<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Inter-VLAN firewall or routing issues... ping only. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/inter-vlan-firewall-or-routing-issues-ping-only/m-p/2196502#M358917</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We are seeing the same issue, same scenario, will answer if we resolve.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 30 Sep 2013 15:02:53 GMT</pubDate>
    <dc:creator>gfield</dc:creator>
    <dc:date>2013-09-30T15:02:53Z</dc:date>
    <item>
      <title>Inter-VLAN firewall or routing issues... ping only.</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-firewall-or-routing-issues-ping-only/m-p/2196493#M358908</link>
      <description>&lt;P&gt;Hey folks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I ran into an issue that I just can't figure out, and need some help. I was brought in to create a new VLAN and install some WiFi APs for guest access. Nothing new. ASA 5510. So I created the new "VLAN 60" as a sub-int on eth0/1, where they already had VLAN 5. Created a dynamic NAT rule to use the outside int. Created a DHCP scope for the new VLAN 60. Made sure all the associated switch ports were trunked with dot1q encap, and allowed VLANs 5,60, etc. Everything on that end works fine. WiFi users get DHCP, get out to the net, etc. But they need to be able to hit their exchange server on VLAN 5. I can ping the server from VLAN 60, but that's it. When I do a port scan, all the major ports (80, 8080,443, 110, etc) get a no reply. Can't RDP or connect with an Outlook client. My immediate thought was inter-vlan routing. But they're on the same security level and I have the same-security-traffic permit inter and intra commands there. So I went to the firewall and put permit ip any any commands in there and disabled all other firewall commands on both of those VLANs... STILL NO GO. Any ideas? Essentially, I just need VLAN 60 to be able to talk to the server on VLAN 5 (10.10.5.19). It's killing me. The config is below. Please browse and see if there is anything that sticks out. I fear it is something so easy that I'm looking right over it. Thank you!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname xxxxxxxxxxxxxxxxxxxxxx&lt;/P&gt;&lt;P&gt;domain-name xxxxxxxxxxxxxxxxxxx&lt;/P&gt;&lt;P&gt;enable password xxxxxxxxxxxxxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;passwd xxxxxxxxxxxxxxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 64.199.xxx.xxx 255.255.255.240 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.5&lt;/P&gt;&lt;P&gt; vlan 5&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.10.5.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.60&lt;/P&gt;&lt;P&gt; vlan 60&lt;/P&gt;&lt;P&gt; nameif Room206&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.10.60.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.10.51.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif mts&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.10.50.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa804-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name xxxxxxxxxx&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_1&lt;/P&gt;&lt;P&gt; network-object 10.10.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.10.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_2&lt;/P&gt;&lt;P&gt; network-object 10.10.201.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.10.202.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.10.203.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.10.204.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.10.205.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_3&lt;/P&gt;&lt;P&gt; network-object 10.10.201.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.10.202.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.10.203.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.10.204.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.10.205.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_4&lt;/P&gt;&lt;P&gt; network-object 10.10.201.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.10.202.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.10.203.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.10.204.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.10.205.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_5&lt;/P&gt;&lt;P&gt; network-object 10.10.201.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.10.202.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.10.203.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.10.204.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.10.205.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_12&lt;/P&gt;&lt;P&gt; network-object 10.10.201.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.10.202.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.10.203.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.10.204.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.10.205.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_11&lt;/P&gt;&lt;P&gt; network-object 10.10.201.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.10.202.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.10.203.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.10.204.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.10.205.