;&lt;LI&gt;Possibly configure "fixup protocol icmp" to enable ICMP Echo/Echo Reply to get through the ASA for testing purposes&lt;/LI&gt;&lt;LI&gt;etc&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 14:52:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169288#M351503</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-18T14:52:37Z</dc:date>
    </item>
    <item>
      <title>ASA connected to 3750 (Layer 3 Switch)</title>
      <link>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169289#M351505</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Jouni thank you for all of your assistance with this issue, I am confident that I will get this up and running with the assistance you provided!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again!&lt;/P&gt;&lt;P&gt;Desmond&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 15:45:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169289#M351505</guid>
      <dc:creator>Desmond Smith</dc:creator>
      <dc:date>2013-04-18T15:45:30Z</dc:date>
    </item>
    <item>
      <title>ASA connected to 3750 (Layer 3 Switch)</title>
      <link>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169290#M351507</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No problem &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please mark the question as answered (button in the reply message) or rate the reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally ask more if the need arises. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 16:47:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169290#M351507</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-18T16:47:21Z</dc:date>
    </item>
    <item>
      <title>ASA connected to 3750 (Layer 3 Switch)</title>
      <link>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169291#M351509</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Jouni I need you assistance once again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just got to the site and set up the asa, but the configuration has changed a bit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA inside interface is connected to a 3750 switch by the routed connection that you suggested on yesterday and I am able to ping the 3750 from the ASA but the outside interface of the ASA is connected to a 2960 switch that is handing off a connection to the VLan 55 that they are stating is the only VLan that has access to the Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How would I then configure the ASA to send traffic to the outside interface that has no ip address?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;Desmond&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Apr 2013 15:22:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169291#M351509</guid>
      <dc:creator>Desmond Smith</dc:creator>
      <dc:date>2013-04-19T15:22:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA connected to 3750 (Layer 3 Switch)</title>
      <link>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169292#M351511</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you edit the original post?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But anyway, I am not sure I understood correctly but seems to me that the LAN portion + ASA is possibly configured fine (Have not seen the configurations so cant say for sure)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now if your Internet connection from the ISP is provided through a 2960 switch and its has a Access mode port on Vlan55 towards the ASA then naturally you just connect that port to the ASA "outside" interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You say that you dont know how to route the traffic to the Internet from the ASA. To me it seems that there is only 2 options. You either have to know the ISP gateway IP address to which you configure the default route on the ASA OR if the previous Internet router was using DHCP to aquire the public IP address (and default route) from the ISP, then you will have to configure the ASA to also use DHCP on its outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But again, I am not all that sure on how the ASA and the switch on the "outside" is configured so its impossible to say what the situation is and give specific instructions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Apr 2013 17:04:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169292#M351511</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-19T17:04:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASA connected to 3750 (Layer 3 Switch)</title>
      <link>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169293#M351513</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jouni!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes I did edit it with my new issues.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have attached the config if you want to take a quick look.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have the interface labeled and the Gi0/2 is connected to the 2960. I have also added a subinterface for the Vlan configuration, not sure if that was correct or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Desmond&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Apr 2013 17:55:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169293#M351513</guid>
      <dc:creator>Desmond Smith</dc:creator>
      <dc:date>2013-04-19T17:55:58Z</dc:date>
    </item>
    <item>
      <title>ASA connected to 3750 (Layer 3 Switch)</title>
      <link>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169294#M351515</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have access to the 2960 switch?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To be honest if you have been originally assigned a public IP address range or a static public IP address then you should be able to get that information either from the old device or directly from the ISP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the old device was getting the public IP address from the ISP with DHCP then you will have to use DHCP on the "outside" interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have already replaced the old Linksys Internet router would it be possible that you could check its configurations to see how its WAN interface is configured. This would tell us how we need to configure the ASA "outside" interface. IF indeed the ASA will use the same line to Internet as the old Internet router/device was using.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont think you need to configure a subinterface on the ASA. IF the 2960 has a Access port towards your ASA you can simply connect the ASA Gi0/2 to that 2960 Access port. Provided that switch has a connection to ISP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Apr 2013 18:22:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169294#M351515</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-19T18:22:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA connected to 3750 (Layer 3 Switch)</title>
      <link>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169295#M351518</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I just had someone check the 2960 port that connects to my ASA and it is just an access port that is in the 55 vlan.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I thought it may have been set up differently but its just an access port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That being the case, Vlan 55 is the only vlan that can access the internet. Is there soemway I can take 172.172.1.0 Vlan (for example)&amp;nbsp; and nat it to the VLAN 55?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont know I am just throwing out things...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Apr 2013 18:39:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169295#M351518</guid>
      <dc:creator>Desmond Smith</dc:creator>
      <dc:date>2013-04-19T18:39:33Z</dc:date>
    </item>
    <item>
      <title>ASA connected to 3750 (Layer 3 Switch)</title>
      <link>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169296#M351520</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think I already posted an answer but I cant see it in this discussion for some reason. Dont know what happened.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am still not clear what the Vlan55 is. It sounds to me from your comments that it would just be another user Vlan?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or is it the Vlan between your side and ISP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What IP address range does the Vlan55 use?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is that network using as its default gateway since you say it can access Internet?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Isnt this Vlan55 behind the ASA on the 3750 or does it only exist on the 2960 switch?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Apr 2013 19:44:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169296#M351520</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-19T19:44:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASA connected to 3750 (Layer 3 Switch)</title>
