<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA on Multi-Network in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791643#M531087</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeah my biggest doubt is that you are telling the ASA that if he wants to get into&amp;nbsp; 192.168.1.0 he has 3 different next hops. and the same thing for 192.168.2.0 and 192.168.3.0 but checking the Diagram that is not possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 13 Sep 2011 03:36:33 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2011-09-13T03:36:33Z</dc:date>
    <item>
      <title>ASA on Multi-Network</title>
      <link>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791621#M531058</link>
      <description>&lt;P&gt;I have three LANs connected to my ASA, all have internet access, but I am not able to ping or access any of the LANs on the inside network.&amp;nbsp; Can you please advise on where I went wrong?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/6/5/4/60456-Home_Network_with_1_ASA%281%29.jpg" alt="Home_Network_with_1_ASA(1).jpg" class="jive-image-thumbnail jive-image" height="386" onclick="" width="836" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(3)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;enable password DQucN59Njn0OjpJL encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.5.1 255.255.255.0&lt;/P&gt;&lt;P&gt; rip send version 1 2&lt;/P&gt;&lt;P&gt; rip receive version 1 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address dhcp setroute&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;access-list 100 extended permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 100 extended permit ip 192.168.2.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 100 extended permit ip 192.168.1.0 255.255.255.0 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 100 extended permit ip 192.168.3.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 100 extended permit ip 192.168.2.0 255.255.255.0 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 100 extended permit ip 192.168.3.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list ripACL_FR standard permit 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list ripACL_FR standard permit 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list ripACL_FR standard permit 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list ripACL_FR standard permit 192.168.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route-map HomeRoute permit 1&lt;/P&gt;&lt;P&gt; match ip address 100&lt;/P&gt;&lt;P&gt; match interface inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;router rip&lt;/P&gt;&lt;P&gt; network 192.168.1.0&lt;/P&gt;&lt;P&gt; network 192.168.2.0&lt;/P&gt;&lt;P&gt; network 192.168.3.0&lt;/P&gt;&lt;P&gt; network 192.168.5.0&lt;/P&gt;&lt;P&gt; redistribute static route-map HomeRoute&lt;/P&gt;&lt;P&gt; default-information originate route-map HomeRoute&lt;/P&gt;&lt;P&gt; version 2&lt;/P&gt;&lt;P&gt; distribute-list ripACL_FR in interface inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 68.108.10.1 1&lt;/P&gt;&lt;P&gt;route inside 192.168.1.0 255.255.255.0 192.168.5.1 1&lt;/P&gt;&lt;P&gt;route inside 192.168.1.0 255.255.255.0 192.168.2.1 1&lt;/P&gt;&lt;P&gt;route inside 192.168.1.0 255.255.255.0 192.168.3.1 1&lt;/P&gt;&lt;P&gt;route inside 192.168.2.0 255.255.255.0 192.168.5.1 1&lt;/P&gt;&lt;P&gt;route inside 192.168.2.0 255.255.255.0 192.168.1.1 1&lt;/P&gt;&lt;P&gt;route inside 192.168.2.0 255.255.255.0 192.168.3.1 1&lt;/P&gt;&lt;P&gt;route inside 192.168.3.0 255.255.255.0 192.168.5.1 1&lt;/P&gt;&lt;P&gt;route inside 192.168.3.0 255.255.255.0 192.168.1.1 1&lt;/P&gt;&lt;P&gt;route inside 192.168.3.0 255.255.255.0 192.168.2.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.5.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.5.5-192.168.5.36 inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:14debb742c0a6f337f9f5005a22c9a14&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;ciscoasa#&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:23:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791621#M531058</guid>
      <dc:creator>woodjl1650</dc:creator>
      <dc:date>2019-03-11T21:23:41Z</dc:date>
    </item>
    <item>
      <title>Re: ASA on Multi-Network</title>
      <link>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791622#M531059</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jonathan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would you mind to add this.&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;inspect Icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And remember that if you want to ping from a lower security level to a higher there needs to be an ACL allowing this connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 21:12:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791622#M531059</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-09-12T21:12:46Z</dc:date>
    </item>
    <item>
      <title>ASA on Multi-Network</title>