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_1 tcp&lt;/P&gt;&lt;P&gt; port-object eq ssh&lt;/P&gt;&lt;P&gt; port-object eq telnet&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_6&lt;/P&gt;&lt;P&gt; network-object host 10.10.5.32&lt;/P&gt;&lt;P&gt; network-object host 64.199.xxx.xxx&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_7&lt;/P&gt;&lt;P&gt; network-object 199.249.xxx.xxx 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object host 208.93.xxx.xxx&lt;/P&gt;&lt;P&gt;access-list acl_inside extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list acl_inside extended deny tcp any any eq 135 &lt;/P&gt;&lt;P&gt;access-list acl_inside extended deny udp any any eq 135 &lt;/P&gt;&lt;P&gt;access-list acl_inside extended deny udp any any eq tftp &lt;/P&gt;&lt;P&gt;access-list acl_inside extended deny tcp any any eq 137 &lt;/P&gt;&lt;P&gt;access-list acl_inside extended deny udp any any eq netbios-ns &lt;/P&gt;&lt;P&gt;access-list acl_inside extended deny tcp any any eq 138 &lt;/P&gt;&lt;P&gt;access-list acl_inside extended deny udp any any eq netbios-dgm &lt;/P&gt;&lt;P&gt;access-list acl_inside extended deny tcp any any eq netbios-ssn &lt;/P&gt;&lt;P&gt;access-list acl_inside extended deny udp any any eq 139 &lt;/P&gt;&lt;P&gt;access-list acl_inside extended deny tcp any any eq 445 &lt;/P&gt;&lt;P&gt;access-list acl_inside extended deny tcp any any eq 593 &lt;/P&gt;&lt;P&gt;access-list acl_inside extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 10.10.51.29 eq telnet &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 206.69.xxx.xxx eq www &lt;/P&gt;&lt;P&gt;access-list inbound extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 64.199.xxx.xxx eq ftp &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 64.199.xxx.xxx eq ftp-data &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp host 12.47.xxx.xxx host 64.199.xxx.xxx eq ssh &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 64.199.xxx.xxx eq telnet &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 64.199.xxx.xxx eq www &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 64.199.xxx.xxx eq https &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 64.199.xxx.xxx eq telnet &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp host 199.249.xxx.xxx host 64.199.xxx.xxx eq ssh &lt;/P&gt;&lt;P&gt;access-list inbound extended permit gre any host 64.199.xxx.xxx&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 64.199.xxx.xxx eq pptp &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 64.199.xxx.xxx eq 9090 &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 64.199.xxx.xxx eq 9040 &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 64.199.xxx.xxx eq www &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 64.199.xxx.xxx eq www &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 64.199.xxx.xxx eq smtp &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 64.199.xxx.xxx eq www &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 64.199.xxx.xxx eq https &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 64.199.xxx.xxx eq pop3 &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 64.199.xxx.xxx eq imap4 &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp host 199.249.xxx.xxx host 64.199.xxx.xxx eq 3389 &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp host 199.249.xxx.xxx host 64.199.xxx.xxx eq 3389 &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp host 199.249.xxx.xxx host 64.199.xxx.xxx eq 3389 &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp host 199.249.xxx.xxx host 64.199.xxx.xxx eq 3389 &lt;/P&gt;&lt;P&gt;access-list inbound extended permit ip 10.10.5.0 255.255.255.0 10.10.202.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inbound extended permit ip 10.10.5.0 255.255.255.0 10.10.203.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inbound extended permit ip 10.10.5.0 255.255.255.0 10.10.204.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inbound extended permit ip 10.10.5.0 255.255.255.0 10.10.205.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inbound extended permit ip 10.10.20.0 255.255.255.0 10.10.201.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inbound extended permit ip 10.10.20.0 255.255.255.0 10.10.202.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inbound extended permit ip 10.10.20.0 255.255.255.0 10.10.203.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inbound extended permit ip 10.10.20.0 255.255.255.0 10.10.204.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inbound extended permit ip 10.10.20.0 255.255.255.0 10.10.205.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inbound extended permit ip 10.10.201.0 255.255.255.0 10.10.20.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inbound extended permit ip 192.168.68.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list inbound extended permit ip 10.10.5.0 255.255.255.0 192.168.68.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp object-group DM_INLINE_NETWORK_7 object-group DM_INLINE_NETWORK_6 object-group DM_INLINE_TCP_1 &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 10.10.5.19 eq https &lt;/P&gt;&lt;P&gt;access-list inbound extended permit ip 10.10.60.