<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewall blocking traffic between VLANS/subnets in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774756#M531322</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sure, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in_dmz extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list outside_access_in_dmz extended permit tcp any object-group EmailServers eq smtp &lt;/P&gt;&lt;P&gt;access-list outside_access_in_dmz extended permit object-group WebsiteTraffic any object-group WebServers &lt;/P&gt;&lt;P&gt;access-list outside_access_in_dmz extended permit udp any host 10.20.1.5 eq sip &lt;/P&gt;&lt;P&gt;access-list Internal standard permit 192.168.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Internal standard permit 10.20.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Internal standard permit 10.20.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Internal standard permit 10.1.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Internal standard permit 10.1.10.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list dmz_to_inside extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any 10.20.1.16 255.255.255.240 &lt;/P&gt;&lt;P&gt;access-list vlan1_bt_dmz_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list inside_access_in_1 extended permit ip any 10.20.3.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_access_in_1 extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list BT_Outside_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nothing is standing out as wrong from what I can see&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 12 Sep 2011 13:08:39 GMT</pubDate>
    <dc:creator>KingPrawns</dc:creator>
    <dc:date>2011-09-12T13:08:39Z</dc:date>
    <item>
      <title>Firewall blocking traffic between VLANS/subnets</title>
      <link>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774747#M531313</link>
      <description>&lt;P&gt;Here's the problem we've encountered, was hoping you guys could help me debug what the heck is going on: &lt;/P&gt;&lt;P&gt;&lt;BR /&gt; In the below diagram, computers on 10.20.1.x cannot ping anything on the 10.20.3.x subnet (Including Firewall B). &lt;BR /&gt; However, Firewall A can ping Firewall B and the .3.x server so it's not a VLAN routing problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The strange thing is that according to the ASDM Packet trace on Firewall A (&lt;A href="http://i.imgur.com/5xFaf.jpg" target="_blank"&gt;Screenshot&lt;/A&gt;), packets are allowed to travel freely between the internal pc's and the .3.x subnet servers. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://i.imgur.com/uvBI0.jpg" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm positive the fault lies with Firewall A, but the running config file is way too big to post here so I'll try dig out what looks relevant.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have the following NAT rule which I would have though was the solution but that doesn't seem to help: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; static (inside,bt_dmz) 10.20.1.0 10.20.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(bt_dmz is the interface on Firewall A that runs through to the 10.20.3.x subnet)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We also have icmp permitted: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; icmp permit 10.20.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; icmp permit 10.20.2.0 255.255.255.0 dmz&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; icmp permit 10.20.3.0 255.255.255.0 bt_dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access list rule:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list outside_access_in_dmz extended permit icmp any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If Firewall A can ping Firewall B and the server, it feels like routing between VLANS is ok but why then can I not ping the server on that VLAN from my internal PC? Could there be a conflicting rule?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:22:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774747#M531313</guid>
      <dc:creator>KingPrawns</dc:creator>
      <dc:date>2019-03-11T21:22:39Z</dc:date>
    </item>
    <item>
      <title>Firewall blocking traffic between VLANS/subnets</title>
      <link>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774748#M531314</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Wez,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was answering to your thread but I guess you moved it by then &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well I woudl say take captures and analyse, thats the best thing. Check where the packets are getting dropped. Also you woudl need a nat statement for translating the source traffic On firewall 1, something like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 10 10.20.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global (dmz) 10 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the firewall 2, you shoudl have the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) 10.20.1.0 10.20.1.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would request you to kindly try it and take captures. On firewall 2 as well you need the access-list going from dmz to inside, so plz make sure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For captures:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-17814"&gt;https://supportforums.cisco.com/docs/DOC-17814&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Sep 2011 11:50:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774748#M531314</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-09T11:50:49Z</dc:date>
    </item>
    <item>
      <title>Firewall blocking traffic between VLANS/subnets</title>
      <link>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774749#M531315</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey, sorry about that. I posted in routing but fixed an issue soon after which made it seem more like a firewall issue than a routing one so I recreated the post here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With Firewall B, I'm not sure it needs the change you recommended as it's only role is to serve traffic between .3.x servers and the internet. It doesn't actually fall between any internal traffic. Though I might be wrong on that one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With Firewall A, we have the current rules:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; static (inside,bt_dmz) 10.20.1.0 10.20.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list inside_nat0_outbound extended permit ip any 10.20.1.16 255.255.255.240&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; nat (inside) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; global (outside) 101 interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; global (BT_Outside) 103 interface &lt;STRONG&gt;(Redundant)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; global (bt_dmz) 102 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if I rejig your rules, should I still add the following? :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style-type: none;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; nat (inside) 101 10.20.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style-type: none;"&gt;And does this make the global rule ( &lt;EM&gt;global (bt_dmz) 10 interface &lt;/EM&gt;) redundant?&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Sep 2011 12:58:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774749#M531315</guid>
      <dc:creator>KingPrawns</dc:creator>
      <dc:date>2011-09-09T12:58:09Z</dc:date>
    </item>
    <item>
      <title>Firewall blocking traffic between VLANS/subnets</title>
