<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic VLAN through PIX in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vlan-through-pix/m-p/2165462#M360590</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To start with, please kindly remove the following 2 statements:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (inside) 1 192.168.101.10-192.168.101.254 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;global (intf3) 1 192.168.101.10-192.168.101.254 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then "clear xlate"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also advise what you have configured for ACL: inside_outbound_nat1_acl&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 07 Mar 2013 23:41:55 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2013-03-07T23:41:55Z</dc:date>
    <item>
      <title>VLAN through PIX</title>
      <link>https://community.cisco.com/t5/network-security/vlan-through-pix/m-p/2165461#M360589</link>
      <description>&lt;P&gt;I’m adding a Cisco 1140 access point to my wired network. It is mostly for guest access, though I’m also carving out access for employees with wireless devices accessing our company resources.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The issue I seem to be having is with getting to the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here’s our setup:&amp;nbsp; 1140 AP connected to a 2960 switch connected to a PIX506E, running 6.3(5). A single MS server is DC for our company.&lt;/P&gt;&lt;P&gt;I setup two VLANs on the switch, internal and Guest. Our IP scheme is 192.168.102.0/24 for internal and 192.168.101.0/24 for guest access. The AP also has the same two VLANs configured. The AP passes DHCP to the switch for addresses, but only for guests. The wired company users get DHCP from the MS server. The PIX is directly connected to our ISP’s device. The PIX is configured with the 2nd VLAN on a logical interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My suspicion is that NAT is keeping the Guest VLAN from getting out. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configs:&lt;/P&gt;&lt;P&gt;***&lt;/P&gt;&lt;P&gt;AIR-AP1141N-AK9:&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;Current configuration : 2393 bytes&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;version 12.4&lt;/P&gt;&lt;P&gt;no service pad&lt;/P&gt;&lt;P&gt;service timestamps debug datetime msec&lt;/P&gt;&lt;P&gt;service timestamps log datetime msec localtime show-timezone&lt;/P&gt;&lt;P&gt;service password-encryption&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname Joe&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;enable secret 5 gobbledygook&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip domain name mydomain.com&lt;/P&gt;&lt;P&gt;ip name-server 201.11.64.2&lt;/P&gt;&lt;P&gt;ip name-server 201.11.64.3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dot11 vlan-name Guest vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dot11 ssid Center&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; vlan 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; authentication open&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dot11 ssid CenterGuest&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; vlan 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; authentication open&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; guest-mode&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;username Cisco password 7 112A1016141D&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;bridge irb&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Dot11Radio0&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; ssid Center&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; ssid CenterGuest&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; antenna gain 0&lt;/P&gt;&lt;P&gt; speed&amp;nbsp; basic-1.0 basic-2.0 basic-5.5 basic-11.0 basic-6.0 basic-9.0 basic-12.0 basic-18.0 basic-24.0 basic-36.0 basic-48.0 basic-54.0 m0. m1. m2. m3. m4. m5. m6. m7. m8. m9. m10. m11. m12. m13. m14. m15.&lt;/P&gt;&lt;P&gt; station-role root&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Dot11Radio0.1&lt;/P&gt;&lt;P&gt; encapsulation dot1Q 1 native&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt; bridge-group 1&lt;/P&gt;&lt;P&gt; bridge-group 1 subscriber-loop-control&lt;/P&gt;&lt;P&gt; bridge-group 1 block-unknown-source&lt;/P&gt;&lt;P&gt; no bridge-group 1 source-learning&lt;/P&gt;&lt;P&gt; no bridge-group 1 unicast-flooding&lt;/P&gt;&lt;P&gt; bridge-group 1 spanning-disabled&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Dot11Radio0.2&lt;/P&gt;&lt;P&gt; encapsulation dot1Q 2&lt;/P&gt;&lt;P&gt; ip helper-address 192.168.102.5&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt; bridge-group 2&lt;/P&gt;&lt;P&gt; bridge-group 2 subscriber-loop-control&lt;/P&gt;&lt;P&gt; bridge-group 2 block-unknown-source&lt;/P&gt;&lt;P&gt; no bridge-group 2 source-learning&lt;/P&gt;&lt;P&gt; no bridge-group 2 unicast-flooding&lt;/P&gt;&lt;P&gt; bridge-group 2 spanning-disabled&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt; no keepalive&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0.1&lt;/P&gt;&lt;P&gt; encapsulation dot1Q 1 native&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt; bridge-group 1&lt;/P&gt;&lt;P&gt; no bridge-group 1 source-learning&lt;/P&gt;&lt;P&gt; bridge-group 1 spanning-disabled&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0.2&lt;/P&gt;&lt;P&gt; encapsulation dot1Q 2&lt;/P&gt;&lt;P&gt; ip helper-address 192.168.102.5&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt; bridge-group 2&lt;/P&gt;&lt;P&gt; no bridge-group 2 source-learning&lt;/P&gt;&lt;P&gt; bridge-group 2 