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list mts_in extended permit tcp any host 10.10.5.32 eq ssh &lt;/P&gt;&lt;P&gt;access-list mts_in extended permit tcp any host 10.10.5.32 eq telnet &lt;/P&gt;&lt;P&gt;access-list mts_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list mts_in extended permit tcp any host 10.10.5.32 eq ftp &lt;/P&gt;&lt;P&gt;access-list mts_in extended permit tcp any host 10.10.5.32 eq ftp-data &lt;/P&gt;&lt;P&gt;access-list mts_in extended permit tcp any host 10.10.5.32 eq 1001 &lt;/P&gt;&lt;P&gt;access-list mts_in extended permit ip any 10.10.20.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list mts_in extended permit ip any host 10.10.5.36 &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap extended permit ip object-group DM_INLINE_NETWORK_1 object-group DM_INLINE_NETWORK_12 &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap extended permit ip object-group DM_INLINE_NETWORK_11 10.10.5.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_1 extended permit ip 10.10.5.0 255.255.255.0 192.168.68.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_1 extended permit ip 192.168.68.0 255.255.255.0 10.10.5.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 10.10.5.0 255.255.255.0 object-group DM_INLINE_NETWORK_2 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip object-group DM_INLINE_NETWORK_3 10.10.5.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip object-group DM_INLINE_NETWORK_4 10.10.20.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 10.10.20.0 255.255.255.0 object-group DM_INLINE_NETWORK_5 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 10.10.20.0 255.255.255.0 10.10.51.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 10.10.51.0 255.255.255.0 10.10.20.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 10.10.5.0 255.255.255.0 192.168.68.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.68.0 255.255.255.0 10.10.5.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list wireless extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list wireless extended permit ip any 10.10.5.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging asdm debugging&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;mtu mts 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;mtu Room206 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-613.bin&lt;/P&gt;&lt;P&gt;asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 101 64.199.xxx.xxx&lt;/P&gt;&lt;P&gt;global (outside) 102 64.199.xxx.xxx&lt;/P&gt;&lt;P&gt;global (outside) 103 64.199.xxx.xxx&lt;/P&gt;&lt;P&gt;global (outside) 104 64.199.xxx.xxx&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;global (outside) 105 64.199.xxx.xxx&lt;/P&gt;&lt;P&gt;global (dmz) 1 interface&lt;/P&gt;&lt;P&gt;global (dmz) 105 10.10.51.105&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.255.250.30 255.255.255.255&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.255.250.100 255.255.255.255&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.255.250.144 255.255.255.255&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.255.250.150 255.255.255.255&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.255.250.186 255.255.255.255&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.10.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (dmz) 1 10.10.51.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (Room206) 1 10.10.60.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (dmz,outside) 206.69.xxx.xxx 10.10.51.31 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (dmz,outside) 64.199.xxx.xxx 10.10.51.12 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (dmz,outside) 64.199.xxx.xxx 10.10.51.40 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,mts) 10.10.5.32 10.10.5.32 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,mts) 10.10.20.0 10.10.20.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;static (inside,mts) 10.10.5.36 10.10.5.36 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 64.199.xxx.xxx 10.10.5.21 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 64.199.xxx.xxx 10.10.5.32 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 64.199.xxx.xxx 10.10.5.20 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 64.199.xxx.xxx 10.10.5.14 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 64.199.xxx.xxx 10.10.5.17 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,Room206) 10.10.5.0 10.10.5.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;static (Room206,inside) 10.10.60.0 10.10.60.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-group inbound in interface outside&lt;/P&gt;&lt;P&gt;access-group acl_inside in interface inside&lt;/P&gt;&lt;P&gt;access-group mts_in in interface mts&lt;/P&gt;&lt;P&gt;access-group wireless in interface Room206&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 64.199.xxx.xxx 1&lt;/P&gt;&lt;P&gt;route mts 10.10.1.0 255.255.255.0 10.10.50.2 1&lt;/P&gt;&lt;P&gt;route mts 10.10.2.0 255.255.255.0 10.10.50.2 1&lt;/P&gt;&lt;P&gt;route inside 10.10.20.0 255.255.255.0 10.10.5.11 1&lt;/P&gt;&lt;P&gt;route mts 10.10.100.0 255.255.255.0 10.10.50.2 1&lt;/P&gt;&lt;P&gt;route mts 10.10.101.0 255.255.255.0 10.10.50.2 1&lt;/P&gt;&lt;P&gt;route mts 10.10.199.0 255.255.255.0 10.10.50.2 1&lt;/P&gt;&lt;P&gt;route inside 10.255.250.0 255.255.255.0 10.10.5.11 1&lt;/P&gt;&lt;P&gt;route inside 192.168.222.0 255.255.255.0 10.10.5.11 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.10.