<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Two private networks on an ASA5510 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/two-private-networks-on-an-asa5510/m-p/2200929#M360331</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am still confused.Could you kindly provide a sample ASA configuration for a three VLAN network protected by the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Much appreciated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 13 Mar 2013 18:08:15 GMT</pubDate>
    <dc:creator>saidfrh18</dc:creator>
    <dc:date>2013-03-13T18:08:15Z</dc:date>
    <item>
      <title>Two private networks on an ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/two-private-networks-on-an-asa5510/m-p/2200920#M360315</link>
      <description>&lt;P&gt;Currently a network consists of two subnets, one subnet is behind a ASA and the other behind a PIX, both connecting to the ISP's routers. If the PIX is retired, is it possible to create/consolidate the two networks protected by the ASA5510 with the default gateway being the ISP? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can two private networks be protected by the ASA5510? One conceptual way is to create the VLANS on a layer 3 switch, on the "inside" interface of the ASA. In this senario what would the "inside" network's IP address?&amp;nbsp; If the above is possible, how would natting occur?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there an efficient configuration to protect two networks protected by the 5510, other than creating a DMZ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to create two private networks with same level of security, 100 on a three network interface connections?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:13:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-private-networks-on-an-asa5510/m-p/2200920#M360315</guid>
      <dc:creator>saidfrh18</dc:creator>
      <dc:date>2019-03-12T01:13:27Z</dc:date>
    </item>
    <item>
      <title>Two private networks on an ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/two-private-networks-on-an-asa5510/m-p/2200921#M360316</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;How can two private networks be protected by the ASA5510?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can have the L3 switch take care of routing, add a route for the new network on the ASA pointing to the switch and have the ASA do a nat translation for all the hosts behind the inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;something like this [post-8.3]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network internal-nets&lt;/P&gt;&lt;P&gt;subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;In this senario what would the "inside" network's IP address?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The address on the switch will be similar to the one on the PIX, the network ID will remain the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Is there an efficient configuration to protect two networks protected by the 5510, other than creating a DMZ?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A DMZ is kind of a gray-area where traffic from secure and non-secure networks can meet. It normally hosts servers accessible from the outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Answering your question, you can create a second internal interface with the highest security level and have it access the outside the same way the other internal users do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can have a three network interface configuration. Inside, Inside 1 and the outside.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Mar 2013 01:52:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-private-networks-on-an-asa5510/m-p/2200921#M360316</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-03-13T01:52:53Z</dc:date>
    </item>
    <item>
      <title>Two private networks on an ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/two-private-networks-on-an-asa5510/m-p/2200922#M360317</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV&gt; &lt;A _jive_internal="true" href="https://community.cisco.com/people/jocamare" id="jive-57625521779225722362630"&gt;jocamare&lt;/A&gt; &lt;/DIV&gt;&lt;P&gt;Thank you. In your reply, &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;In this senario what would the "inside" network's IP address?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; "The address on the switch will be similar to the one on the PIX, the network ID will remain the same."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example, The network protected by the ASA is 192.168.10.0.&amp;nbsp; The network protected by the PIX is 192.168.20. &lt;/P&gt;&lt;P&gt;The above networks will be consolidated behind the ASA, by creating two VLANS on a L3 switch.&amp;nbsp; Do you suggest assigning the switch's management VLAN's IP address 192.168.20.1?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Mar 2013 02:07:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-private-networks-on-an-asa5510/m-p/2200922#M360317</guid>
      <dc:creator>saidfrh18</dc:creator>
      <dc:date>2013-03-13T02:07:35Z</dc:date>
    </item>
    <item>
      <title>Two private networks on an ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/two-private-networks-on-an-asa5510/m-p/2200923#M360319</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's right.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The switch is going to have a VLAN configured with the 192.168.20.1 IP address and will be the gateway for the hots in that network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It will also have an IP address on the 192.168.10.0 network that will let you configure a default route on the switch pointing to the ASA's internal IP address. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA will also need a routing pointing to the 192.168.20.0 network using the IP address of the switch as next hop. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Mar 2013 02:30:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-private-networks-on-an-asa5510/m-p/2200923#M360319</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-03-13T02:30:38Z</dc:date>
