<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Access between several vlan in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-between-several-vlan/m-p/2158949#M360124</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a specific reason you have changed every interfaces but the "outside" MTU to something other than the default 1500?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 15 Mar 2013 13:40:59 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-03-15T13:40:59Z</dc:date>
    <item>
      <title>Access between several vlan</title>
      <link>https://community.cisco.com/t5/network-security/access-between-several-vlan/m-p/2158942#M360117</link>
      <description>&lt;P&gt;I have problems with NAT several vlans.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have specify nat from any to outside and I'm able to "get out":&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;object network any-out&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;nat (any,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However I don't have any other access between vlan configured on my firewall. Can anyone please help me with how the other NAT configuration should look like? I would also like to have access from outside to server on DMZ network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See my config in attached document.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards Mikael&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:14:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-between-several-vlan/m-p/2158942#M360117</guid>
      <dc:creator>Mikael Sveden</dc:creator>
      <dc:date>2019-03-12T01:14:33Z</dc:date>
    </item>
    <item>
      <title>Access between several vlan</title>
      <link>https://community.cisco.com/t5/network-security/access-between-several-vlan/m-p/2158943#M360118</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic between your internal interfaces wont need any NAT if you dont specifically want to NAT something.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic passing between 2 interfaces depends on&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The "security-level" of the interfaces if NO ACLs are configured&lt;/LI&gt;&lt;LI&gt;The ACL if one is attached to the interface&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The basic Static NAT configuration for a server would be&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Only use if you have a spare public IP address for this server&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SERVER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host x.x.x.x&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (dmz,outside) static y.y.y.y dns&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list &lt;ACL name=""&gt; permit &lt;TCP or="" udp=""&gt; any object SERVER eq &lt;PORT&gt;&lt;/PORT&gt;&lt;/TCP&gt;&lt;/ACL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;SERVER = Name given to the object&lt;/LI&gt;&lt;LI&gt;x.x.x.x = Local IP address of server&lt;/LI&gt;&lt;LI&gt;y.y.y.y = Spare public IP address for the server&lt;/LI&gt;&lt;LI&gt;&lt;ACL name=""&gt; = The ACL you have attached to "outside" interface&lt;/ACL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The basic Static PAT (Port Forward) configuration for a server would be&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Use if you only have the "outside" interface public IP address&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SERVER-TCP80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host x.x.x.x&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (dmz,outside) static interface service tcp &lt;REAL port=""&gt; &lt;MAPPED port=""&gt;&lt;/MAPPED&gt;&lt;/REAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list &lt;ACL name=""&gt; permit tcp any object SERVER-TCP80 eq 80&lt;/ACL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;SERVER = Name given to the object&lt;/LI&gt;&lt;LI&gt;x.x.x.x = Local IP address of server&lt;/LI&gt;&lt;LI&gt;interface = Specifies that the "outside" interface IP address will be used&lt;/LI&gt;&lt;LI&gt;&lt;ACL name=""&gt; = The ACL you have attached to "outside" interface&lt;/ACL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Mar 2013 10:16:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-between-several-vlan/m-p/2158943#M360118</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-15T10:16:45Z</dc:date>
    </item>
    <item>
      <title>Access between several vlan</title>
      <link>https://community.cisco.com/t5/network-security/access-between-several-vlan/m-p/2158944#M360119</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi jouni and thanks for quick answer!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can it be that it doesn't work then when I have allowed from client net; any to any on port tcp,udp,icmp? See my access-list in previous attached post. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards Mikael &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Mar 2013 10:59:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-between-several-vlan/m-p/2158944#M360119</guid>
      <dc:creator>Mikael Sveden</dc:creator>
      <dc:date>2013-03-15T10:59:05Z</dc:date>
    </item>
    <item>
      <title>Access between several vlan</title>