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;sysopt noproxyarp inside&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set myset esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map cisco 1 set transform-set myset&lt;/P&gt;&lt;P&gt;crypto dynamic-map cisco 1 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map cisco 1 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map RemotSiteVPN1 1 match address outside_cryptomap&lt;/P&gt;&lt;P&gt;crypto dynamic-map RemotSiteVPN1 1 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map RemotSiteVPN1 1 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map RemotSiteVPN1 1 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map RemotSiteVPN1 1 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto map dyn-map 1 ipsec-isakmp dynamic RemotSiteVPN1&lt;/P&gt;&lt;P&gt;crypto map dyn-map 2 match address outside_cryptomap_1&lt;/P&gt;&lt;P&gt;crypto map dyn-map 2 set peer 208.93.xxx.xxx &lt;/P&gt;&lt;P&gt;crypto map dyn-map 2 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map dyn-map 2 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto map dyn-map 2 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto map dyn-map 20 ipsec-isakmp dynamic cisco&lt;/P&gt;&lt;P&gt;crypto map dyn-map interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 20&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 3600&lt;/P&gt;&lt;P&gt;crypto isakmp policy 25&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 28800&lt;/P&gt;&lt;P&gt;crypto isakmp policy 50&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption des&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 3600&lt;/P&gt;&lt;P&gt;telnet 10.10.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 10.10.60.30-10.10.60.250 Room206&lt;/P&gt;&lt;P&gt;dhcpd dns 8.8.8.8 8.8.4.4 interface Room206&lt;/P&gt;&lt;P&gt;dhcpd lease 86400 interface Room206&lt;/P&gt;&lt;P&gt;dhcpd enable Room206&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P&gt;username xxxxxxx password xxxxxxxxxxxxxxxxxx encrypted privilege 15&lt;/P&gt;&lt;P&gt;tunnel-group DefaultL2LGroup ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group RemotSiteVPN1 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group RemotSiteVPN1 ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group 208.93.xxx.xxx type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 208.93.xxx.xxx ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 1024&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns migrated_dns_map_1 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:fbe6d8b4e95f180959e5692270b2d9d5&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 00:50:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-firewall-or-routing-issues-ping-only/m-p/2196493#M358908</guid>
      <dc:creator>Timothy Erk</dc:creator>
      <dc:date>2019-03-26T00:50:27Z</dc:date>
    </item>
    <item>
      <title>Inter-VLAN firewall or routing issues... ping only.</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-firewall-or-routing-issues-ping-only/m-p/2196494#M358909</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you take the output of a "packet-tracer" command that simulates one of these connections that doesnt go through&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input Room206 tcp 10.10.60.100 12345 10.10.5.19 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Apr 2013 19:33:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-firewall-or-routing-issues-ping-only/m-p/2196494#M358909</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-04T19:33:06Z</dc:date>
    </item>
    <item>
      <title>Inter-VLAN firewall or routing issues... ping only.</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-firewall-or-routing-issues-ping-only/m-p/2196495#M358910</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry it took so long to get back. Here's the output. Maybe I'm blind, but it looks like each phase is allowed. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: UN-NAT&lt;/P&gt;&lt;P&gt;Subtype: static&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,Room206) 10.10.5.0 10.10.5.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside 10.10.5.0 255.255.255.0 Room206 any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 10.10.5.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 11040&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;NAT divert to egress interface inside&lt;/P&gt;&lt;P&gt;Untranslate 10.10.5.0/0 to 10.10.5.0/0 using netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group wireless in interface Room206&lt;/P&gt;&lt;P&gt;access-list wireless extended permit ip any any &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (Room206,inside) 10.10.60.0 10.10.60.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip Room206 10.10.60.0 255.255.255.0 inside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 10.10.60.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 14727, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Static translate 10.10.60.0/0 to 10.10.60.0/0 using netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (Room206,inside) 10.10.60.0 10.10.60.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip Room206 10.10.60.0 255.255.255.0 inside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 10.10.60.