      <link>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791623#M531060</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Plugged those commands in and still don't have access to the other networks....&amp;nbsp; I am currently on the 192.168.1.X network, trying to view a wired IP camera on the 192.168.3.X network.&amp;nbsp; I can't access my printer on 192.168.2.X network either...Here is my current running config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(3)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;enable password DQucN59Njn0OjpJL encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.5.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address dhcp setroute&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (inside) 1 interface&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.5.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.5.5-192.168.5.36 inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:b108a042cb359e4e4e62a0e4ff00ad70&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 23:17:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791623#M531060</guid>
      <dc:creator>woodjl1650</dc:creator>
      <dc:date>2011-09-12T23:17:17Z</dc:date>
    </item>
    <item>
      <title>ASA on Multi-Network</title>
      <link>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791624#M531061</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jonathan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Add this command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; same-security-traffic permit intra-interface &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and try this packet tracer&lt;/P&gt;&lt;P&gt;Packet-tracer input inside tcp 192.168.1.X 1025&amp;nbsp; 192.168.3.X 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know the output of this,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 23:24:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791624#M531061</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-09-12T23:24:47Z</dc:date>
    </item>
    <item>
      <title>ASA on Multi-Network</title>
      <link>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791625#M531062</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It says its allowed under TCP, but when I run the IP tracker on the ASDM, it drops because of NAT.&amp;nbsp; Does my NAT need to be redone?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# packet-tracer input inside tcp 192.168.1.2 http 192.168.3.7 http&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (68.108.12.252 [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 543, untranslate_hits = 32&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Dynamic translate 192.168.1.2/80 to 68.108.12.252/262 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any inside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (192.168.5.1 [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: HOST-LIMIT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 598, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 23:39:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791625#M531062</guid>
      <dc:creator>woodjl1650</dc:creator>
      <dc:date>2011-09-12T23:39:14Z</dc:date>
    </item>
    <item>
      <title>ASA on Multi-Network</title>
      <link>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791626#M531063</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The thing is that you are going from and inside Lan to another Lan located on the inside as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you add the command:&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think this is a routing issue instead of a Natting issue, as we can see on the packet tracer the packet is allowed. but check your Routes:&lt;/P&gt;&lt;P&gt;route inside 192.168.1.0 255.255.255.0 192.168.5.1 1&lt;/P&gt;&lt;P&gt;route inside 192.168.1.0 255.255.255.0 192.168.2.1 1&lt;/P&gt;&lt;P&gt;route inside 192.168.1.0 255.255.255.0 192.168.3.1 1&lt;/P&gt;&lt;P&gt;route inside 192.168.2.0 255.255.255.0 192.168.5.1 1&lt;/P&gt;&lt;P&gt;route inside 192.168.2.0 255.255.255.0 192.168.1.1 1&lt;/P&gt;&lt;P&gt;route inside 192.168.2.0 255.255.255.0 192.168.3.1 1&lt;/P&gt;&lt;P&gt;route inside 192.168.3.0 255.255.255.0 192.168.5.1 1&lt;/P&gt;&lt;P&gt;route inside 192.168.3.0 255.255.255.0 192.168.1.1 1&lt;/P&gt;&lt;P&gt;route inside 192.168.3.0 255.255.255.0 192.168.2.1 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the Ip address of the Layer 3 device on the inside interface, It got to be 192.168.5.something ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 23:46:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791626#M531063</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-09-12T23:46:49Z</dc:date>
    </item>
    <item>
      <title>ASA on Multi-Network</title>
      <link>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791627#M531064</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes my ASA is 192.168.5.1.&amp;nbsp; Plugged those routes in and still no access.&amp;nbsp; Did the tracer on the ASDM and still says NAT issues.... Any idea?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 23:53:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791627#M531064</guid>
