<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Inter VLAN-Routing ASA 5505 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969133#M439742</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ramraj, thanks for your response!&amp;nbsp; Here what Im attempting to do...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to have 4 VLANs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vlan2 -- Outside&lt;/P&gt;&lt;P&gt;Vlan3 -- Guest Wifi&lt;/P&gt;&lt;P&gt;Vlan4 -- Inside LAN&lt;/P&gt;&lt;P&gt;Vlan5 -- Inside LAN Wifi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to allow any communication between Vlan 4 and Vlan 5. &lt;/P&gt;&lt;P&gt; I would then like Vlan4 and Vlan5 to access Vlan 3 but not vice versa (not critical for this functionality to work)&lt;/P&gt;&lt;P&gt;I would like all the Vlans to have access to the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know the ASA is not a router but can act as one (kinda).&amp;nbsp; The "show threat-detection shun" command didnt return any results.&amp;nbsp; I appreciate any assistance with helping me get this up and running.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my latest config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.2(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname frw01&lt;/P&gt;&lt;P&gt;enable password .MlTybcgwEXNF1HM encrypted&lt;/P&gt;&lt;P&gt;passwd .MlTybcgwEXNF1HM encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address dhcp setroute&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt; nameif guest&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 172.16.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan4&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 99&lt;/P&gt;&lt;P&gt; ip address 172.16.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan5&lt;/P&gt;&lt;P&gt; nameif insidewifi&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.16.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; switchport access vlan 3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; switchport access vlan 4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; switchport access vlan 5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CST -6&lt;/P&gt;&lt;P&gt;clock summer-time CDT recurring&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group icmp-type DefaultICMP&lt;/P&gt;&lt;P&gt; description Default ICMP Types permitted&lt;/P&gt;&lt;P&gt; icmp-object echo-reply&lt;/P&gt;&lt;P&gt; icmp-object unreachable&lt;/P&gt;&lt;P&gt; icmp-object time-exceeded&lt;/P&gt;&lt;P&gt;access-list icmp_outside extended permit icmp any any object-group DefaultICMP&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu guest 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu insidewifi 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;icmp permit any insidewifi&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (guest) 1 172.16.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (insidewifi) 1 172.16.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (insidewifi,inside) 172.16.2.0 172.16.2.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,insidewifi) 172.16.1.0 172.16.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;access-group icmp_outside in interface outside&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 172.16.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 172.16.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd dns 172.16.1.102&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcprelay server 172.16.1.102 inside&lt;/P&gt;&lt;P&gt;dhcprelay enable guest&lt;/P&gt;&lt;P&gt;dhcprelay enable insidewifi&lt;/P&gt;&lt;P&gt;dhcprelay timeout 60&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics host&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username ***** password PNUmTwjDhevRqhkT encrypted privilege 15&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp error&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:d41d8cd98f00b204e9800998ecf8427e&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 17 Jul 2012 02:14:27 GMT</pubDate>
    <dc:creator>Garland Moore</dc:creator>
    <dc:date>2012-07-17T02:14:27Z</dc:date>
    <item>
      <title>Inter VLAN-Routing ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969122#M439725</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ive been readin all over the internet (including this site) trying to figure out if the asa can handle intervlan routing. Im not sure what I am missing on my config to get this to work.&amp;nbsp; Ive read that it can work and Ive read that it cant work.&amp;nbsp; Can someone lead me in the right direction on how to get this to work on my asa 5505. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my setup&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cable Modem ---&amp;gt; ASA (eth0/0)&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (eth0/2) --&amp;gt;unmanaged switch for LAN connectivity&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (eth0/3) --&amp;gt; Access point for wireless LAN connectivty&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My config is attached&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I would like to do is be able to communicate between vlan3(LAN) and vlan4(Wireless LAN)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Whats strange is I can RDP between the two vlans but I cant ping or anything else.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help is appreciated!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:28:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969122#M439725</guid>
      <dc:creator>Garland Moore</dc:creator>
      <dc:date>2019-03-11T23:28:45Z</dc:date>
    </item>
    <item>
      <title>Inter VLAN-Routing ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969123#M439726</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Personally I would do the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.) Change the wifi interface security-level to something like 99&lt;/P&gt;&lt;P&gt;2.) remote the nat command: static (insidewifi,inside) 172.16.2.0 172.16.2.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;3.) Configure icmp inspection so ICMP will pass through without opening both directions for the traffic (echo and reply)&lt;/P&gt;&lt;P&gt;4.) Build access-lists for each interface even though they might be simple&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One option with the NAT you have is ofcourse using NAT0/NAT Exempt to tell the ASA that no translation between these networks will be done. Then again I think the ASA doesnt have the "nat-control" configured at the moment so removing both the static translations should still mean your 2 LAN networks should be able to reach each other wihtout using NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jul 2012 05:33:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969123#M439726</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-07-10T05:33:08Z</dc:date>
