<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Allow all inside  VLANS to access internet and each other in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allow-all-inside-vlans-to-access-internet-and-each-other/m-p/1870939#M456654</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am running into issues with getting that NAT or no-nat working..&amp;nbsp; What would the best syntax be for that?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 18 Jan 2012 18:19:52 GMT</pubDate>
    <dc:creator>alibris</dc:creator>
    <dc:date>2012-01-18T18:19:52Z</dc:date>
    <item>
      <title>Allow all inside  VLANS to access internet and each other</title>
      <link>https://community.cisco.com/t5/network-security/allow-all-inside-vlans-to-access-internet-and-each-other/m-p/1870931#M456635</link>
      <description>&lt;P&gt;I have an ASA at a remote office.&amp;nbsp; They have two VLANS.&amp;nbsp; One for 192.168.0.0/24 called 'inside'.&amp;nbsp; The other for 192.168.1.0/24 called 'inside2'.&amp;nbsp; The 'inside' vlan has no issue with accessing the internet.&amp;nbsp; Inside2 can't access anything even though from the NAT configuration it looks like it should be able to.&amp;nbsp;&amp;nbsp; Are there settings that need to be set to allow 'inside2' out of it's box?&amp;nbsp; I have settings for &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And my NAT looks like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network Private_Out&lt;/P&gt;&lt;P&gt; nat (any,outside) static interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Translations look like this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;phasa01# show xlate&lt;/P&gt;&lt;P&gt;1 in use, 1 most used&lt;/P&gt;&lt;P&gt;Flags: D - DNS, i - dynamic, r - portmap, s - static, I - identity, T - twice&lt;/P&gt;&lt;P&gt;NAT from any:0.0.0.0/0 to outside:X.X.X.X&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags s idle 35:13:54 timeout 0:00:00&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What am I missing here?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:15:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-all-inside-vlans-to-access-internet-and-each-other/m-p/1870931#M456635</guid>
      <dc:creator>alibris</dc:creator>
      <dc:date>2019-03-11T22:15:26Z</dc:date>
    </item>
    <item>
      <title>Re: Allow all inside  VLANS to access internet and each other</title>
      <link>https://community.cisco.com/t5/network-security/allow-all-inside-vlans-to-access-internet-and-each-other/m-p/1870932#M456636</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check your license&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 07:55:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-all-inside-vlans-to-access-internet-and-each-other/m-p/1870932#M456636</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2012-01-17T07:55:22Z</dc:date>
    </item>
    <item>
      <title>Re: Allow all inside  VLANS to access internet and each other</title>
      <link>https://community.cisco.com/t5/network-security/allow-all-inside-vlans-to-access-internet-and-each-other/m-p/1870933#M456639</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Michael,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this a 5505 running a base license?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you provide the following commands:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sh run nat&lt;/P&gt;&lt;P&gt;sh run nameif&lt;/P&gt;&lt;P&gt;sh run access-group&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 15:01:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-all-inside-vlans-to-access-internet-and-each-other/m-p/1870933#M456639</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-17T15:01:09Z</dc:date>
    </item>
    <item>
      <title>Re: Allow all inside  VLANS to access internet and each other</title>
      <link>https://community.cisco.com/t5/network-security/allow-all-inside-vlans-to-access-internet-and-each-other/m-p/1870934#M456642</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It has the sec-plus and a couple of others.&amp;nbsp;&amp;nbsp; What license does it need?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ill get the output from it once I am in front of it in anhour.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 15:08:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-all-inside-vlans-to-access-internet-and-each-other/m-p/1870934#M456642</guid>
      <dc:creator>alibris</dc:creator>
      <dc:date>2012-01-17T15:08:08Z</dc:date>
    </item>
    <item>
      <title>Allow all inside  VLANS to access internet and each other</title>
      <link>https://community.cisco.com/t5/network-security/allow-all-inside-vlans-to-access-internet-and-each-other/m-p/1870935#M456645</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the output from the show runs... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;phasa01# show run nameif&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan12&lt;/P&gt;&lt;P&gt; nameif inside2&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;phasa01# show run nat&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network Private_Out&lt;/P&gt;&lt;P&gt; nat (any,outside) static interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;phasa01# show run access-group &lt;/P&gt;&lt;P&gt;access-group OUTSIDE_IN_ACL in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the license output&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Licensed features for this platform:&lt;/P&gt;&lt;P&gt;Maximum Physical Interfaces&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 8&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;VLANs&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 20&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DMZ Unrestricted&lt;/P&gt;&lt;P&gt;Dual ISPs&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;VLAN Trunk Ports&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 8&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;Inside Hosts&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Unlimited&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;Failover&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Active/Standby perpetual&lt;/P&gt;&lt;P&gt;VPN-DES&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;VPN-3DES-AES&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;AnyConnect Premium Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;AnyConnect Essentials&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;Other VPN Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 25&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;Total VPN Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 25&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;Shared License&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;AnyConnect for Mobile&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;AnyConnect for Cisco VPN Phone&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;Advanced Endpoint Assessment&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;UC Phone Proxy Sessions&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;Total UC Proxy Sessions&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;Botnet Traffic Filter&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;Intercompany Media Engine&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This platform has an ASA 5505 Security Plus license.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 16:22:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-all-inside-vlans-to-access-internet-and-each-other/m-p/1870935#M456645</guid>