      <link>https://community.cisco.com/t5/network-security/access-between-several-vlan/m-p/2158945#M360120</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you try some example connection that is not going through with the "packet-tracer" from the CLI of the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input client &lt;TCP or="" udp=""&gt; &lt;SOURCE host=""&gt; &lt;RANDOM source="" port=""&gt; &lt;DESTINATIN ip=""&gt; &lt;DESTINATION port=""&gt;&lt;/DESTINATION&gt;&lt;/DESTINATIN&gt;&lt;/RANDOM&gt;&lt;/SOURCE&gt;&lt;/TCP&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then copy/paste the output here&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One option is also watch the ASDM realtime logs when attempting the connections and see what happens.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Mar 2013 11:11:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-between-several-vlan/m-p/2158945#M360120</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-15T11:11:16Z</dc:date>
    </item>
    <item>
      <title>Access between several vlan</title>
      <link>https://community.cisco.com/t5/network-security/access-between-several-vlan/m-p/2158946#M360121</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This was strange. The packet-tracer finish successful but I still can't get it to work for my clients and the log shows "Teardown TCP connection".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;firewall01# packet-tracer input client tcp 192.168.13.101 12345 192.168.10.14 443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.10.0&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 13951, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: client&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: dmz&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6&amp;nbsp;&amp;nbsp;&amp;nbsp; Mar 15 2013&amp;nbsp;&amp;nbsp;&amp;nbsp; 13:44:53&amp;nbsp;&amp;nbsp;&amp;nbsp; 302013&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.13.101&amp;nbsp;&amp;nbsp;&amp;nbsp; 12345&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.10.14&amp;nbsp;&amp;nbsp;&amp;nbsp; 443&amp;nbsp;&amp;nbsp;&amp;nbsp; Built outbound TCP connection 13956 for dmz:192.168.10.14/443 (192.168.10.14/443) to client:192.168.13.101/12345 (192.168.13.101/12345)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6&amp;nbsp;&amp;nbsp;&amp;nbsp; Mar 15 2013&amp;nbsp;&amp;nbsp;&amp;nbsp; 13:44:53&amp;nbsp;&amp;nbsp;&amp;nbsp; 302014&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.10.14&amp;nbsp;&amp;nbsp;&amp;nbsp; 443&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.13.101&amp;nbsp;&amp;nbsp;&amp;nbsp; 12345&amp;nbsp;&amp;nbsp;&amp;nbsp; Teardown TCP connection 13956 for dmz:192.168.10.14/443 to client:192.168.13.101/12345 duration 0:00:00 bytes 0 Free the flow created as result of packet injection&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Mar 2013 12:50:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-between-several-vlan/m-p/2158946#M360121</guid>
      <dc:creator>Mikael Sveden</dc:creator>
      <dc:date>2013-03-15T12:50:48Z</dc:date>
    </item>
    <item>
      <title>Access between several vlan</title>
      <link>https://community.cisco.com/t5/network-security/access-between-several-vlan/m-p/2158947#M360122</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The log output is the result of the "packet-tracer" command as we can see from the ports and the Teardown message.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What we would need to see next is the log messages from an actual connection attempt from a host on behind "client" and heading to "dmz"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice that the Built and Teardown messages are normal messages you always see. Teardown therefore doesnt mean anything bad on its own. The reason of the Teardown is the thing we are looking for.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A normal TCP connection is torn down with the TCP FINs. If the destination doesnt answer (for any reason) to the connection attempt the message is SYN Timeout. If there is perhaps some problems with the connection there might be TCP RST etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Mar 2013 13:02:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-between-several-vlan/m-p/2158947#M360122</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-15T13:02:27Z</dc:date>
    </item>
    <item>
      <title>Access between several vlan</title>
      <link>https://community.cisco.com/t5/network-security/access-between-several-vlan/m-p/2158948#M360123</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And here is the SYN Timeout...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6|Mar 15 2013|14:27:45|302014|srv004|443|192.168.13.101|55749|Teardown TCP connection 15447 for dmz:srv004/443 to client:192.168.13.101/55749 duration 0:00:30 bytes 0 SYN Timeout&lt;/P&gt;&lt;P&gt;6|Mar 15 2013|14:27:41|302014|srv004|443|192.168.13.101|55747|Teardown TCP connection 15443 for dmz:srv004/443 to client:192.168.13.101/55747 duration 0:00:30 bytes 0 SYN Timeout&lt;/P&gt;&lt;P&gt;6|Mar 15 2013|14:27:41|302014|srv004|443|192.168.13.101|55746|Teardown TCP connection 15442 for dmz:srv004/443 to client:192.168.13.101/55746 duration 0:00:30 bytes 0 SYN Timeout&lt;/P&gt;&lt;P&gt;6|Mar 15 2013|14:27:32|302013|192.168.13.101|55751|srv004|443|Built outbound TCP connection 15452 for dmz:srv004/443 (srv004/443) to client:192.168.13.101/55751 (192.168.13.101/55751)&lt;/P&gt;&lt;P&gt;6|Mar 15 2013|14:27:32|302013|192.168.13.101|55750|srv004|443|Built outbound TCP connection 15451 for dmz:srv004/443 (srv004/443) to client:192.168.13.101/55750 (192.168.13.101/55750)&lt;/P&gt;&lt;P&gt;6|Mar 15 2013|14:27:24|302014|srv004|443|192.168.13.101|55745|Teardown TCP connection 15441 for dmz:srv004/443 to client:192.168.13.101/55745 duration 0:00:30 bytes 0 SYN Timeout&lt;/P&gt;&lt;P&gt;6|Mar 