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 14727, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,Room206) 10.10.5.0 10.10.5.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside 10.10.5.0 255.255.255.0 Room206 any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 10.10.5.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 11040&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,Room206) 10.10.5.0 10.10.5.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside 10.10.5.0 255.255.255.0 Room206 any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 10.10.5.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 11040&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 11&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 90518755, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 12&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: output and adjacency&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;found next-hop 10.10.5.19 using egress ifc inside&lt;/P&gt;&lt;P&gt;adjacency Active&lt;/P&gt;&lt;P&gt;next-hop mac address 0023.7ddb.482e hits 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: Room206&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 15:29:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-firewall-or-routing-issues-ping-only/m-p/2196495#M358910</guid>
      <dc:creator>Timothy Erk</dc:creator>
      <dc:date>2013-04-18T15:29:29Z</dc:date>
    </item>
    <item>
      <title>Inter-VLAN firewall or routing issues... ping only.</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-firewall-or-routing-issues-ping-only/m-p/2196496#M358911</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well it does seem that the "packet-tracer" goes through just fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you trying to connect specifically using the internal IP address 10.10.5.19? Or is DNS involved?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would you possibly need some other DNS servers in the DHCP configurations on the ASA? Perhaps some internal DNS server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess if you want to make sure if any traffic is flowing between the 2 LAN networks you could take a capture&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list WIRELESS-CAP permit ip 10.10.6.0 255.255.255.0 10.10.5.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list WIRELESS-CAP permit ip 10.10.5.0 255.255.255.0 10.10.6.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;capture WIRELESS-CAP type raw-data access-list WIRELESS-CAP interface inside buffer 10000000 circular-buffer&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally the capture ACL can be more specific if needed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After test you should be able to use the following commands to see if any traffic is captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show capture&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should also use the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show capture WIRELESS-CAP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To see what traffic was actually captured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could further copy the whole capture to a TFTP-server as a .pcap file to be opened with Wireshark&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;copy /pcap capture:WIRELESS-CAP t&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="ftp://x.x.x.x/WIRELESS-CAP.pcap"&gt;ftp://x.x.x.x/WIRELESS-CAP.pcap&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can remove the capture and its data from the ASA with command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no capture WIRELESS-CAP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 17:27:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-firewall-or-routing-issues-ping-only/m-p/2196496#M358911</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-18T17:27:11Z</dc:date>
    </item>
    <item>
      <title>Inter-VLAN firewall or routing issues... ping only.</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-firewall-or-routing-issues-ping-only/m-p/2196497#M358912</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The end goal is to have it work with DNS, but for now I'm just using a port scanner to the IP of 10.10.5.19 and all ports come up with a no-reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I changed one of the DNS servers on the DHCP scope to an internal one, 10.10.5.24.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Set up the capture, opened in wireshark, ran a port scan, and here's a bit from the TCP section of the HTTP scan packet:&lt;/P&gt;&lt;P&gt;Transmission Control Protocol, Src Port: 49981 (49981), Dst Port: http (80), Seq: 2012523545, Len: 0&lt;/P&gt;&lt;P&gt;Acknowledgment number: Broken TCP. The acknowledge field is nonzero while the ACK flag is not set&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can I copy a whole expanded packet in text from Wireshark? I can't figure it out. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 18:44:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-firewall-or-routing-issues-ping-only/m-p/2196497#M358912</guid>
      <dc:creator>Timothy Erk</dc:creator>
      <dc:date>2013-04-18T18:44:39Z</dc:date>
    </item>
    <item>