    </item>
    <item>
      <title>Two private networks on an ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/two-private-networks-on-an-asa5510/m-p/2200924#M360321</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"It will also have an IP address on the 192.168.10.0 network that will&amp;nbsp; let you configure a default route on the switch pointing to the ASA's&amp;nbsp; internal IP address. "&amp;nbsp; How is this done?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Mar 2013 02:41:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-private-networks-on-an-asa5510/m-p/2200924#M360321</guid>
      <dc:creator>saidfrh18</dc:creator>
      <dc:date>2013-03-13T02:41:08Z</dc:date>
    </item>
    <item>
      <title>Two private networks on an ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/two-private-networks-on-an-asa5510/m-p/2200925#M360323</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ha, yeah, a somewhat confusing statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here, an example.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.20.0----SW----192.168.10.0-----ASA---outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The switch will have one interface on both networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The one on the .20 network will work as default gateway for users on that subnet.&lt;/P&gt;&lt;P&gt;The one on the .10 network will work as next hop when the ASA needs to communicate with the 192.168.20.0 network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It will be necessary to configure routes on the SWITCH and ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The one on the SW will be a default route pointing to the ASA as next hop.&lt;/P&gt;&lt;P&gt;The one on the ASA will tell the unit where the 192.168.20.0 network resides.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this is clear enough. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Mar 2013 02:48:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-private-networks-on-an-asa5510/m-p/2200925#M360323</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-03-13T02:48:17Z</dc:date>
    </item>
    <item>
      <title>Two private networks on an ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/two-private-networks-on-an-asa5510/m-p/2200926#M360325</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Mar 2013 04:12:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-private-networks-on-an-asa5510/m-p/2200926#M360325</guid>
      <dc:creator>saidfrh18</dc:creator>
      <dc:date>2013-03-13T04:12:08Z</dc:date>
    </item>
    <item>
      <title>Two private networks on an ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/two-private-networks-on-an-asa5510/m-p/2200927#M360327</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is it possible to configure the ASA to protect 4 internal network,if so how?&amp;nbsp; Thus there would be four VLANs and a L3 switch.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Mar 2013 11:02:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-private-networks-on-an-asa5510/m-p/2200927#M360327</guid>
      <dc:creator>saidfrh18</dc:creator>
      <dc:date>2013-03-13T11:02:11Z</dc:date>
    </item>
    <item>
      <title>Two private networks on an ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/two-private-networks-on-an-asa5510/m-p/2200928#M360329</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, it will be possible to configure 4 networks, even more if you want.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While doing this, remember the ASA limitations. But 4 networks, depending of its size [i'm thinking /24 nets], should not be a problem for the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can configure 4 vlans on the L3 sw, plus the one that is directly behind the ASA, or just all four networks behind the SWITCH and a small network [/30] behind the ASA. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Mar 2013 16:52:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-private-networks-on-an-asa5510/m-p/2200928#M360329</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-03-13T16:52:25Z</dc:date>
    </item>
    <item>
      <title>Two private networks on an ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/two-private-networks-on-an-asa5510/m-p/2200929#M360331</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am still confused.Could you kindly provide a sample ASA configuration for a three VLAN network protected by the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Much appreciated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Mar 2013 18:08:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-private-networks-on-an-asa5510/m-p/2200929#M360331</guid>
      <dc:creator>saidfrh18</dc:creator>
      <dc:date>2013-03-13T18:08:15Z</dc:date>
    </item>
    <item>