    </item>
    <item>
      <title>Inter VLAN-Routing ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969124#M439727</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The ICMP inspection configuration was&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp error&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jul 2012 05:33:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969124#M439727</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-07-10T05:33:56Z</dc:date>
    </item>
    <item>
      <title>Inter VLAN-Routing ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969125#M439728</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;JouniForss, thanks for your response.&amp;nbsp; I tried your suggested step and I was still unable to talk between the two vlans.&amp;nbsp; Is my approach to this scenario wrong.&amp;nbsp; I know ASA arent typically used as Layer devices but from what Ive been reading it can be done. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From my reading it seems like the following alone should allow me to talk across the vlans:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (insidewifi,inside) 172.16.2.0 172.16.2.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,insidewifi) 172.16.1.0 172.16.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for all the questions, Im familiar with routing and switching.&amp;nbsp; The ASA is kind of a different beast.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another thing thats weird to me is that, when I do a packet trace is states that the packet is allowed.&amp;nbsp; Any help is appreciated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jul 2012 04:27:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969125#M439728</guid>
      <dc:creator>Garland Moore</dc:creator>
      <dc:date>2012-07-11T04:27:04Z</dc:date>
    </item>
    <item>
      <title>Inter VLAN-Routing ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969126#M439729</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There should be no problem using the ASA in this kind of setup. Though I'm more used to doing this with the other ASA models. ASA 5510 and onwards where the interface configurations change compared to the ASA5505 (no actual switch ports)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "same-security-traffic" command basically either permit traffic between interfaces with same security-level or allow traffic to be sent out the same interface it originally came from. In this case only one of them should apply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems strange to me that you can indeed use RDP connections but nothing else works. One would think the problem stems from something else than the firewall settings if some connections go through&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you been able to send ICMP through the firewall after adding the commands I mentioned? There shouldnt be anything preventhing the Echos/Echo replys other than the devices sending them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to allow icmp echos on you ASAs interfaces you can use the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;icmp permit any &lt;INTERFACE name=""&gt;&lt;/INTERFACE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This command allows you to ping the ASAs interfaces. Notice though that you cant ping a ASA interface behind another ASA interface. You can only ping the interface behind which you are connected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I typically allow ICMP on all interfaces that arent connected to public network/Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally, if you have some TCP connection that you can use to test traffic between these Vlans, try it out and at the same time monitor the traffic through ASDM and see what happens to the connection. Does the connection get built on the ASA but is it beeing torn down by SYN Timeout or whats happening?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jul 2012 06:22:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969126#M439729</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-07-11T06:22:26Z</dc:date>
    </item>
    <item>
      <title>Inter VLAN-Routing ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969127#M439730</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So Ive made the changes you suggested but Im still unable to get the functionality I am looking for. My config is below after the changes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ASA Version 8.2(2)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;hostname frw01&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;enable password .MlTybcgwEXNF1HM encrypted&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;passwd .MlTybcgwEXNF1HM encrypted&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;names&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Vlan2&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; nameif outside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; security-level 0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; ip address dhcp setroute&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Vlan3&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; no forward interface Vlan4&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; nameif guest&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; security-level 50&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; ip address 172.16.10.1 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Vlan4&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; nameif inside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; security-level 99&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; ip address 172.16.1.1 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Vlan5&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; nameif insidewifi&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; security-level 100&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; ip address 172.16.2.1 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Ethernet0/0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; switchport access vlan 2&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Ethernet0/1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; switchport