      <title>Inter-VLAN firewall or routing issues... ping only.</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-firewall-or-routing-issues-ping-only/m-p/2196498#M358913</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Another little oddity is that I can't ping the interface addresses from the opposing network. So from VLAN 60, I can't ping 10.10.5.1. And from VLAN 5 I can't ping 10.10.60.1. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Devices on VLAN 5 are being given a gateway of 10.10.5.11, which is a L3 switch that the ASA inside interface is plugged into. I have no idea why they have that set that way here, instead of pointing everything at 10.10.5.1 as the default router. But I may be able to get the password to the DHCP server and change that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And just as an FYI, the switch port that the ASA is plugged into (Cisco 3560G) is configured as follows:&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/21&lt;/P&gt;&lt;P&gt; description Uplink to ASA 5510 Inside&lt;/P&gt;&lt;P&gt; switchport trunk encapsulation dot1q&lt;/P&gt;&lt;P&gt; switchport trunk allowed vlan 1,2,5,20,51,60,250,260,999,1002-1005&lt;/P&gt;&lt;P&gt; switchport mode trunk&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I configured another port on that same switch as an access port for VLAN 60, plugged in, got a DHCP address from 60, and still can't ping 10.10.5.1 or pass any ports to VLAN 5. I can ping everything else on VLAN 5, except the the interface address. I did this just to eliminate the wireless, and any other hops in the network. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 19:03:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-firewall-or-routing-issues-ping-only/m-p/2196498#M358913</guid>
      <dc:creator>Timothy Erk</dc:creator>
      <dc:date>2013-04-18T19:03:09Z</dc:date>
    </item>
    <item>
      <title>Inter-VLAN firewall or routing issues... ping only.</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-firewall-or-routing-issues-ping-only/m-p/2196499#M358914</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem with ICMP to the remote interface is how the ASA normally works. You wont be able to do this between the different LAN interfaces. In other words, you cant ping any other interface on the ASA other than the one behind which the host doing the ICMP is. (There are some exceptions with regards to connections coming from VPN)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would it be possible to see the 3560G configurations?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 19:10:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-firewall-or-routing-issues-ping-only/m-p/2196499#M358914</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-18T19:10:35Z</dc:date>
    </item>
    <item>
      <title>Inter-VLAN firewall or routing issues... ping only.</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-firewall-or-routing-issues-ping-only/m-p/2196500#M358915</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here it is. And thank you for helping me with this. I really appreciate it!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;lstc-3560-core#sh run&lt;/P&gt;&lt;P&gt;Building configuration...&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Current configuration : 3351 bytes&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;version 12.2&lt;/P&gt;&lt;P&gt;no service pad&lt;/P&gt;&lt;P&gt;service timestamps debug uptime&lt;/P&gt;&lt;P&gt;service timestamps log uptime&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;hostname lstc-3560-core&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;no aaa new-model&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;system mtu routing 1500&lt;/P&gt;&lt;P&gt;vtp mode transparent&lt;/P&gt;&lt;P&gt;ip subnet-zero&lt;/P&gt;&lt;P&gt;ip routing&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no file verify auto&lt;/P&gt;&lt;P&gt;spanning-tree mode pvst&lt;/P&gt;&lt;P&gt;spanning-tree extend system-id&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;vlan internal allocation policy ascending&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;vlan 2,5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;vlan 20&lt;/P&gt;&lt;P&gt; name voice&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;vlan 51,60,250,260&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;vlan 999&lt;/P&gt;&lt;P&gt; name MTS_DMZ&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/8&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/9&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/11&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/12&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/13&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/14&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/15&lt;/P&gt;&lt;P&gt; switchport access vlan 60&lt;/P&gt;&lt;P&gt; switchport mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/16&lt;/P&gt;&lt;P&gt; description HP Switch to Room 206&lt;/P&gt;&lt;P&gt; switchport trunk encapsulation dot1q&lt;/P&gt;&lt;P&gt; switchport trunk native vlan 60&lt;/P&gt;&lt;P&gt; switchport trunk allowed vlan 1,2,5,20,50,51,60,206,250,260,1002-1005&lt;/P&gt;&lt;P&gt; switchport mode