      <dc:creator>alibris</dc:creator>
      <dc:date>2012-01-17T16:22:28Z</dc:date>
    </item>
    <item>
      <title>Allow all inside  VLANS to access internet and each other</title>
      <link>https://community.cisco.com/t5/network-security/allow-all-inside-vlans-to-access-internet-and-each-other/m-p/1870936#M456648</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;use your favorite search engine and look for "same-security-interface permit inter-interface"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 16:26:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-all-inside-vlans-to-access-internet-and-each-other/m-p/1870936#M456648</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2012-01-17T16:26:39Z</dc:date>
    </item>
    <item>
      <title>Allow all inside  VLANS to access internet and each other</title>
      <link>https://community.cisco.com/t5/network-security/allow-all-inside-vlans-to-access-internet-and-each-other/m-p/1870937#M456650</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The feature was already implemented as noted in post 1.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 16:35:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-all-inside-vlans-to-access-internet-and-each-other/m-p/1870937#M456650</guid>
      <dc:creator>alibris</dc:creator>
      <dc:date>2012-01-17T16:35:45Z</dc:date>
    </item>
    <item>
      <title>Allow all inside  VLANS to access internet and each other</title>
      <link>https://community.cisco.com/t5/network-security/allow-all-inside-vlans-to-access-internet-and-each-other/m-p/1870938#M456652</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry - I missed that!&amp;nbsp; To fix you should just need to write a nat statement to "not nat" it between the two interfaces.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 16:40:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-all-inside-vlans-to-access-internet-and-each-other/m-p/1870938#M456652</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2012-01-17T16:40:41Z</dc:date>
    </item>
    <item>
      <title>Allow all inside  VLANS to access internet and each other</title>
      <link>https://community.cisco.com/t5/network-security/allow-all-inside-vlans-to-access-internet-and-each-other/m-p/1870939#M456654</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am running into issues with getting that NAT or no-nat working..&amp;nbsp; What would the best syntax be for that?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jan 2012 18:19:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-all-inside-vlans-to-access-internet-and-each-other/m-p/1870939#M456654</guid>
      <dc:creator>alibris</dc:creator>
      <dc:date>2012-01-18T18:19:52Z</dc:date>
    </item>
    <item>
      <title>Re: Allow all inside  VLANS to access internet and each other</title>
      <link>https://community.cisco.com/t5/network-security/allow-all-inside-vlans-to-access-internet-and-each-other/m-p/1870940#M456656</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;static (inside,inside2) source &amp;lt;&amp;lt; object name 1&amp;gt;&amp;gt; &amp;lt;&amp;lt; object name 1&amp;gt;&amp;gt; destination &amp;lt;&amp;lt; object name 1 &amp;gt;&amp;gt; &amp;lt;&amp;lt; object name 1 &amp;gt;&amp;gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Object-group network &amp;lt;&amp;lt; object name 1&amp;gt;&amp;gt; &lt;/P&gt;&lt;P&gt; X.x.x.x y.y.y.y = inside ip subnet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jan 2012 18:34:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-all-inside-vlans-to-access-internet-and-each-other/m-p/1870940#M456656</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2012-01-18T18:34:39Z</dc:date>
    </item>
    <item>
      <title>Re: Allow all inside  VLANS to access internet and each other</title>
      <link>https://community.cisco.com/t5/network-security/allow-all-inside-vlans-to-access-internet-and-each-other/m-p/1870941#M456657</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What version of ASA firmware are those commands valid on.&amp;nbsp; I keep getting errors on 8.4(2).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm about to take a hammer to the unit.&amp;nbsp; I have others that have never given me this much grief.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jan 2012 17:15:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-all-inside-vlans-to-access-internet-and-each-other/m-p/1870941#M456657</guid>
      <dc:creator>alibris</dc:creator>
      <dc:date>2012-01-19T17:15:35Z</dc:date>
    </item>
    <item>
      <title>Re: Allow all inside  VLANS to access internet and each other</title>
      <link>https://community.cisco.com/t5/network-security/allow-all-inside-vlans-to-access-internet-and-each-other/m-p/1870942#M456659</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Michael,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On 8.4(2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network Inside_network&lt;/P&gt;&lt;P&gt;subnet 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network Inside2_network&lt;/P&gt;&lt;P&gt;subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,inside2) source static Inside_network Inside_network&lt;/P&gt;&lt;P&gt;nat (inside2,inside) source static Inside2_network Inside2_network&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know the result of this, if you still unable to do it, please provide the following 2 outputs:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input inside tcp 192.168.0.15 1025 192.168.1.15 80&lt;/P&gt;&lt;P&gt;packet-tracer input inside2 tcp 192.168.1.15 1025 192.168.15 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate helpful posts!!!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jan 2012 17:29:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-all-inside-vlans-to-access-internet-and-each-other/m-p/1870942#M456659</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-19T17:29:12Z</dc:date>
    </item>
    <item>
      <title>Allow all inside  VLANS to access internet and each other</title>
      <link>https://community.cisco.com/t5/network-security/allow-all-inside-vlans-to-access-internet-and-each-other/m-p/1870943#M456660</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Perfect.&amp;nbsp; It is working now.&amp;nbsp; Thank you.&amp;nbsp; Now to my next issue. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jan 2012 00:51:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-all-inside-vlans-to-access-internet-and-each-other/m-p/1870943#M456660</guid>
      <dc:creator>alibris</dc:creator>
      <dc:date>2012-01-20T00:51:36Z</dc:date>
    </item>
    <item>
      <title>Allow all inside  VLANS to access internet and each other</title>
      <link>https://community.cisco.com/t5/network-security/allow-all-inside-vlans-to-access-internet-and-each-other/m-p/1870944#M456662</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Michael,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Great to hear that everything is working!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jan 2012 01:33:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-all-inside-vlans-to-access-internet-and-each-other/m-p/1870944#M456662</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-20T01:33:07Z</dc:date>
    </item>
  </channel>
</rss>