spanning-disabled&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface BVI1&lt;/P&gt;&lt;P&gt; ip address 192.168.102.1 255.255.255.0&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip default-gateway 192.168.102.5&lt;/P&gt;&lt;P&gt;ip http server&lt;/P&gt;&lt;P&gt;no ip http secure-server&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ip http help-path &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag" rel="nofollow" target="_blank"&gt;http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag&lt;/A&gt;&lt;/P&gt;&lt;P&gt;bridge 1 route ip&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; password 7 gobbledygook&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;P&gt;***&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Relevant config from switch:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip dhcp excluded-address 192.168.101.1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip dhcp pool Guest&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; network 192.168.101.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; default-router 192.168.101.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; domain-name centerpt.org&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; dns-server 208.88.64.2 208.88.64.3 68.67.112.4 8.8.8.8&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;spanning-tree mode pvst&lt;/P&gt;&lt;P&gt;spanning-tree extend system-id&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;vlan internal allocation policy ascending&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/9&lt;/P&gt;&lt;P&gt; description AP&lt;/P&gt;&lt;P&gt; switchport trunk allowed vlan 1,2&lt;/P&gt;&lt;P&gt; switchport mode trunk&lt;/P&gt;&lt;P&gt; switchport nonegotiate&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/19&lt;/P&gt;&lt;P&gt; description PIX&lt;/P&gt;&lt;P&gt; switchport trunk allowed vlan 1,2&lt;/P&gt;&lt;P&gt; switchport mode trunk&lt;/P&gt;&lt;P&gt; switchport nonegotiate&lt;/P&gt;&lt;P&gt; spanning-tree portfast&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; description Native&lt;/P&gt;&lt;P&gt; ip address 192.168.102.5 255.255.255.0&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; description VLAN for guest access only&lt;/P&gt;&lt;P&gt; ip address 192.168.101.1 255.255.255.0&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip default-gateway 192.168.102.2&lt;/P&gt;&lt;P&gt;ip http server&lt;/P&gt;&lt;P&gt;no ip http secure-server&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;etc…&lt;/P&gt;&lt;P&gt;***&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX config&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;PIX Version 6.3(5)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol pptp 1723&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip address outside xx.x.xxx.xxx 255.255.255.224&lt;/P&gt;&lt;P&gt;ip address inside 192.168.102.2 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address intf3 192.168.101.2 255.255.255.0&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface inside&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;global (inside) 1 192.168.101.10-192.168.101.254 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;global (intf3) 1 192.168.101.10-192.168.101.254 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 access-list inside_outbound_nat0_acl 0 0&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;nat (intf3) 1 access-list inside_outbound_nat1_acl 0 0&lt;/P&gt;&lt;P&gt;nat (intf3) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 xx.xx.xxx.xx 1&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.102.6 150&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;etc…&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Users connecting to the Guest VLAN on the AP can ping both the VLAN 2 on the switch and the PIX: 192.168.101.1 and 192.168.101.2, respectively. They cannot ping outside to DNS servers or anything past the PIX. Wired users have not had any problems at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do you think?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Lane&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:11:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-through-pix/m-p/2165461#M360589</guid>
      <dc:creator>laner61</dc:creator>
      <dc:date>2019-03-12T01:11:29Z</dc:date>
    </item>
    <item>
      <title>VLAN through PIX</title>
      <link>https://community.cisco.com/t5/network-security/vlan-through-pix/m-p/2165462#M360590</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To start with, please kindly remove the following 2 statements:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (inside) 1 192.168.101.10-192.168.101.254 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;global (intf3) 1 192.168.101.10-192.168.101.254 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then "clear xlate"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also advise what you have configured for ACL: inside_outbound_nat1_acl&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Mar 2013 23:41:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-through-pix/m-p/2165462#M360590</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2013-03-07T23:41:55Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN through PIX</title>
      <link>https://community.cisco.com/t5/network-security/vlan-through-pix/m-p/2165463#M360594</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="text-decoration: line-through;"&gt;I believe the ACL is "permit 192.168.101.10-192.168.101.254 0 0"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Actually, it's "&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list inside_outbound_nat1_acl permit ip any 192.168.101.0 255.255.255.0"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Lane Richardson&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Mar 2013 02:25:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-through-pix/m-p/2165463#M360594</guid>