access vlan 3&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Ethernet0/2&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; switchport access vlan 4&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Ethernet0/3&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; switchport access vlan 5&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Ethernet0/4&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; shutdown&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Ethernet0/5&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; shutdown&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Ethernet0/6&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; shutdown&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Ethernet0/7&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; shutdown&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ftp mode passive&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;clock timezone CST -6&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;clock summer-time CDT recurring&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;same-security-traffic permit inter-interface&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;same-security-traffic permit intra-interface&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;object-group icmp-type DefaultICMP&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; description Default ICMP Types permitted&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; icmp-object echo-reply&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; icmp-object unreachable&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; icmp-object time-exceeded&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list icmp_outside extended permit icmp any any object-group DefaultICMP&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;pager lines 24&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;logging enable&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;logging asdm informational&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;mtu outside 1500&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;mtu guest 1500&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;mtu inside 1500&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;mtu insidewifi 1500&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;no failover&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;icmp permit any inside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;icmp permit any insidewifi&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;no asdm history enable&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;arp timeout 14400&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;global (outside) 1 interface&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;nat (guest) 1 172.16.10.0 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;nat (inside) 1 172.16.1.0 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;nat (insidewifi) 1 172.16.2.0 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;static (insidewifi,inside) 172.16.2.0 172.16.2.0 netmask 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;static (inside,insidewifi) 172.16.1.0 172.16.1.0 netmask 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-group icmp_outside in interface outside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;timeout xlate 3:00:00&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;aaa authentication ssh console LOCAL&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;aaa authentication http console LOCAL&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;http server enable&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;http 172.16.1.0 255.255.255.0 inside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;no snmp-server location&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;no snmp-server contact&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;crypto ipsec security-association lifetime seconds 28800&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;telnet timeout 5&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ssh 172.16.1.0 255.255.255.0 inside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ssh timeout 5&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;console timeout 0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;management-access inside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;dhcpd dns 172.16.1.102&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;dhcprelay server 172.16.1.102 inside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;dhcprelay enable guest&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;dhcprelay enable insidewifi&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;dhcprelay timeout 60&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;threat-detection basic-threat&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;threat-detection statistics host&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;threat-detection statistics access-list&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;webvpn&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;username ******** password PNUmTwjDhevRqhkT encrypted privilege 15&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;class-map inspection_default&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; match default-inspection-traffic&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;policy-map type inspect dns preset_dns_map&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; parameters&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; message-length maximum client auto&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; message-length maximum 512&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;policy-map global_policy&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; class inspection_default&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect ftp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect h323 h225&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect h323 ras&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect ip-options&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect netbios&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect rsh&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect rtsp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect skinny&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect esmtp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect sqlnet&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect sunrpc&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect tftp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect sip&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect xdmcp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect icmp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect icmp error&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;service-policy global_policy global&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;prompt hostname context&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;call-home&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; profile CiscoTAC-1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; no active&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; destination transport-method http&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Cryptochecksum:3fcbac02b3e4b4e6919cf34a9137b4fb&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is the error message that I receive when trying to connect to an access point on a different subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE height="45" style="width: 712px;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;2&lt;/TD&gt;&lt;TD&gt;Jul 11 2012&lt;/TD&gt;&lt;TD&gt;23:52:18&lt;/TD&gt;&lt;TD&gt;106001&lt;/TD&gt;&lt;TD&gt;172.16.1.200&lt;/TD&gt;&lt;TD&gt;50262&lt;/TD&gt;&lt;TD&gt;172.16.2.1&lt;/TD&gt;&lt;TD&gt;80&lt;/TD&gt;&lt;TD&gt;Inbound TCP connection denied from 172.16.1.200/50262 to 172.16.2.1/80 flags SYN&amp;nbsp; on interface inside&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe I have some over kill here and should start from scratch and change my approach.&amp;nbsp; It seems that my like of experience with the asa is part of the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Suggestions or thoughts?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jul 2012 05:00:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969127#M439730</guid>
      <dc:creator>Garland Moore</dc:creator>
      <dc:date>2012-07-12T05:00:16Z</dc:date>
    </item>
    <item>
      <title>Re: Inter VLAN-Routing ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969128#M439732</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems to me that the log message implies that the host (inside) 172.16.1.200 is connecting to the ASA interface (insidewifi). (TCP SYN to interface IP)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will naturally be blocked. In the same way an ICMP from behind the "inside" interface to the "insidewifi" would be blocked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why are you connecting to the ASA interface IP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jul 2012 06:26:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969128#M439732</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-07-12T06:26:12Z</dc:date>
    </item>
    <item>
      <title>Re: Inter VLAN-Routing ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969129#M439733</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you considered configuring a trunk between the ASA 5505 and the local switch? Since at the moment you just have access ports for all the Vlan interfaces on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I presume you have gotten the ASA with something else than the Base license since you have over 3 interfaces on it. To my understanding.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately i so rarely deal with the ASA5505 that I have forgotten some of the differences it has to the later models.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jul 2012 06:34:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969129#M439733</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-07-12T06:34:11Z</dc:date>
    </item>
    <item>
      <title>Re: Inter VLAN-Routing ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969130#M439736</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; The log above was generated when trying to ping a host on a different vlan.&amp;nbsp; I wasnt attempting to connect to the ASA interface IP/&amp;nbsp; The switch connected to the ASA is an unmanaged switch so I didnt think a trunk was necessary since everything connected to that switch will be on the same vlan.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA does have a Security Plus license.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jul 2012 13:27:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969130#M439736</guid>
      <dc:creator>Garland Moore</dc:creator>
      <dc:date>2012-07-12T13:27:20Z</dc:date>
    </item>
    <item>
      <title>Re: Inter VLAN-Routing ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969131#M439737</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess by ping you are refering to some application testing TCP traffic (sameway the newer ASA software versions have TCP ping)? An actual ICMP echo wouldnt generate that message.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assume the unmanaged switch is only connected to the port Ethernet0/2 on the ASA? (only for interface "inside" users)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jul 2012 09:12:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969131#M439737</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-07-16T09:12:31Z</dc:date>
    </item>
    <item>
      <title>Re: Inter VLAN-Routing ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969132#M439740</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;Based on your requirement as stated in this subject, you want to PING between Vlan3 and Vlan4. This is not hard. Just follow the comments I've give you below, and you will do just fine &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt; no forward interface Vlan4&amp;nbsp; &amp;lt;-- remove this line!!!!!!!!!!!!!!!&lt;BR /&gt; nameif guest&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 172.16.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan4&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 172.16.1.1 255.255.255.0&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;object-group icmp-type DefaultICMP&lt;BR /&gt; description Default ICMP Types permitted&lt;BR /&gt; icmp-object echo &amp;lt;-- add this!!!!!!!!!!!!!!!!!!!!!!!!!!!!!&lt;BR /&gt; icmp-object echo-reply&lt;BR /&gt; icmp-object unreachable&lt;BR /&gt; icmp-object time-exceeded&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no access-list icmp_outside extended permit icmp any any object-group DefaultICMP&lt;BR /&gt;no access-group icmp_outside in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list guest permit icmp any any object-group DefaultICMP&lt;BR /&gt;access-list guest deny ip any any log&lt;BR /&gt;access-group guest in interface guest&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside permit icmp any any object-group DefaultICMP&lt;BR /&gt;access-list inside deny ip any any log&lt;BR /&gt;access-group inside in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,guest) 172.16.1.0 172.16.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By the way, could you also paste the output of this command "show threat-detection shun" here, as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this still doesn't work, paste your latest show run output here. This should be easy and fast &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; Good luck bro&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jul 2012 09:35:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969132#M439740</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-07-16T09:35:07Z</dc:date>