      <dc:creator>woodjl1650</dc:creator>
      <dc:date>2011-09-12T23:53:08Z</dc:date>
    </item>
    <item>
      <title>ASA on Multi-Network</title>
      <link>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791628#M531065</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If your ASA is 192.168.5.1 yo do not need to added to the static routes, what is the IP address of the router on the inside, and why are you using three diferent next hops to get to the same lan?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Sep 2011 00:02:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791628#M531065</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-09-13T00:02:25Z</dc:date>
    </item>
    <item>
      <title>ASA on Multi-Network</title>
      <link>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791629#M531066</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have three routers going into the ASA, I want seperate LAN for each part of my network.&amp;nbsp; Each router is assigned 192.168.1.1, 192.168.2.1, and 192.168.3.1.&amp;nbsp; I know it seems more than what it should, but this is how I like it.&amp;nbsp; Is there a way to let all of them talk to each other?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Sep 2011 00:08:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791629#M531066</guid>
      <dc:creator>woodjl1650</dc:creator>
      <dc:date>2011-09-13T00:08:10Z</dc:date>
    </item>
    <item>
      <title>Re: ASA on Multi-Network</title>
      <link>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791630#M531067</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sure you can do that, but in order for us to help you we will need to know the diagram of your network wich I think is something like this:&lt;/P&gt;&lt;P&gt;(x.x.x.x)R1(x.x.x.x)--------(x.x.x.x)R2(x.x.x.x)---------(x.x.x.x)R3(x.x.x.x)------(192.168.51)ASA(dhcp)---( 68.108.10..1)Internet &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But just to let you know each Lan got to have as it default gateway its respective Router, the ASA is only going to work as the default gateway for the network 192.168.5.0&lt;/P&gt;&lt;P&gt;May I have the ip address of each router on both interfaces?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Sep 2011 00:32:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791630#M531067</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-09-13T00:32:12Z</dc:date>
    </item>
    <item>
      <title>ASA on Multi-Network</title>
      <link>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791631#M531068</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is my network diagram with all IP address of all my devices.&amp;nbsp; LIke I said, I have the internet on all routers right now, just need to be able to talk to each on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/9/8/4/60489-Home_Network_with_1_ASA%282%29.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Sep 2011 00:38:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791631#M531068</guid>
      <dc:creator>woodjl1650</dc:creator>
      <dc:date>2011-09-13T00:38:38Z</dc:date>
    </item>
    <item>
      <title>Re: ASA on Multi-Network</title>
      <link>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791632#M531069</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok so what you will need to do its to create 3 vlans, You already have one Vlan1, you will need to create vlan 3 and vlan 4 &lt;/P&gt;&lt;P&gt;Interface vlan 3&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.1683.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interface vlan 4&lt;/P&gt;&lt;P&gt; nameif DMZ2&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Then Assing one port to each of that vlan.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will have to remove the Static Routes except for the one pointing to the outside&amp;nbsp; and then work in static nats and ACLs. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Sep 2011 00:52:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791632#M531069</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-09-13T00:52:08Z</dc:date>
    </item>
    <item>
      <title>ASA on Multi-Network</title>
      <link>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791633#M531070</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Any way to do with a basic license?&amp;nbsp; I can't do more than 2 vlans.... Grrrr.....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Sep 2011 01:01:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791633#M531070</guid>
      <dc:creator>woodjl1650</dc:creator>
      <dc:date>2011-09-13T01:01:02Z</dc:date>
    </item>
    <item>
      <title>ASA on Multi-Network</title>
