<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA vLAN implementation in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-vlan-implementation/m-p/692633#M423432</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the individual VLANs cannot access each other, is there something you do want them to access?  I don't believe you can turn off security levels.  You could make all the VLAN interfaces have the same security level and do not enable the "same-security-traffic permit inter-interface' command.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 21 Sep 2006 17:56:34 GMT</pubDate>
    <dc:creator>todh</dc:creator>
    <dc:date>2006-09-21T17:56:34Z</dc:date>
    <item>
      <title>ASA vLAN implementation</title>
      <link>https://community.cisco.com/t5/network-security/asa-vlan-implementation/m-p/692632#M423429</link>
      <description>&lt;P&gt;I'm evaluating the ASA 5520 specifically for vLAN implementation.  I create several vLAN logical interfaces and associated IPs on a single physical interface representing different internal client groups.  Now if I set the Security Level to 0 for each vLAN then traffic can cross from one vLAN to another which I don't want.  Now, if I set the Security level different for each vLAN interface then vLANs with higher levels can access lower ones but not vica versa, again I don't want one vLAN to be able to access another.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To prevent this inter-vLAN communication must I create a security policy for each vLAN to stop it accessing every other vLAN ? For 100 vLANs thats a lot of security policies to create !  Or can I simply just turn of Security Levels on these logical vLAN interfaces ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help/direction appreciated.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 09:11:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vlan-implementation/m-p/692632#M423429</guid>
      <dc:creator>paulrmono</dc:creator>
      <dc:date>2020-02-21T09:11:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA vLAN implementation</title>
      <link>https://community.cisco.com/t5/network-security/asa-vlan-implementation/m-p/692633#M423432</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the individual VLANs cannot access each other, is there something you do want them to access?  I don't believe you can turn off security levels.  You could make all the VLAN interfaces have the same security level and do not enable the "same-security-traffic permit inter-interface' command.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Sep 2006 17:56:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vlan-implementation/m-p/692633#M423432</guid>
      <dc:creator>todh</dc:creator>
      <dc:date>2006-09-21T17:56:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA vLAN implementation</title>
      <link>https://community.cisco.com/t5/network-security/asa-vlan-implementation/m-p/692634#M423434</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would like by default to prevent all traffic between vLANs but then control what &lt;/P&gt;&lt;P&gt;access one vLAN has to another, i.e., one vLAN hosts servers so client vLANs require &lt;/P&gt;&lt;P&gt;access to certain ports in the server vLAN. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I set all vLANs to the same Security Level and do not enable 'same-security-traffic permit inter-interface', then I am prevented from creating security policies under ASDM (to allow traffic from one vLAN to another) with a warning informing me that "No communication is allowed between two interfaces which have the same security level".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I enable the 'same-security-traffic permit inter-interface', then vLANs with a higher Security Level to another vLAN have full unconstrained access, unless I create Security Policies to prevent this, a lot of security policies if you're using 100 vLANs.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Sep 2006 08:58:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vlan-implementation/m-p/692634#M423434</guid>
      <dc:creator>paulrmono</dc:creator>
      <dc:date>2006-09-22T08:58:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA vLAN implementation</title>
      <link>https://community.cisco.com/t5/network-security/asa-vlan-implementation/m-p/692635#M423436</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Paul, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe you need the (no nat-control) command which then does not require you to have the nat &amp;amp; global commands to pass the traffic, and it will pass the traffic based on the access-list configured, and it will nat them to the egress interface I believe...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps, please rate if it does!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Sep 2006 09:57:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vlan-implementation/m-p/692635#M423436</guid>
      <dc:creator>oabduo983</dc:creator>
      <dc:date>2006-09-22T09:57:41Z</dc:date>
    </item>
  </channel>
</rss>

