<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic VLAN inter communication - almost there! in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vlan-inter-communication-almost-there/m-p/2151911#M359251</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Wow&lt;SPAN __jive_emoticon_name="shocked" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&amp;nbsp; Absolutly fixed what I was doing,&amp;nbsp; and showed me another way to aproach the problem!&amp;nbsp; Thanks! &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 29 Mar 2013 19:57:00 GMT</pubDate>
    <dc:creator>clintonplubliclibrary2013</dc:creator>
    <dc:date>2013-03-29T19:57:00Z</dc:date>
    <item>
      <title>VLAN inter communication - almost there!</title>
      <link>https://community.cisco.com/t5/network-security/vlan-inter-communication-almost-there/m-p/2151908#M359243</link>
      <description>&lt;P&gt;I have been working on this for a few days.&amp;nbsp; Im almost there!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want my Management Vlan to be able to ping Computers in the DMZ vlan.&amp;nbsp;&amp;nbsp; Im not sure if its NAT issue or ACL issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Specifically im ping from 192.168.0.5(management comp) to 10.10.10.5(DMZ comp)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Packet tracer shows no errors and says it should be working.&lt;/P&gt;&lt;P&gt; I pick up a weird error in the log that says: &lt;STRONG&gt; Routing failed to locate next hop for ICMP from Management:192.168.0.5/256 to inside:10.10.10.5/0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why is it saying the 10.10.10.5 is on the inside, when its on the DMZ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;name 10.10.10.0 DMZ description Public Computers&lt;/P&gt;&lt;P&gt;name 192.168.10.0 Inside description CPL Staff Network&lt;/P&gt;&lt;P&gt;name 192.168.0.0 Management description Cisco equipment&amp;nbsp; Access only&lt;/P&gt;&lt;P&gt;name 192.168.1.0 default description Not in use&lt;/P&gt;&lt;P&gt;name 192.168.10.2 CPLServer description win3k server&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; switchport trunk allowed vlan 11-13&lt;/P&gt;&lt;P&gt; switchport mode trunk&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; switchport access vlan 11&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; switchport access vlan 12&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; switchport access vlan 13&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; nameif default&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address dhcp setroute&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan11&lt;/P&gt;&lt;P&gt; description Inside&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan12&lt;/P&gt;&lt;P&gt; description DMZ&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.10.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan13&lt;/P&gt;&lt;P&gt; description Management&lt;/P&gt;&lt;P&gt; nameif Management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name CPL&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group network obj-10.0.1.0&lt;/P&gt;&lt;P&gt;object-group network obj-10.0.2.0&lt;/P&gt;&lt;P&gt;access-list DMZtoInside extended permit ip host DMZ host CPLServer&lt;/P&gt;&lt;P&gt;access-list InsidetoDMZ extended permit ip Inside 255.255.255.0 host DMZ&lt;/P&gt;&lt;P&gt;access-list ManagementtoDMZ extended permit ip Management 255.255.255.0 DMZ 255.255.255.0&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging asdm-buffer-size 512&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging asdm debugging&lt;/P&gt;&lt;P&gt;mtu default 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;mtu Management 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;icmp permit any DMZ&lt;/P&gt;&lt;P&gt;icmp permit any Management&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;global (inside) 1 interface&lt;/P&gt;&lt;P&gt;global (DMZ) 1 interface&lt;/P&gt;&lt;P&gt;global (Management) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,Management) 0.0.0.0 0.0.0.0 netmask 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,DMZ) 0.0.0.0 0.0.0.0 netmask 0.0.0.0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.1.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http Management 255.255.255.240 Management&lt;/P&gt;&lt;P&gt;http Management 255.255.255.0 Management&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; anyconnect-essentials&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:21:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-inter-communication-almost-there/m-p/2151908#M359243</guid>
      <dc:creator>clintonplubliclibrary2013</dc:creator>
      <dc:date>2019-03-12T01:21:35Z</dc:date>
    </item>
    <item>
      <title>VLAN inter communication - almost there!</title>
      <link>https://community.cisco.com/t5/network-security/vlan-inter-communication-almost-there/m-p/2151909#M359246</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think the problem most likely is the NAT configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a specific reason you are using Dynamic PAT from one interface to another ("nat" and "global" between local interfaces)? If this is not required I would suggest a different type of configuration for the whole NAT if you want to try it out. This would involve removing some of the existing configurations and will naturally effect the network operation while you do it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Removing old ones&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no global (inside) 1 interface&lt;/P&gt;&lt;P&gt;no global (DMZ) 1 interface&lt;/P&gt;&lt;P&gt;no global (Management) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no static (inside,Management) 0.0.0.0 0.0.0.0 netmask 0.0.0.0&lt;/P&gt;&lt;P&gt;no static (inside,DMZ) 0.0.0.0 0.0.0.0 netmask 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Adding new configurations&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Existing ones&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list INSIDE-NAT0 remark NO NAT between Local Networks&lt;/P&gt;&lt;P&gt;access-list INSIDE-NAT0 permit ip 192.168.10.0 255.255.255.0 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list INSIDE-NAT0 permit ip 192.168.10.0 255.255.255.0 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list INSIDE-NAT0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ-NAT0 remark NO NAT between Local Networks&lt;/P&gt;&lt;P&gt;access-list DMZ-NAT0 permit ip 10.10.10.0 255.255.255.0 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list DMZ-NAT0 permit ip 10.10.10.0 255.255.255.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (DMZ) 0 access-list DMZ-NAT0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list MANAGEMENT-NAT0 remark NO NAT between Local Networks&lt;/P&gt;&lt;P&gt;access-list MANAGEMENT-NAT0 permit ip 192.168.0.0 255.255.255.0 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list MANAGEMENT-NAT0 permit ip 192.168.0.0 255.255.255.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (Management) 0 access-list MANAGEMENT-NAT0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And naturally attach ACLs to interfaces to control traffic if needed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Mar 2013 19:42:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-inter-communication-almost-there/m-p/2151909#M359246</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-29T19:42:17Z</dc:date>
    </item>
    <item>
      <title>VLAN inter communication - almost there!</title>
      <link>https://community.cisco.com/t5/network-security/vlan-inter-communication-almost-there/m-p/2151910#M359249</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I notice that your original NAT configuration has no "nat" statement for your DMZ and Management interfaces to be able to access the "outside" and networks behind it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Wether if this is the intention I dont know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For those the NAT configurations needed would naturally be&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (DMZ) 1 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (Management) 1 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Mar 2013 19:50:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-inter-communication-almost-there/m-p/2151910#M359249</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-29T19:50:36Z</dc:date>
    </item>
    <item>
      <title>VLAN inter communication - almost there!</title>
      <link>https://community.cisco.com/t5/network-security/vlan-inter-communication-almost-there/m-p/2151911#M359251</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Wow&lt;SPAN __jive_emoticon_name="shocked" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&amp;nbsp; Absolutly fixed what I was doing,&amp;nbsp; and showed me another way to aproach the problem!&amp;nbsp; Thanks! &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Mar 2013 19:57:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-inter-communication-almost-there/m-p/2151911#M359251</guid>
      <dc:creator>clintonplubliclibrary2013</dc:creator>
      <dc:date>2013-03-29T19:57:00Z</dc:date>
    </item>
  </channel>
</rss>