15 2013|14:27:24|302014|srv004|443|192.168.13.101|55744|Teardown TCP connection 15440 for dmz:srv004/443 to client:192.168.13.101/55744 duration 0:00:30 bytes 0 SYN Timeout&lt;/P&gt;&lt;P&gt;6|Mar 15 2013|14:27:20|302014|srv004|443|192.168.13.101|55741|Teardown TCP connection 15439 for dmz:srv004/443 to client:192.168.13.101/55741 duration 0:00:30 bytes 0 SYN Timeout&lt;/P&gt;&lt;P&gt;6|Mar 15 2013|14:27:20|302014|srv004|443|192.168.13.101|55738|Teardown TCP connection 15438 for dmz:srv004/443 to client:192.168.13.101/55738 duration 0:00:30 bytes 0 SYN Timeout&lt;/P&gt;&lt;P&gt;6|Mar 15 2013|14:27:15|302013|192.168.13.101|55749|srv004|443|Built outbound TCP connection 15447 for dmz:srv004/443 (srv004/443) to client:192.168.13.101/55749 (192.168.13.101/55749)&lt;/P&gt;&lt;P&gt;6|Mar 15 2013|14:27:11|302013|192.168.13.101|55747|srv004|443|Built outbound TCP connection 15443 for dmz:srv004/443 (srv004/443) to client:192.168.13.101/55747 (192.168.13.101/55747)&lt;/P&gt;&lt;P&gt;6|Mar 15 2013|14:27:11|302013|192.168.13.101|55746|srv004|443|Built outbound TCP connection 15442 for dmz:srv004/443 (srv004/443) to client:192.168.13.101/55746 (192.168.13.101/55746)&lt;/P&gt;&lt;P&gt;6|Mar 15 2013|14:26:54|302013|192.168.13.101|55745|srv004|443|Built outbound TCP connection 15441 for dmz:srv004/443 (srv004/443) to client:192.168.13.101/55745 (192.168.13.101/55745)&lt;/P&gt;&lt;P&gt;6|Mar 15 2013|14:26:54|302013|192.168.13.101|55744|srv004|443|Built outbound TCP connection 15440 for dmz:srv004/443 (srv004/443) to client:192.168.13.101/55744 (192.168.13.101/55744)&lt;/P&gt;&lt;P&gt;6|Mar 15 2013|14:26:50|302013|192.168.13.101|55741|srv004|443|Built outbound TCP connection 15439 for dmz:srv004/443 (srv004/443) to client:192.168.13.101/55741 (192.168.13.101/55741)&lt;/P&gt;&lt;P&gt;6|Mar 15 2013|14:26:50|302013|192.168.13.101|55738|srv004|443|Built outbound TCP connection 15438 for dmz:srv004/443 (srv004/443) to client:192.168.13.101/55738 (192.168.13.101/55738)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It worked so good with my old PIX515 8.0(4). The config looked like this then:&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (dmz) 0 access-list client_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (dmz) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (wlan) 0 access-list client_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (wlan) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (server) 0 access-list client_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (server) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (client) 0 access-list client_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (client) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (dmz,outside) tcp interface https srv004 https netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (dmz,outside) tcp interface www srv004 www netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (dmz,outside) tcp interface 3299 srv004 3299 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (dmz,outside) tcp interface ssh srv004 ssh netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (dmz,client) 192.168.10.0 192.168.10.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (client,dmz) 192.168.13.0 192.168.13.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (wlan,client) 192.168.11.0 192.168.11.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (server,client) 192.168.12.0 192.168.12.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (client,server) 192.168.13.0 192.168.13.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (client,wlan) 192.168.13.0 192.168.13.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (dmz,wlan) 192.168.10.0 192.168.10.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (wlan,dmz) 192.168.11.0 192.168.11.0 netmask 255.255.255.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Mar 2013 13:32:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-between-several-vlan/m-p/2158948#M360123</guid>
      <dc:creator>Mikael Sveden</dc:creator>
      <dc:date>2013-03-15T13:32:01Z</dc:date>
    </item>
    <item>
      <title>Access between several vlan</title>
      <link>https://community.cisco.com/t5/network-security/access-between-several-vlan/m-p/2158949#M360124</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a specific reason you have changed every interfaces but the "outside" MTU to something other than the default 1500?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Mar 2013 13:40:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-between-several-vlan/m-p/2158949#M360124</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-15T13:40:59Z</dc:date>
    </item>
    <item>
      <title>Access between several vlan</title>
      <link>https://community.cisco.com/t5/network-security/access-between-several-vlan/m-p/2158950#M360125</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Generally the SYN Timeout tells us about the remote host that&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Its not listening on the port&lt;/LI&gt;&lt;LI&gt;Local software firewall or similiar is blocking the connection&lt;/LI&gt;&lt;LI&gt;It has the wrong default gateway or traffic is otherwise forwarded in the wrong way&lt;/LI&gt;&lt;LI&gt;etc&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Mar 2013 13:42:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-between-several-vlan/m-p/2158950#M360125</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-15T13:42:39Z</dc:date>
    </item>
    <item>
      <title>Access between several vlan</title>