      <link>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774750#M531316</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Wez,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yeah I had a look at it again, and i guess if the traffic for the server is not going through the 2nd firewall, then you don't need any config on it. From the config that you have , i can only see one thing that needs to be added:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (bt_dmz) 101 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can try it, if it still does not work, take captures and trace the packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Sep 2011 13:04:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774750#M531316</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-09T13:04:17Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall blocking traffic between VLANS/subnets</title>
      <link>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774751#M531317</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here are the results from the packet capture wizard. It looks like packets are going one way but not coming back the other.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm guessing that means there are access rules allowing traffic from my pc to the server, but not in the other direction?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;IMG src="http://i.imgur.com/tpA5q.jpg" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Sep 2011 14:08:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774751#M531317</guid>
      <dc:creator>KingPrawns</dc:creator>
      <dc:date>2011-09-09T14:08:10Z</dc:date>
    </item>
    <item>
      <title>Firewall blocking traffic between VLANS/subnets</title>
      <link>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774752#M531318</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What does &lt;STRONG&gt;global (bt_dmz) 101 interface &lt;/STRONG&gt;actually do? As far as I understood, it assigns one of the physical ports on the box as an interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The outside interface assigned to 101 is already used to connect out to the internet. 102 is where the bt_dmz connects up to. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 09:15:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774752#M531318</guid>
      <dc:creator>KingPrawns</dc:creator>
      <dc:date>2011-09-12T09:15:18Z</dc:date>
    </item>
    <item>
      <title>Firewall blocking traffic between VLANS/subnets</title>
      <link>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774753#M531319</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Wez,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The statement is for patting the inside users to the ip address of the bt_dmz interface:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; nat (inside) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;global (bt_dmz) 101 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is the nat ID's that needs to be matched, 101 is the nat id for the global statement corresponding to the one in the nat statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see in the captures, when you ping, the echo request is going fine through the firewall, but we do not see and replies coming back for it, I would suggest you use the global statetment suggested and then take the captures again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know i you have any issues.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 10:28:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774753#M531319</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-12T10:28:08Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall blocking traffic between VLANS/subnets</title>
      <link>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774754#M531320</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Added the rule and re-pinged, still have the same problem. The request is going one way, but not the other.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;New globals/nats look like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE style="word-wrap: break-word; white-space: pre-wrap;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; global (outside) 101 interface
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; global (BT_Outside) 103 interface
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; global (bt_dmz) 101 interface
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; nat (inside) 0 access-list inside_nat0_outbound
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; nat (inside) 101 0.0.0.0 0.0.0.0&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ran the packet tracer tool on the asa, From inside to bt_dmz, it works as expected but the other way I get an access list failure. (Though I'm not sure it is because I have the wrong interface selected) - &lt;A class="active_link" href="http://i.imgur.com/YslYL.jpg"&gt;Screen shot&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The access list it drops on is the default any - any - deny rule in the inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could it be something like a static route that had been set up ? &lt;/P&gt;&lt;P&gt;We had once tried to get the BT_dmz to go out via BT_outside interface, but abandoned that plan. I don't think there are any rules left that would cause issue though. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 11:13:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774754#M531320</guid>
      <dc:creator>KingPrawns</dc:creator>
      <dc:date>2011-09-12T11:13:58Z</dc:date>
    </item>
    <item>
      <title>Firewall blocking traffic between VLANS/subnets</title>
      <link>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774755#M531321</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you provide me the access-list that you have applied on the inside interface??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 11:38:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774755#M531321</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-12T11:38:07Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall blocking traffic between VLANS/subnets</title>
      <link>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774756#M531322</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sure, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in_dmz extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list outside_access_in_dmz extended permit tcp any object-group EmailServers eq smtp &lt;/P&gt;&lt;P&gt;access-list outside_access_in_dmz extended permit object-group WebsiteTraffic any object-group WebServers &lt;/P&gt;&lt;P&gt;access-list outside_access_in_dmz extended permit udp any host 10.20.1.5 eq sip &lt;/P&gt;&lt;P&gt;access-list Internal standard permit 192.168.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Internal standard permit 10.20.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Internal standard permit 10.20.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Internal standard permit 10.1.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Internal standard permit 10.1.10.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list dmz_to_inside extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any 10.20.1.16 255.255.255.240 &lt;/P&gt;&lt;P&gt;access-list vlan1_bt_dmz_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list inside_access_in_1 extended permit ip any 10.20.3.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_access_in_1 extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list BT_Outside_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nothing is standing out as wrong from what I can see&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 13:08:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774756#M531322</guid>
      <dc:creator>KingPrawns</dc:creator>
      <dc:date>2011-09-12T13:08:39Z</dc:date>
    </item>
    <item>
      <title>Firewall blocking traffic between VLANS/subnets</title>