      <dc:creator>laner61</dc:creator>
      <dc:date>2013-03-08T02:25:31Z</dc:date>
    </item>
    <item>
      <title>VLAN through PIX</title>
      <link>https://community.cisco.com/t5/network-security/vlan-through-pix/m-p/2165464#M360596</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alright, this is weird. As I look over the config for the PIX I previously posted, there are some very relevant lines that didn't make it in the post. Perhaps I edited somehow - I was in a hurry before I left for the day. Here's a better representation of the config, &lt;SPAN style="text-decoration: underline;"&gt;&lt;EM&gt;after&lt;/EM&gt;&lt;/SPAN&gt;&lt;EM&gt; &lt;/EM&gt;removing the global commands you've suggested:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.3(5)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface ethernet1 vlan2 logical&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nameif vlan2 intf3 security6&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol pptp 1723&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list inside_outbound_nat0_acl permit ip any 192.168.102.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat1_acl permit ip any 192.168.101.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;ip address outside xx.x.xxx.xxx 255.255.255.224&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;ip address inside 192.168.102.2 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address intf3 192.168.101.2 255.255.255.0&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface inside&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 access-list inside_outbound_nat0_acl 0 0&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;nat (intf3) 1 access-list inside_outbound_nat1_acl 0 0&lt;/P&gt;&lt;P&gt;nat (intf3) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface smtp 192.168.102.4 smtp netmask 255.255.25&lt;SPAN style="font-size: 10pt;"&gt;5.255 0 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface https 192.168.102.4 https netmask 255.255.&lt;SPAN style="font-size: 10pt;"&gt;255.255 0 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 3389 192.168.102.4 3389 netmask 255.255.25&lt;SPAN style="font-size: 10pt;"&gt;5.255 0 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface www 192.168.102.4 www netmask 255.255.255.&lt;SPAN style="font-size: 10pt;"&gt;255 0 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 4125 192.168.102.4 4125 netmask 255.255.25&lt;SPAN style="font-size: 10pt;"&gt;5.255 0 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface pptp 192.168.102.4 pptp netmask 255.255.25&lt;SPAN style="font-size: 10pt;"&gt;5.255 0 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 987 192.168.102.4 987 netmask 255.255.255.&lt;SPAN style="font-size: 10pt;"&gt;255 0 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 3390 192.168.102.11 3389 netmask 255.255.2&lt;SPAN style="font-size: 10pt;"&gt;55.255 0 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface imap4 192.168.102.4 imap4 netmask 255.255.&lt;SPAN style="font-size: 10pt;"&gt;255.255 0 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 3391 192.168.102.29 3389 netmask 255.255.2&lt;SPAN style="font-size: 10pt;"&gt;55.255 0 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;route outside 0.0.0.0 0.0.0.0 xx.xx.xxx.xx 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.102.6 150&lt;/P&gt;&lt;P&gt;timeout xlate 0:05:00&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;http server enable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;http 192.168.102.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.101.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jennifer, removing the global commands and clearing xlate did not (on it's own) resolve the issue - though I did note your "&lt;SPAN style="font-size: 10pt;"&gt;To start with" disclaimer. I would imagine the bolded lines above would have some bearing on the issue.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Lane&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Mar 2013 15:00:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-through-pix/m-p/2165464#M360596</guid>
      <dc:creator>laner61</dc:creator>
      <dc:date>2013-03-08T15:00:16Z</dc:date>
    </item>
    <item>
      <title>VLAN through PIX</title>
      <link>https://community.cisco.com/t5/network-security/vlan-through-pix/m-p/2165465#M360598</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The access-list both on the inside and intf3 interface is incorrect, and you don't need those NAT statements anyway, and can be removed as you already have "nat (intf3) 1 0.0.0.0 0.0.0.0" and "nat (inside) 1 0.0.0.0 0.0.0.0"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please remote fhe following:&lt;/P&gt;&lt;P&gt;nat (inside) 1 access-list inside_outbound_nat0_acl 0 0&lt;/P&gt;&lt;P&gt;nat (intf3) 1 access-list inside_outbound_nat1_acl 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Further to that, you should also remove the folloiwng route statement as it is incorrect:&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.102.6 150&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then "clear xlate".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also just re-look into your DHCP configuration, the default router configured should be the PIX intf3 interface IP, instead of the switch since your switch is not configured with any routes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip dhcp pool Guest&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; network 192.168.101.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;default-router 192.168.101.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; domain-name centerpt.org&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; dns-server 208.88.64.2 208.88.64.3 68.67.112.4 8.8.8.8&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Mar 2013 00:45:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-through-pix/m-p/2165465#M360598</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2013-03-09T00:45:00Z</dc:date>