      <link>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791634#M531071</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The way I told you before:&lt;/P&gt;&lt;DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(x.x.x.x)R1(x.x.x.x)--------(x.x.x.x)R2(x.x.x.x)---------(x.x.x.x)R3(x.x.x.x)------(192.168.51)ASA(dhcp)---(&amp;nbsp; 68.108.10..1)Internet &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But&amp;nbsp; just to let you know each Lan got to have as it default gateway its&amp;nbsp; respective Router, the ASA is only going to work as the default gateway&amp;nbsp; for the network 192.168.5.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Sep 2011 01:06:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791634#M531071</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-09-13T01:06:29Z</dc:date>
    </item>
    <item>
      <title>ASA on Multi-Network</title>
      <link>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791635#M531072</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I guess I don't fully understand what you mean by " &lt;/P&gt;&lt;P&gt;(x.x.x.x)R1(x.x.x.x)--------(x.x.x.x)R2(x.x.x.x)---------(x.x.x.x)R3(x.x.x.x)------(192.168.51)ASA(dhcp)---(&amp;nbsp;&amp;nbsp; 68.108.10..1)Internet"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Sep 2011 01:10:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791635#M531072</guid>
      <dc:creator>woodjl1650</dc:creator>
      <dc:date>2011-09-13T01:10:07Z</dc:date>
    </item>
    <item>
      <title>ASA on Multi-Network</title>
      <link>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791636#M531073</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What do each set of (x.x.x.x) R1(x.x.x.x) mean?&amp;nbsp; Is that IP address of R1 then gateway?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Sep 2011 01:34:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791636#M531073</guid>
      <dc:creator>woodjl1650</dc:creator>
      <dc:date>2011-09-13T01:34:01Z</dc:date>
    </item>
    <item>
      <title>ASA on Multi-Network</title>
      <link>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791637#M531074</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;R1&lt;/P&gt;&lt;P&gt;IP Address = 192.168.1.1&lt;/P&gt;&lt;P&gt;Default Gateway = 192.168.5.1&lt;/P&gt;&lt;P&gt;WAN IP Address = 192.168.5.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R2&lt;/P&gt;&lt;P&gt;IP Adress 192.168.2.1&lt;/P&gt;&lt;P&gt;Default Gateway = 192.168.5.1&lt;/P&gt;&lt;P&gt;WAN IP Adress = 192.168.5.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R3&lt;/P&gt;&lt;P&gt;IP Adress = 192.168.3.1&lt;/P&gt;&lt;P&gt;Default Gateway = 192.168.5.1&lt;/P&gt;&lt;P&gt;WAN IP Adress = 192.168.5.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Internet IP = 68.108.12.XXX&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Sep 2011 02:47:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791637#M531074</guid>
      <dc:creator>woodjl1650</dc:creator>
      <dc:date>2011-09-13T02:47:00Z</dc:date>
    </item>
    <item>
      <title>ASA on Multi-Network</title>
      <link>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791638#M531076</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jonathan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I mean is that you have 4 diferent networks on the same interface, the only way to set this up is with Layer 3 devices&amp;nbsp; splitting the broadcast domains and the networks.&lt;/P&gt;&lt;P&gt;but to do this each router will need to have a default route pointing to the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you understand what I mean&lt;/P&gt;&lt;P&gt;192.168.1.1 --&lt;STRONG&gt;-R1&lt;/STRONG&gt;--192.168.2.2----192.168.2.1--&lt;STRONG&gt;-R2-&lt;/STRONG&gt;-----192.168.3.2----192.168.3.1-&lt;STRONG&gt;-R3&lt;/STRONG&gt;--192.168.5.2----192.168.5.1-&lt;STRONG&gt;ASA&lt;/STRONG&gt;--&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this show you my point of view,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Sep 2011 02:56:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791638#M531076</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-09-13T02:56:26Z</dc:date>
    </item>
    <item>
      <title>ASA on Multi-Network</title>
      <link>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791639#M531079</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you explain the 192.168.1.1 R1 192.168.2.2....and so on, I don't get where those IP are supposed to go.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Sep 2011 03:07:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791639#M531079</guid>
      <dc:creator>woodjl1650</dc:creator>
      <dc:date>2011-09-13T03:07:39Z</dc:date>
    </item>
    <item>
      <title>ASA on Multi-Network</title>
      <link>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791640#M531081</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Maybe is that&amp;nbsp; I dont understand the topology....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At this moment are you able to ping the interface from all the PCs in the diferent networks?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Sep 2011 03:15:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-on-multi-network/m-p/1791640#M531081</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-09-13T03:15:47Z</dc:date>
    </item>
  </channel>
</rss>