trunk&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/17&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/18&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/19&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/20&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet0/21&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; description Uplink to ASA 5510 Inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; switchport trunk encapsulation dot1q&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; switchport trunk allowed vlan 1,2,5,20,51,60,250,260,999,1002-1005&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; switchport mode trunk&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/22&lt;/P&gt;&lt;P&gt; description Uplink to DMZ&lt;/P&gt;&lt;P&gt; switchport access vlan 51&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/23&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/24&lt;/P&gt;&lt;P&gt; description Connection to MTSDMZ on ASA5510&lt;/P&gt;&lt;P&gt; switchport access vlan 999&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/25&lt;/P&gt;&lt;P&gt; description Uplink to mts-3b329-4006 Port Gi2/4&lt;/P&gt;&lt;P&gt; switchport trunk encapsulation isl&lt;/P&gt;&lt;P&gt; switchport trunk allowed vlan 250,260&lt;/P&gt;&lt;P&gt; switchport mode trunk&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/26&lt;/P&gt;&lt;P&gt; description Uplink to lstc-3548xl-sw1&lt;/P&gt;&lt;P&gt; switchport trunk encapsulation isl&lt;/P&gt;&lt;P&gt; switchport trunk allowed vlan 1,2,5,20,51,60,250,260,999,1002-1005&lt;/P&gt;&lt;P&gt; switchport mode trunk&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/27&lt;/P&gt;&lt;P&gt; description Uplink to lstc-3548xl-sw2 Gi0/1&lt;/P&gt;&lt;P&gt; switchport trunk encapsulation dot1q&lt;/P&gt;&lt;P&gt; switchport trunk native vlan 20&lt;/P&gt;&lt;P&gt; switchport trunk allowed vlan 1,2,5,20,51,60,250,260,999,1002-1005&lt;/P&gt;&lt;P&gt; switchport mode trunk&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/28&lt;/P&gt;&lt;P&gt; description Gigabit Uplink to lstc-3524xl-329 Gi0/1&lt;/P&gt;&lt;P&gt; switchport trunk encapsulation dot1q&lt;/P&gt;&lt;P&gt; switchport mode trunk&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; ip address 10.255.255.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan5&lt;/P&gt;&lt;P&gt; ip address 10.10.5.11 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan20&lt;/P&gt;&lt;P&gt; ip address 10.10.20.11 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan60&lt;/P&gt;&lt;P&gt; ip address 10.10.60.2 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip classless&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 10.10.5.1&lt;/P&gt;&lt;P&gt;ip http server&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;control-plane&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;end&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;lstc-3560-core#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 19:33:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-firewall-or-routing-issues-ping-only/m-p/2196500#M358915</guid>
      <dc:creator>Timothy Erk</dc:creator>
      <dc:date>2013-04-18T19:33:17Z</dc:date>
    </item>
    <item>
      <title>Inter-VLAN firewall or routing issues... ping only.</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-firewall-or-routing-issues-ping-only/m-p/2196501#M358916</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Isnt there asymmetric routing going on here at the moment?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Host on Vlan60 sends TCP SYN to its default gateway which is ASA&lt;/LI&gt;&lt;LI&gt;Host on Vlan 5 receives TCP SYN and sends TCP SYN,ACK to its default gateway which is L3 Switch&lt;/LI&gt;&lt;LI&gt;The TCP SYN,ACK is sent from the L3 Switch directly to the host on Vlan60 since the L3 Switch can see it as a directly connected network&lt;/LI&gt;&lt;LI&gt;Host on Vlan60 sends TCP ACK to finalize the TCP connection negotiation and it sends it to its default gateway which is ASA&lt;/LI&gt;&lt;LI&gt;ASA has never seen the TCP SYN,ACK from the host on Vlan5 and therefore blocks the TCP ACK&lt;/LI&gt;&lt;LI&gt;Connection fails&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or this is atleast what came to my mind first. It might also explain why ICMP is working but not the TCP connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess you could try removing the Vlan60 interface so the L3 switch doesnt see that network as connected network but rather just distributes the Vlan60 throughout the switch network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 20:29:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-firewall-or-routing-issues-ping-only/m-p/2196501#M358916</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-18T20:29:44Z</dc:date>
    </item>
    <item>
      <title>Inter-VLAN firewall or routing issues... ping only.</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-firewall-or-routing-issues-ping-only/m-p/2196502#M358917</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We are seeing the same issue, same scenario, will answer if we resolve.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Sep 2013 15:02:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-firewall-or-routing-issues-ping-only/m-p/2196502#M358917</guid>
      <dc:creator>gfield</dc:creator>
      <dc:date>2013-09-30T15:02:53Z</dc:date>
    </item>
  </channel>
</rss>

