<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic VLAN Communication on ASA5510 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vlan-communication-on-asa5510/m-p/1969707#M439268</link>
    <description>&lt;P&gt;Hey there!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a working environment but wondering if there is just a better way to accomplish what I am trying to do (without a layer 3 or 4 switch). Basically I have a few sub interfaces on my Cisco ASA5510.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now what I do need is some of the VLANs to communicate with specific devices on the different VLANs. So for example I need computer 1 from VLAN 5 to communicate with 192.168.10.5 from VLAN 10 on ports 80 and 443. Is there a good way to accomplish this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I am currently doing is settings the security level to 100 on each interface (including the DMZ). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what I have:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Ethernet0/1.5&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;STRONG&gt;vlan 5&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;STRONG&gt;nameif Sub5&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;STRONG&gt;security-level 100&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;STRONG&gt;ip address 192.168.4.254 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Ethernet0/1.95&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;STRONG&gt;vlan 95&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;STRONG&gt;nameif Sub95&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;STRONG&gt;security-level 100&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;STRONG&gt;ip address 192.168.1.203 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;same-security-traffic permit inter-interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (Sub95,Sub5) 192.168.1.0 access-list Sub95_nat_static_1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (Sub5,Sub95) 192.168.4.0 192.168.4.0 netmask 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list Sub95_nat_static_1 extended permit ip 192.168.1.0 255.255.255.0 host 192.168.4.15&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I am doing this all with ASDM 6.4. My ASA image is 805-K8.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there an easier way to accomplish this than what I am doing? It just seems like a ton of NATs and whatknot? I am really using ASDM the most and not shell. I am also wondering how to allow more of a one way communication? Like sub interface 95 be able to communicate on certain ports and ip addresses to sub interface 5, but sub interface 5 not be able to communicate with 95&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 23:41:11 GMT</pubDate>
    <dc:creator>jacobdixon</dc:creator>
    <dc:date>2019-03-11T23:41:11Z</dc:date>
    <item>
      <title>VLAN Communication on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/vlan-communication-on-asa5510/m-p/1969707#M439268</link>
      <description>&lt;P&gt;Hey there!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a working environment but wondering if there is just a better way to accomplish what I am trying to do (without a layer 3 or 4 switch). Basically I have a few sub interfaces on my Cisco ASA5510.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now what I do need is some of the VLANs to communicate with specific devices on the different VLANs. So for example I need computer 1 from VLAN 5 to communicate with 192.168.10.5 from VLAN 10 on ports 80 and 443. Is there a good way to accomplish this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I am currently doing is settings the security level to 100 on each interface (including the DMZ). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what I have:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Ethernet0/1.5&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;STRONG&gt;vlan 5&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;STRONG&gt;nameif Sub5&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;STRONG&gt;security-level 100&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;STRONG&gt;ip address 192.168.4.254 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Ethernet0/1.95&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;STRONG&gt;vlan 95&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;STRONG&gt;nameif Sub95&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;STRONG&gt;security-level 100&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;STRONG&gt;ip address 192.168.1.203 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;same-security-traffic permit inter-interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (Sub95,Sub5) 192.168.1.0 access-list Sub95_nat_static_1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (Sub5,Sub95) 192.168.4.0 192.168.4.0 netmask 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list Sub95_nat_static_1 extended permit ip 192.168.1.0 255.255.255.0 host 192.168.4.15&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I am doing this all with ASDM 6.4. My ASA image is 805-K8.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there an easier way to accomplish this than what I am doing? It just seems like a ton of NATs and whatknot? I am really using ASDM the most and not shell. I am also wondering how to allow more of a one way communication? Like sub interface 95 be able to communicate on certain ports and ip addresses to sub interface 5, but sub interface 5 not be able to communicate with 95&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:41:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-communication-on-asa5510/m-p/1969707#M439268</guid>
      <dc:creator>jacobdixon</dc:creator>
      <dc:date>2019-03-11T23:41:11Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN Communication on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/vlan-communication-on-asa5510/m-p/1969708#M439271</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Instead of using static translations you can use NAT-exemption where you tell your ASA that traffic, that you specified in an nat0-ACL (for example Net5 to Net95) should not be translated. Then you apply an ACL to every interface and only allow the traffic you want.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 11 Aug 2012 23:06:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-communication-on-asa5510/m-p/1969708#M439271</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-08-11T23:06:32Z</dc:date>
    </item>
    <item>
      <title>VLAN Communication on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/vlan-communication-on-asa5510/m-p/1969709#M439277</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry for the novice questions but I'm just not very familiar with Cisco.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So do you mean something like:&lt;/P&gt;&lt;P&gt;access-list Sub5_nat0_outbound line 1 extended permit ip any 192.168.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;nat (Sub5) 0 access-list Sub5_nat0_outbound&amp;nbsp; tcp 0 0 udp 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Sub95_nat0_outbound line 18 extended permit ip any 192.168.4.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What else would I need to do?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 11 Aug 2012 23:29:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-communication-on-asa5510/m-p/1969709#M439277</guid>
      <dc:creator>jacobdixon</dc:creator>
      <dc:date>2012-08-11T23:29:41Z</dc:date>
    </item>
    <item>
      <title>VLAN Communication on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/vlan-communication-on-asa5510/m-p/1969710#M439281</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am getting that NAT exempt to work and I can pass traffic but I am having issues limiting what traffic is allowed or not allowed with the ACL&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 11 Aug 2012 23:47:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-communication-on-asa5510/m-p/1969710#M439281</guid>
      <dc:creator>jacobdixon</dc:creator>
      <dc:date>2012-08-11T23:47:54Z</dc:date>
    </item>
    <item>
      <title>VLAN Communication on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/vlan-communication-on-asa5510/m-p/1969711#M439282</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry for the post. I think I have it figured out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So after doing the NAT Exempt and if the security levels are the same they can communicate 100% on every port and every host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I put in access list so Sub95 can talk to Sub5.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically I had to put ACL on Sub95 interface so it could talk to Sub5 (192.168.4.15) on port 25, then put a deny rule in after that going to that subnet, then put a permit rule in for any any so it can get out to the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Sub95_access_in extended permit tcp any host 192.168.4.15 eq smtp&lt;/P&gt;&lt;P&gt;access-list Sub95_access_in extended deny ip any object-group Inside_Networks&lt;/P&gt;&lt;P&gt;access-list Sub95_access_in extended permit ip any any&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 Aug 2012 00:36:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-communication-on-asa5510/m-p/1969711#M439282</guid>
      <dc:creator>jacobdixon</dc:creator>
      <dc:date>2012-08-12T00:36:37Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN Communication on ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/vlan-communication-on-asa5510/m-p/1969712#M439283</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, one ACL for NAT where you only specify the IP-traffic from Network to network. And every interface gets his own access-ACL with the specific allowed communication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I typically write that ACL different:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ1-ACCESS-IN permit ... first line with permit to inside&lt;/P&gt;&lt;P&gt;access-list DMZ1-ACCESS-IN permit ... second line with permit to inside&lt;/P&gt;&lt;P&gt;access-list DMZ1-ACCESS-IN deny ip any object-group RFC1918&lt;/P&gt;&lt;P&gt;access-list DMZ1-ACCESS-IN permit ... here comes the permitted access to the internet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As all my actual and future inside networks are all in the RFC1918-range, I don't have to touch that deny-line when I add an additional IP-subnet to one of the inside-interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 Aug 2012 05:29:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-communication-on-asa5510/m-p/1969712#M439283</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-08-12T05:29:21Z</dc:date>
    </item>
  </channel>
</rss>