    </item>
    <item>
      <title>Re: Inter VLAN-Routing ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969133#M439742</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ramraj, thanks for your response!&amp;nbsp; Here what Im attempting to do...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to have 4 VLANs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vlan2 -- Outside&lt;/P&gt;&lt;P&gt;Vlan3 -- Guest Wifi&lt;/P&gt;&lt;P&gt;Vlan4 -- Inside LAN&lt;/P&gt;&lt;P&gt;Vlan5 -- Inside LAN Wifi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to allow any communication between Vlan 4 and Vlan 5. &lt;/P&gt;&lt;P&gt; I would then like Vlan4 and Vlan5 to access Vlan 3 but not vice versa (not critical for this functionality to work)&lt;/P&gt;&lt;P&gt;I would like all the Vlans to have access to the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know the ASA is not a router but can act as one (kinda).&amp;nbsp; The "show threat-detection shun" command didnt return any results.&amp;nbsp; I appreciate any assistance with helping me get this up and running.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my latest config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.2(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname frw01&lt;/P&gt;&lt;P&gt;enable password .MlTybcgwEXNF1HM encrypted&lt;/P&gt;&lt;P&gt;passwd .MlTybcgwEXNF1HM encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address dhcp setroute&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt; nameif guest&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 172.16.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan4&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 99&lt;/P&gt;&lt;P&gt; ip address 172.16.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan5&lt;/P&gt;&lt;P&gt; nameif insidewifi&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.16.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; switchport access vlan 3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; switchport access vlan 4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; switchport access vlan 5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CST -6&lt;/P&gt;&lt;P&gt;clock summer-time CDT recurring&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group icmp-type DefaultICMP&lt;/P&gt;&lt;P&gt; description Default ICMP Types permitted&lt;/P&gt;&lt;P&gt; icmp-object echo-reply&lt;/P&gt;&lt;P&gt; icmp-object unreachable&lt;/P&gt;&lt;P&gt; icmp-object time-exceeded&lt;/P&gt;&lt;P&gt;access-list icmp_outside extended permit icmp any any object-group DefaultICMP&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu guest 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu insidewifi 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;icmp permit any insidewifi&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (guest) 1 172.16.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (insidewifi) 1 172.16.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (insidewifi,inside) 172.16.2.0 172.16.2.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,insidewifi) 172.16.1.0 172.16.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;access-group icmp_outside in interface outside&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 172.16.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 172.16.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd dns 172.16.1.102&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcprelay server 172.16.1.102 inside&lt;/P&gt;&lt;P&gt;dhcprelay enable guest&lt;/P&gt;&lt;P&gt;dhcprelay enable insidewifi&lt;/P&gt;&lt;P&gt;dhcprelay timeout 60&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics host&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username ***** password PNUmTwjDhevRqhkT encrypted privilege 15&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp error&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:d41d8cd98f00b204e9800998ecf8427e&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2012 02:14:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969133#M439742</guid>
      <dc:creator>Garland Moore</dc:creator>
      <dc:date>2012-07-17T02:14:27Z</dc:date>
    </item>
    <item>
      <title>Re: Inter VLAN-Routing ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969134#M439744</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;Please delete / write erase your present FW configuration, and paste the configuration shown below. This will work. I've done it too many times, to know this will work &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please ensure the hub or switch connected to each of the FW interface is different, for security and network performance purposes e.g. Ethernet0/0 - 0/3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As for the rules portion, let's keep it loose for now. Once all is good, we can then tighten them yaa &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know how it goes...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;hostname FW01&lt;BR /&gt;enable password cisco&lt;BR /&gt;passwd cisco&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;description ### Link to Internet ###&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address dhcp setroute&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt;description ### Link to GUEST WIFI&amp;nbsp; ###&lt;BR /&gt;nameif guest&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 172.16.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan4&lt;BR /&gt;description ### Link to INSIDE LAN ###&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.16.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan5&lt;BR /&gt;description ### Link to INSIDE WIFI ###&lt;BR /&gt;nameif insidewifi&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 172.16.2.