      <title>Two private networks on an ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/two-private-networks-on-an-asa5510/m-p/2200930#M360333</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There's nothing much you have to do on the ASA more than letting the guy know where the networks reside and how to contact them. [routes]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Same example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here, an example.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.20.0&lt;/P&gt;&lt;P&gt;192.168.30.0----SW----192.168.10.0-----ASA---outside&lt;/P&gt;&lt;P&gt;192.168.40.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The switch will have one interface in all networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ones on the .20/.30/.40 network will work as default gateway for users on that subnet.&lt;/P&gt;&lt;P&gt;The one on the .10 network will work as next hop when the ASA needs to communicate with the 192.168.20.0 network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It will be necessary to configure routes on the SWITCH and ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The one on the SW will be a default route pointing to the ASA as next hop.&lt;/P&gt;&lt;P&gt;The ones on the ASA will tell the unit where the 192.168.20.0, 192.168.30.0 and 192.168.40.0 networks reside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The nat configuration on the ASA remains the same, creating a PAT translation for all the devices behind the inside interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Mar 2013 22:24:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-private-networks-on-an-asa5510/m-p/2200930#M360333</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-03-13T22:24:52Z</dc:date>
    </item>
    <item>
      <title>Re: Two private networks on an ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/two-private-networks-on-an-asa5510/m-p/2200931#M360335</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can also have scenarios where the different subnets are carried on different switch vlans.&amp;nbsp; You can exceed the number of physical interfaces on the ASA if you use subinterfaces and trunk ports. E.g.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.20.0 -- vlan 200&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.20.1 Gi0/1&lt;/P&gt;&lt;P&gt;192.168.30.0 - vlan 300&amp;nbsp; --- SW ==&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.30.1 Gi0/2.1&amp;nbsp; == ASA -- outside&lt;/P&gt;&lt;P&gt;192.168.40.0 - vlan 400&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.40.1&amp;nbsp; Gi0/2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the switch this might look like:&lt;/P&gt;&lt;P&gt;-------------&lt;/P&gt;&lt;P&gt;vlan 66&lt;/P&gt;&lt;P&gt; name no_clients&lt;/P&gt;&lt;P&gt;vlan 200&lt;/P&gt;&lt;P&gt; name A&lt;/P&gt;&lt;P&gt;vlan 300&lt;/P&gt;&lt;P&gt; name B&lt;/P&gt;&lt;P&gt;vlan 400&lt;/P&gt;&lt;P&gt; name C&lt;/P&gt;&lt;P&gt;interface gi0/1&lt;/P&gt;&lt;P&gt;&amp;nbsp; description client on subnet A&lt;/P&gt;&lt;P&gt;&amp;nbsp; switchport access vlan 200&lt;/P&gt;&lt;P&gt;&amp;nbsp; switchport mode access&lt;/P&gt;&lt;P&gt;interface gi0/2&lt;/P&gt;&lt;P&gt;&amp;nbsp; description client on subnet B&lt;/P&gt;&lt;P&gt;&amp;nbsp; switchport access vlan 300&lt;/P&gt;&lt;P&gt;&amp;nbsp; switchport mode access&lt;/P&gt;&lt;P&gt;interface gi0/3&lt;/P&gt;&lt;P&gt;&amp;nbsp; description client on subnet C&lt;/P&gt;&lt;P&gt;&amp;nbsp; switchport access vlan 400&lt;/P&gt;&lt;P&gt;&amp;nbsp; switchport mode access&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;interface gi0/40&lt;/P&gt;&lt;P&gt;&amp;nbsp; description firewall Gi0/1 on subnet A&lt;/P&gt;&lt;P&gt;&amp;nbsp; switchport access vlan 200&lt;/P&gt;&lt;P&gt;&amp;nbsp; switchport mode access&lt;/P&gt;&lt;P&gt;interface gi0/41&lt;/P&gt;&lt;P&gt;description firewall GI0/2 trunk - subnets B, C&lt;/P&gt;&lt;P&gt; switchport trunk encapsulation dot1q&lt;/P&gt;&lt;P&gt; switchport trunk native vlan 66&lt;/P&gt;&lt;P&gt; switchport trunk allowed vlan 1,300,400&lt;/P&gt;&lt;P&gt; switchport mode trunk&lt;/P&gt;&lt;P&gt; switchport nonegotiate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the ASA, the interfaces might look like:&lt;/P&gt;&lt;P&gt;----------------&lt;/P&gt;&lt;P&gt;interface Gi0/1&lt;/P&gt;&lt;P&gt;&amp;nbsp; nameif a-lan&lt;/P&gt;&lt;P&gt;&amp;nbsp; security-level 80&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip address 192.168.20.1 255.255.255.0&lt;/P&gt;&lt;P&gt;interface Gi0/2&lt;/P&gt;&lt;P&gt;&amp;nbsp; description trunk master&lt;/P&gt;&lt;P&gt;&amp;nbsp; no nameif&lt;/P&gt;&lt;P&gt;&amp;nbsp; no security-level&lt;/P&gt;&lt;P&gt;&amp;nbsp; no ip address&lt;/P&gt;&lt;P&gt;interface Gi0/2.1&lt;/P&gt;&lt;P&gt;&amp;nbsp; vlan 300&lt;/P&gt;&lt;P&gt;&amp;nbsp; nameif b-lan&lt;/P&gt;&lt;P&gt;&amp;nbsp; security level 70&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip address 192.168.30.1 255.255.255.0&lt;/P&gt;&lt;P&gt;inteface Gi0/2.2&lt;/P&gt;&lt;P&gt;&amp;nbsp; vlan 400&lt;/P&gt;&lt;P&gt;&amp;nbsp; nameif c-lan&lt;/P&gt;&lt;P&gt;&amp;nbsp; security level 60&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip address 192.168.40.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; If the switch isn't doing any routing, it doesn't need any IP addresses on the client vlans.&amp;nbsp; It would need an address on a separate management vlan (not shown).&lt;/P&gt;&lt;P&gt;Typically one would use identity NAT between the vlan's the ASA is routing, and PAT externally.&lt;/P&gt;&lt;P&gt;Also, we pretty much ignore the security levels, and group access-lists on all of the interfaces to control what traffic can go where.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- Jim Leinweber, WI State Lab of Hygiene&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Mar 2013 17:46:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-private-networks-on-an-asa5510/m-p/2200931#M360335</guid>
      <dc:creator>James Leinweber</dc:creator>
      <dc:date>2013-03-14T17:46:27Z</dc:date>
    </item>
    <item>
      <title>Re: Two private networks on an ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/two-private-networks-on-an-asa5510/m-p/2200932#M360337</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Mar 2013 20:52:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-private-networks-on-an-asa5510/m-p/2200932#M360337</guid>
      <dc:creator>saidfrh18</dc:creator>
      <dc:date>2013-03-14T20:52:51Z</dc:date>
    </item>
  </channel>
</rss>