    </item>
    <item>
      <title>VLAN through PIX</title>
      <link>https://community.cisco.com/t5/network-security/vlan-through-pix/m-p/2165466#M360600</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jennifer, that did the trick! So it was a combination of &lt;SPAN style="font-size: 10pt;"&gt;correc&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;ting &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;the NAT and the default router for DHCP?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Also, I left the other route in - it points to another router in our network used for VOIP and is there as a backup in case our primary ISP goes down. The tech support at our VOIP vendor was the one that suggested the backup route.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks very much!&lt;/P&gt;&lt;P&gt;Lane&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Mar 2013 14:11:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-through-pix/m-p/2165466#M360600</guid>
      <dc:creator>laner61</dc:creator>
      <dc:date>2013-03-11T14:11:25Z</dc:date>
    </item>
    <item>
      <title>VLAN through PIX</title>
      <link>https://community.cisco.com/t5/network-security/vlan-through-pix/m-p/2165467#M360601</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct, it is combination of NAT and default router for DHCP that did the trick.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the backup route, currently it is:&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.102.6 150&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is pointing to the outside, however, your next hop is the inside interface subnet, so it is never going to work. The next hop should be IP Address in the same subnet as your outside interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Mar 2013 20:47:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-through-pix/m-p/2165467#M360601</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2013-03-11T20:47:25Z</dc:date>
    </item>
    <item>
      <title>VLAN through PIX</title>
      <link>https://community.cisco.com/t5/network-security/vlan-through-pix/m-p/2165468#M360603</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think I follow you. Since the VOIP provider's T-1 router is connected to one of my switch's ports (for voice VLAN access), are you saying there will never be a way that this router will be able to act as backup? They assigned their router's LAN interface in my subnet specifically so the phones could connect. It almost sounds like I need a router to go between my switch and their router as well as my firewall...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Lane&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Mar 2013 20:55:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-through-pix/m-p/2165468#M360603</guid>
      <dc:creator>laner61</dc:creator>
      <dc:date>2013-03-11T20:55:33Z</dc:date>
    </item>
    <item>
      <title>VLAN through PIX</title>
      <link>https://community.cisco.com/t5/network-security/vlan-through-pix/m-p/2165469#M360605</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the VOIP provider's T1 router is connected to your voice VLAN directly, does the voice traffic even traverse the FW?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Mar 2013 21:32:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-through-pix/m-p/2165469#M360605</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2013-03-11T21:32:28Z</dc:date>
    </item>
    <item>
      <title>VLAN through PIX</title>
      <link>https://community.cisco.com/t5/network-security/vlan-through-pix/m-p/2165470#M360606</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, the VOIP traffic does not go out the firewall. There's a T-1 for voice only that their router is connected to. &lt;SPAN style="font-size: 10pt;"&gt;Our web services are through our own ISP. However, we did try to explore using both outside networks as backup for each other. In case our T-1 went down, we'd wanted our phones to take our ISP's route as an automatic alternate. If our ISP went down, we wanted our internal network to go out the T-1. It never did work...&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Mar 2013 21:55:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-through-pix/m-p/2165470#M360606</guid>
      <dc:creator>laner61</dc:creator>
      <dc:date>2013-03-11T21:55:16Z</dc:date>
    </item>
    <item>
      <title>VLAN through PIX</title>
      <link>https://community.cisco.com/t5/network-security/vlan-through-pix/m-p/2165471#M360607</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ahh OK, got it. Might need to look at your topology diagram to see how they are all connected.&lt;/P&gt;&lt;P&gt;If T1 went down, you might want to set a backup route there to point it to the ASA inside interface, and has a static route on your ASA inside for the voice subnet to point to the router.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Mar 2013 21:59:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-through-pix/m-p/2165471#M360607</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2013-03-11T21:59:52Z</dc:date>
    </item>
  </channel>
</rss>