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;description ### Link to Internet ###&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;description ### Link to GUEST WIFI&amp;nbsp; ###&lt;BR /&gt;switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;description ### Link to INSIDE LAN ###&lt;BR /&gt;switchport access vlan 4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;description ### Link to INSIDE WIFI ###&lt;BR /&gt;switchport access vlan 5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;no nat-control&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;!&lt;BR /&gt;access-list inside extended permit ip any any &lt;BR /&gt;access-list outside extended permit ip any any &lt;BR /&gt;access-list guest extended permit ip any any &lt;BR /&gt;access-list insidewifi extended permit ip any any &lt;/P&gt;&lt;P&gt;access-group outside in interface outside&lt;BR /&gt;access-group inside in interface inside&lt;BR /&gt;access-group guest in interface guest&lt;BR /&gt;access-group insidewifi in interface insidewifi&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (guest) 1 172.16.10.0 255.255.255.0&lt;BR /&gt;nat (inside) 1 172.16.1.0 255.255.255.0&lt;BR /&gt;nat (insidewifi) 1 172.16.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;BR /&gt;http 172.16.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;username cisco password cisco privilege 15&lt;/P&gt;&lt;P&gt;ssh 172.16.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd dns 172.16.1.102&lt;BR /&gt;dhcpd ping_timeout 750&lt;BR /&gt;dhcprelay server 172.16.1.102 inside&lt;BR /&gt;dhcprelay enable guest&lt;BR /&gt;dhcprelay enable insidewifi&lt;BR /&gt;dhcprelay timeout 60&lt;BR /&gt;dhcprelay setroute guest&lt;BR /&gt;dhcprelay setroute insidewifi&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2012 05:56:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969134#M439744</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-07-17T05:56:49Z</dc:date>
    </item>
    <item>
      <title>Re: Inter VLAN-Routing ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969135#M439745</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, so I took your advice and pasted your config.&amp;nbsp; Now the only host on the inside vlan can get to the internet.&amp;nbsp; The other vlans get ip addresses but that it.&amp;nbsp; Ive gotta be missing something simple here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname FW01&lt;/P&gt;&lt;P&gt;enable password .MlTybcgwEXNF1HM encrypted&lt;/P&gt;&lt;P&gt;passwd .MlTybcgwEXNF1HM encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; description ### Link to Internet ###&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address dhcp setroute&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt; description ### Link to GUEST WIFI&amp;nbsp; ###&lt;/P&gt;&lt;P&gt; nameif guest&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 172.16.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan4&lt;/P&gt;&lt;P&gt; description ### Link to INSIDE LAN ###&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.16.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan5&lt;/P&gt;&lt;P&gt; description ### Link to INSIDE WIFI ###&lt;/P&gt;&lt;P&gt; nameif insidewifi&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 172.16.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; description ### Link to Internet ###&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; description ### Link to GUEST WIFI&amp;nbsp; ###&lt;/P&gt;&lt;P&gt; switchport access vlan 3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; description ### Link to INSIDE LAN ###&lt;/P&gt;&lt;P&gt; switchport access vlan 4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; description ### Link to INSIDE WIFI ###&lt;/P&gt;&lt;P&gt; switchport access vlan 5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;access-list inside extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list outside extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list guest extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list insidewifi extended permit ip any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu guest 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu insidewifi 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (guest) 1 172.16.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (insidewifi) 1 172.16.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-group outside in interface outside&lt;/P&gt;&lt;P&gt;access-group guest in interface guest&lt;/P&gt;&lt;P&gt;access-group inside in interface inside&lt;/P&gt;&lt;P&gt;access-group insidewifi in interface insidewifi&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 172.16.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 172.16.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd dns 172.16.1.102&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcprelay server 172.16.1.102 inside&lt;/P&gt;&lt;P&gt;dhcprelay enable guest&lt;/P&gt;&lt;P&gt;dhcprelay enable insidewifi&lt;/P&gt;&lt;P&gt;dhcprelay setroute guest&lt;/P&gt;&lt;P&gt;dhcprelay setroute insidewifi&lt;/P&gt;&lt;P&gt;dhcprelay timeout 60&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username ****** password PNUmTwjDhevRqhkT encrypted privilege 15&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:28bf26da86f44244c8f0e4768f75ee70&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jul 2012 04:01:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969135#M439745</guid>
      <dc:creator>Garland Moore</dc:creator>
      <dc:date>2012-07-18T04:01:22Z</dc:date>
    </item>
    <item>
      <title>Re: Inter VLAN-Routing ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969136#M439747</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;You Cisco ASA config is good but I'm suprised only INSIDE can access the Internet. Can you confirm the following;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;a) LAN users in insidewifi and guest can PING to its' gateway i.e. the Cisco ASA itself?&lt;/P&gt;&lt;P&gt;b) LAN users in insidewifi and guest can PING to any Public IP Address e.g. 8.8.8.8?&lt;/P&gt;&lt;P&gt;c) LAN users in insidewifi and guest can PING to any Public FQDN e.g. &lt;A href="http://www.yahoo.com"&gt;www.yahoo.com&lt;/A&gt;?&lt;/P&gt;&lt;P&gt;d) Is the DNS Server settings in insidewifi and guest correct? as in it's the same as inside users. Is the nslookup output the same?&lt;/P&gt;&lt;P&gt;e) Can you paste the show xlate, and show access-list output here?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jul 2012 04:14:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969136#M439747</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-07-18T04:14:22Z</dc:date>