      <link>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169297#M351522</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vlan 55 is a vlan that exist only on the 2960 and does not extend past the firewall, they are only handing an Ethernet connection off to my ASA which&amp;nbsp; is in Vlan 55.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The IP address range of vlan 55 is 10.63.210.128/25 and the gateway of that vlan is 10.63.210.129. Since that is a private IP address range I am assuming it is getting natted again to a public IP address space.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Desmond&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Apr 2013 20:45:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169297#M351522</guid>
      <dc:creator>Desmond Smith</dc:creator>
      <dc:date>2013-04-19T20:45:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA connected to 3750 (Layer 3 Switch)</title>
      <link>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169298#M351523</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any specific reason this Vlan55 is separate from all the other Vlans?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I guess next we could do the following steps (Presuming the ASA is still configured like in your previous posted configuration)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Remove the Subinterface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no interface Ethernet0/2.1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Aquire an IP address for the ASA&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unless you manage the Vlan55 address space you will have to ask someone to give an IP address from the Vlan55 network that you can configure on the ASA "outside" interface. When you get that IP address use it with the below configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; description Link to 2960&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt; nameif outside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.63.210.xxx 255.255.255.128&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Define a default route&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We will route all traffic to networks that are not local to the default gateway of Vlan55. Which I presume holds the Internet connectivity&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 10.63.210.129&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Define NAT0 / NAT Exempt for the LAN networks behind ASA&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As the Internet connection isnt directly connected to the ASA "outside" interface there is no need to NAT the LAN networks. So we will configure the below NAT0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list INSIDE-NAT0 remark NO NAT for LAN networks Behind ASA&lt;/P&gt;&lt;P&gt;access-list INSIDE-NAT0 permit ip 192.168.162.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list INSIDE-NAT0 permit ip 192.168.3.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list INSIDE-NAT0 permit ip 172.17.1.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list INSIDE-NAT0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Add ICMP Inspection on the ASA&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will help allowing ICMP traffic through the ASA if you are testing something with ICMP. Naturally we have to consider that there is other device controlling Internet traffic so it might prevent something.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp error&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Request that route for the 3 LAN networks are routed from the Internet router/device towards the ASA outside IP address&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We need the Internet Router/device to know where your LAN networks recide since we are not doing any NAT for the 3 LAN networks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Request that the Internet Router/device is configured with NAT rules which will allow the 3 LAN networks behind the ASA to be NATed towards Internet&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We need&amp;nbsp; the Internet Router/device also to have NAT rules on it for your 3 LAN networks so they will get NATed to a public IP address to enable Internet connectivity.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also one optional thing you can try which DOESNT require any configurations on the Internet Router to my understanding.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First you will need some IP address from the Vlan55 that you know is free and not used by any device. You then configure the "outside" interface just like in the above example. You also configure the default route just like above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But instead of NAT0 you configure PAT for the 3 LAN networks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.162.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.17.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What this will do is PAT all the traffic from the 3 LANs to the "outside" ip address of the ASA. As that IP address is part of the Vlan55 network it probably means that it has all the necesary configurations on the Internet Router/device and you potentially will be able to access Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even either of the above options work this is not an ideal setup. It would be best if the actual public IP address (or range/subnet) was configured directly on the ASA rather than some other device. And also that the Vlan55 was behind the ASA. Perhaps as its own interface if it needs to be kept separate by the other 3 LAN networks by the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But&amp;nbsp; to my understanding the main priority is to get Internet connectivity.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Whew, finally done with the writing. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Apr 2013 21:15:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169298#M351523</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-19T21:15:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASA connected to 3750 (Layer 3 Switch)</title>
      <link>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169299#M351524</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Jouni if you were here I would have to bear hug you dude!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First, I thank you for the assistance and the explanation of why this is being done. I will try your configuration suggestions on Monday or Tuesday and let you know what the results are. I am trying to get a better grasp of security as I want to go deeper in the field of study as I gain more knowledge of the Cisco security devices. You sound like you have a wealth of knowledge in the field of security and I hope I can one day gain that level of knowledge and expertise...Is that self taught or professional training?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Desmond&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Apr 2013 21:31:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169299#M351524</guid>
      <dc:creator>Desmond Smith</dc:creator>
      <dc:date>2013-04-19T21:31:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA connected to 3750 (Layer 3 Switch)</title>
      <link>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169300#M351525</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically when I was studying 2002-2007 I only covered the Ciscos CCNA and CCNP material for Routing&amp;amp;Swithing. I decided to do my Final work / Bachelors Thesis on building a small business network with Cisco Firewalls/Routers/Switches.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was completely clueless with regards to firewalls as we didnt have any courses related to Cisco firewalls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After I graduated I got to work at my local ISP and there quickly found myself configuring Firewall/VPN environments. I would say 99% of what I know are a result of simply learning from my colleagues and simply testing and going through existing configurations. Naturally all the documentation on the Internet/Cisco site are valuable also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would still say that you learn the most by just doing and when you run into some problem you usually learn even more since you really need to determine what is happening and how everything works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Courses only get you so far. Typically the courses I have gone into try to cram way too much content into short amount of time and not enough lab practices which ends up with the result that you end up forgetting the information unless you can directly apply the course contents in your work right away.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Apr 2013 21:41:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-connected-to-3750-layer-3-switch/m-p/2169300#M351525</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-19T21:41:42Z</dc:date>
    </item>
  </channel>
</rss>