      <link>https://community.cisco.com/t5/network-security/access-between-several-vlan/m-p/2158951#M360127</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, there is no vlan tag on outside interface but there is for all other interfaces.&lt;/P&gt;&lt;P&gt;I just tried to switch all to 1500 but it didn't make any different.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Mikael&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Mar 2013 13:45:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-between-several-vlan/m-p/2158951#M360127</guid>
      <dc:creator>Mikael Sveden</dc:creator>
      <dc:date>2013-03-15T13:45:41Z</dc:date>
    </item>
    <item>
      <title>Access between several vlan</title>
      <link>https://community.cisco.com/t5/network-security/access-between-several-vlan/m-p/2158952#M360129</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you issue the command &lt;STRONG&gt;"show arp"&lt;/STRONG&gt; can you see the DMZ server ARP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you ping the server from the firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you use the &lt;STRONG&gt;"ping tcp &lt;SERVER ip=""&gt; 443"&lt;/SERVER&gt;&lt;/STRONG&gt; from the firewall and see the SYN messages get a reply?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As the logs said, for some reason the server isnt replying to the connection forming. Or if it is its not sending that information to the firewall correctly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Mar 2013 13:52:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-between-several-vlan/m-p/2158952#M360129</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-15T13:52:02Z</dc:date>
    </item>
    <item>
      <title>Access between several vlan</title>
      <link>https://community.cisco.com/t5/network-security/access-between-several-vlan/m-p/2158953#M360131</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Strange that dmz is not showing in arp table:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;firewall01# sh arp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; client 192.168.13.103 0027.22fa.36ed 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; client srv001 001d.60da.7583 9&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; client srv003 5404.a63c.631a 13&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; client 192.168.13.101 0021.9bd4.49b5 34&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; client 192.168.13.104 b499.baec.3e88 49&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; client 192.168.13.5 b048.7a80.19ed 140&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside 213.67.138.1 001b.0de4.81c0 11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I got&amp;nbsp; Routing failed when I ping from dmz interface to host on client interface:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;firewall01# ping dmz 192.168.13.13&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to srv003, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;?????&lt;/P&gt;&lt;P&gt;Success rate is 0 percent (0/5)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE height="36" style="width: 918px;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;Mar 15 2013&lt;/TD&gt;&lt;TD&gt;15:06:01&lt;/TD&gt;&lt;TD&gt;110003&lt;/TD&gt;&lt;TD&gt;192.168.10.1&lt;/TD&gt;&lt;TD&gt;0&lt;/TD&gt;&lt;TD&gt;192.168.13.13&lt;/TD&gt;&lt;TD&gt;0&lt;/TD&gt;&lt;TD&gt;Routing failed to locate next hop for icmp from NP Identity Ifc:192.168.10.1/0 to dmz:srv003/0&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Mar 2013 14:09:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-between-several-vlan/m-p/2158953#M360131</guid>
      <dc:creator>Mikael Sveden</dc:creator>
      <dc:date>2013-03-15T14:09:35Z</dc:date>
    </item>
    <item>
      <title>Access between several vlan</title>
      <link>https://community.cisco.com/t5/network-security/access-between-several-vlan/m-p/2158954#M360133</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That log message you see because you are trying to ping "client" host using the interface "dmz". Host 192.168.13.13 is not behind "dmz" interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To ping a host just use&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ping &lt;IP address=""&gt;&lt;/IP&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To test connectivity to some server port use&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ping tcp &lt;SERVER ip=""&gt; &lt;PORT&gt;&lt;/PORT&gt;&lt;/SERVER&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you cant see the ARP of the DMZ server or any DMZ host for that matter you should check network connections and the actual server for problems.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Mar 2013 14:58:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-between-several-vlan/m-p/2158954#M360133</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-15T14:58:34Z</dc:date>
    </item>
    <item>
      <title>Access between several vlan</title>
      <link>https://community.cisco.com/t5/network-security/access-between-several-vlan/m-p/2158955#M360134</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for all help Jouni. I finally find the problem... it had to do with tag and untag vlan ports on the switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards Mikael&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Mar 2013 23:10:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-between-several-vlan/m-p/2158955#M360134</guid>
      <dc:creator>Mikael Sveden</dc:creator>
      <dc:date>2013-03-15T23:10:38Z</dc:date>
    </item>
  </channel>
</rss>