    </item>
    <item>
      <title>Re: Inter VLAN-Routing ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969137#M439749</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I added the static nat commands below and my Vlans can now talk to the internet. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (insidewifi,inside) 172.16.2.0 172.16.2.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,insidewifi) 172.16.1.0 172.16.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are these necessary?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jul 2012 05:22:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969137#M439749</guid>
      <dc:creator>Garland Moore</dc:creator>
      <dc:date>2012-07-18T05:22:46Z</dc:date>
    </item>
    <item>
      <title>Re: Inter VLAN-Routing ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969138#M439751</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This Is weird &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; I've never seen anything like this before. Are you sure you have keyed in the command "no nat-ncontrol"?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jul 2012 05:37:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969138#M439751</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-07-18T05:37:43Z</dc:date>
    </item>
    <item>
      <title>Re: Inter VLAN-Routing ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969139#M439753</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bro,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From my understanding the ASA 5505 has nat control disabled by default.&amp;nbsp; I issued the command anyway, and removed the static nat commands but I was still unable to access the internet. The only way internet access will work is if I have the static NAT commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname FW01&lt;/P&gt;&lt;P&gt;enable password .MlTybcgwEXNF1HM encrypted&lt;/P&gt;&lt;P&gt;passwd .MlTybcgwEXNF1HM encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; description ### Link to Internet ###&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address dhcp setroute&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt; description ### Link to GUEST WIFI&amp;nbsp; ###&lt;/P&gt;&lt;P&gt; nameif guest&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 172.16.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan4&lt;/P&gt;&lt;P&gt; description ### Link to INSIDE LAN ###&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.16.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan5&lt;/P&gt;&lt;P&gt; description ### Link to INSIDE WIFI ###&lt;/P&gt;&lt;P&gt; nameif insidewifi&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 172.16.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; description ### Link to Internet ###&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; description ### Link to GUEST WIFI&amp;nbsp; ###&lt;/P&gt;&lt;P&gt; switchport access vlan 3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; description ### Link to INSIDE LAN ###&lt;/P&gt;&lt;P&gt; switchport access vlan 4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; description ### Link to INSIDE WIFI ###&lt;/P&gt;&lt;P&gt; switchport access vlan 5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;access-list inside extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list outside extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list guest extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list insidewifi extended permit ip any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu guest 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu insidewifi 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (guest) 1 172.16.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (insidewifi) 1 172.16.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-group guest in interface guest&lt;/P&gt;&lt;P&gt;access-group inside in interface inside&lt;/P&gt;&lt;P&gt;access-group insidewifi in interface insidewifi&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 172.16.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 172.16.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd dns 172.16.1.102&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcprelay server 172.16.1.102 inside&lt;/P&gt;&lt;P&gt;dhcprelay enable guest&lt;/P&gt;&lt;P&gt;dhcprelay enable insidewifi&lt;/P&gt;&lt;P&gt;dhcprelay setroute guest&lt;/P&gt;&lt;P&gt;dhcprelay setroute insidewifi&lt;/P&gt;&lt;P&gt;dhcprelay timeout 60&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username ******** password PNUmTwjDhevRqhkT encrypted privilege 15&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:6599fa7a5e196a7dfaa544f75cd64ae7&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jul 2012 03:02:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969139#M439753</guid>
      <dc:creator>Garland Moore</dc:creator>
      <dc:date>2012-07-19T03:02:01Z</dc:date>
    </item>
    <item>
      <title>Inter VLAN-Routing ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969140#M439755</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;I believe everything is working fine now. Please do paste your latest config here, so that the others could learn from your experience as well. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P/S: If you think this comment is useful, please do rate them nicely &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Jul 2012 20:17:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969140#M439755</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-07-22T20:17:00Z</dc:date>
    </item>
    <item>
      <title>Inter VLAN-Routing ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969141#M439758</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the working config.&amp;nbsp; Many thanks to &lt;A _jive_internal="true" href="https://community.cisco.com/people/Ramraj.Sivagnanam"&gt;Ramraj&lt;/A&gt; for his assistance!!!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname FW01&lt;/P&gt;&lt;P&gt;enable password .MlTybcgwEXNF1HM encrypted&lt;/P&gt;&lt;P&gt;passwd .MlTybcgwEXNF1HM encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; description ### Link to Internet ###&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address dhcp setroute&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt; description ### Link to GUEST WIFI&amp;nbsp; ###&lt;/P&gt;&lt;P&gt; nameif guest&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 172.16.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan4&lt;/P&gt;&lt;P&gt; description ### Link to INSIDE LAN ###&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.16.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan5&lt;/P&gt;&lt;P&gt; description ### Link to INSIDE WIFI ###&lt;/P&gt;&lt;P&gt; nameif insidewifi&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 172.16.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; description ### Link to Internet ###&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; description ### Link to GUEST WIFI&amp;nbsp; ###&lt;/P&gt;&lt;P&gt; switchport access vlan 3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; description ### Link to INSIDE LAN ###&lt;/P&gt;&lt;P&gt; switchport access vlan 4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; description ### Link to INSIDE WIFI ###&lt;/P&gt;&lt;P&gt; switchport access vlan 5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;banner exec&lt;/P&gt;&lt;P&gt;banner exec ******* ENGLISH *** ATTENTION *** ENGLISH *** ATTENTION *** ENGLISH **********&lt;/P&gt;&lt;P&gt;banner exec *&lt;/P&gt;&lt;P&gt;banner exec *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; This system is for the use of authorized users only.&lt;/P&gt;&lt;P&gt;banner exec *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Individuals using this system are subject to having all of their&lt;/P&gt;&lt;P&gt;banner exec *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; activities on this system monitored and recorded by system&lt;/P&gt;&lt;P&gt;banner exec *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; personnel.&lt;/P&gt;&lt;P&gt;banner exec *&lt;/P&gt;&lt;P&gt;banner exec *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anyone using this system expressly consents to such monitoring&lt;/P&gt;&lt;P&gt;banner exec *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; and is advised that if such monitoring reveals possible&lt;/P&gt;&lt;P&gt;banner exec *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; evidence of criminal activity, system personnel may provide the&lt;/P&gt;&lt;P&gt;banner exec *&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; evidence of such monitoring to law enforcement officials.&lt;/P&gt;&lt;P&gt;banner exec *&lt;/P&gt;&lt;P&gt;banner exec ******* ENGLISH *** ATTENTION *** ENGLISH *** ATTENTION *** ENGLISH **********&lt;/P&gt;&lt;P&gt;banner exec&lt;/P&gt;&lt;P&gt;banner exec&lt;/P&gt;&lt;P&gt;banner exec Name:.......FW01&lt;/P&gt;&lt;P&gt;banner exec Address:....**********&lt;/P&gt;&lt;P&gt;banner exec Location:...CST -5&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CST -5&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;access-list inside extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list outside extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list guest extended permit udp any host 172.16.1.102 eq domain&lt;/P&gt;&lt;P&gt;access-list guest extended permit udp any host 172.16.1.103 eq domain&lt;/P&gt;&lt;P&gt;access-list guest extended permit udp any any range bootps tftp&lt;/P&gt;&lt;P&gt;access-list guest extended deny ip any 172.16.1.0 255.255.255.0 log&lt;/P&gt;&lt;P&gt;access-list guest extended deny ip any 172.16.2.0 255.255.255.0 log&lt;/P&gt;&lt;P&gt;access-list guest extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list insidewifi extended permit ip any any&lt;/P&gt;&lt;P&gt;no pager&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging list TEST level alerts&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging mail TEST&lt;/P&gt;&lt;P&gt;logging from-address *firewall domain name*&lt;/P&gt;&lt;P&gt;logging recipient-address *enter email address here* level errors&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu guest 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu insidewifi 1500&lt;/P&gt;&lt;P&gt;ip audit name FW01-INFO info action alarm&lt;/P&gt;&lt;P&gt;ip audit name FW01-ATTACK attack action alarm reset&lt;/P&gt;&lt;P&gt;ip audit interface outside FW01-INFO&lt;/P&gt;&lt;P&gt;ip audit interface outside FW01-ATTACK&lt;/P&gt;&lt;P&gt;ip audit signature 2000 disable&lt;/P&gt;&lt;P&gt;ip audit signature 2001 disable&lt;/P&gt;&lt;P&gt;ip audit signature 2004 disable&lt;/P&gt;&lt;P&gt;ip audit signature 2005 disable&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any echo-reply outside&lt;/P&gt;&lt;P&gt;icmp permit any guest&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;icmp permit any insidewifi&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (guest) 1 172.16.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (insidewifi) 1 172.16.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,guest) 172.16.1.0 172.16.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,insidewifi) 172.16.1.0 172.16.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;access-group outside in interface outside&lt;/P&gt;&lt;P&gt;access-group guest in interface guest&lt;/P&gt;&lt;P&gt;access-group inside in interface inside&lt;/P&gt;&lt;P&gt;access-group insidewifi in interface insidewifi&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 172.16.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;fragment chain 1 outside&lt;/P&gt;&lt;P&gt;sysopt noproxyarp outside&lt;/P&gt;&lt;P&gt;service resetoutside&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 172.16.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 60&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd dns 172.16.1.102&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcprelay server 172.16.1.102 inside&lt;/P&gt;&lt;P&gt;dhcprelay enable guest&lt;/P&gt;&lt;P&gt;dhcprelay enable insidewifi&lt;/P&gt;&lt;P&gt;dhcprelay setroute guest&lt;/P&gt;&lt;P&gt;dhcprelay setroute insidewifi&lt;/P&gt;&lt;P&gt;dhcprelay timeout 60&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat shun except ip-address 172.16.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;threat-detection statistics&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P&gt;ntp server 211.233.40.78&lt;/P&gt;&lt;P&gt;ntp server 61.153.197.226&lt;/P&gt;&lt;P&gt;ntp server 202.150.213.154 prefer&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username *username here* password PNUmTwjDhevRqhkT encrypted privilege 15&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;smtp-server 173.194.79.109&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:69ead0d0578ac025238d9a7a25f48f13&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Jul 2012 20:40:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-routing-asa-5505/m-p/1969141#M439758</guid>
      <dc:creator>Garland Moore</dc:creator>
      <dc:date>2012-07-22T20:40:03Z</dc:date>
    </item>
  </channel>
</rss>