      <link>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774757#M531323</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Wez,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you also send:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run access-group as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 13:12:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774757#M531323</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-12T13:12:01Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall blocking traffic between VLANS/subnets</title>
      <link>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774758#M531324</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, missed those. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group outside_access_in_dmz in interface outside&lt;/P&gt;&lt;P&gt;access-group inside_access_in_1 in interface inside&lt;/P&gt;&lt;P&gt;access-group BT_Outside_access_in in interface BT_Outside&lt;/P&gt;&lt;P&gt;access-group dmz_to_inside in interface dmz&lt;/P&gt;&lt;P&gt;access-group vlan1_bt_dmz_access_in in interface bt_dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a big old list of service and network objects if you want them too, though there's nothing really in there relating to either the .3.x subnet or the bt_dmz&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 13:20:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774758#M531324</guid>
      <dc:creator>KingPrawns</dc:creator>
      <dc:date>2011-09-12T13:20:15Z</dc:date>
    </item>
    <item>
      <title>Firewall blocking traffic between VLANS/subnets</title>
      <link>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774759#M531325</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could you please add this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list vlan1_bt_dmz_access_in extended permit icmp any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this should resolve the icmp issue and check packet-tracer again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 13:28:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774759#M531325</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-12T13:28:24Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall blocking traffic between VLANS/subnets</title>
      <link>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774760#M531326</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Added that in, and re-ran the packet capture (&lt;A href="http://i.imgur.com/CdVwN.jpg"&gt;Results&lt;/A&gt;) but with little success.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would it help if I private messaged you the full running config?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 13:49:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774760#M531326</guid>
      <dc:creator>KingPrawns</dc:creator>
      <dc:date>2011-09-12T13:49:05Z</dc:date>
    </item>
    <item>
      <title>Firewall blocking traffic between VLANS/subnets</title>
      <link>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774761#M531327</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sure Wez, go ahead. You can PM me the config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 13:51:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774761#M531327</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-12T13:51:58Z</dc:date>
    </item>
    <item>
      <title>Firewall blocking traffic between VLANS/subnets</title>
      <link>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774762#M531328</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Wez,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; doubt a few things, can you plz delete the statement:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) 10.20.1.0 10.20.1.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and try again, if it does not work, i would need the output of:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input inside icmp 10.20.1.161 0 8 10.20.3.151 detailed&lt;/P&gt;&lt;P&gt;taken from the cli and not the wizard.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 14:36:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774762#M531328</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-12T14:36:58Z</dc:date>
    </item>
    <item>
      <title>Firewall blocking traffic between VLANS/subnets</title>
      <link>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774763#M531329</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm a little worried about deleting &lt;STRONG&gt;static (inside,dmz) 10.20.1.0 10.20.1.0 &lt;/STRONG&gt;since I'm sure that relates to our existing servers (10.20.2.x) which we use on a regular basis. Would removing it stop us from connectiong between inside and dmz ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the output before removing the rule:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;P&gt;# packet-tracer input inside icmp 10.20.1.161 0 8 10.20.13.151 detailed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd555a118, priority=1, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=34883336, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group inside_access_in_1 in interface inside&lt;/P&gt;&lt;P&gt;access-list inside_access_in_1 extended permit ip any any&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd5662268, priority=12, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1025011, user_data=0xd5662228, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd555c2e0, priority=0, domain=permit-ip-option, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1028573, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: INSPECT&lt;/P&gt;&lt;P&gt;Subtype: np-inspect&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd555b5e8, priority=66, domain=inspect-icmp-error, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3541, user_data=0xd553c368, cs_id=0x0, use_real_addr, flags=0x0, pr&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; otocol=1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,dmz) 10.20.1.0 10.20.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside 10.20.1.0 255.255.255.0 dmz any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 10.20.1.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 561088, untranslate_hits = 18184&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd5619e40, priority=5, domain=host, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1027904, user_data=0xd56198c0, cs_id=0x0, reverse, flags=0x0, proto&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; col=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=10.20.1.0, mask=255.255.255.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 101 (82.20.64.129 [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 463950, untranslate_hits = 118304&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd5616e00, priority=1, domain=nat, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=788736, user_data=0xd5616d60, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt; &lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 14:44:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774763#M531329</guid>
      <dc:creator>KingPrawns</dc:creator>
      <dc:date>2011-09-12T14:44:08Z</dc:date>
    </item>
    <item>
      <title>Firewall blocking traffic between VLANS/subnets</title>
      <link>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774764#M531330</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Wez,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see that the traffic is hitting the static statement instead of the nat statement. and if you remember my first post:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;PRE&gt;&lt;P&gt;Varun Rao wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was answering to your thread but I guess you moved it by then &lt;SPAN __jive_emoticon_name="happy"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Well&amp;nbsp; I woudl say take captures and analyse, thats the best thing. Check&amp;nbsp; where the packets are getting dropped. Also you woudl need a nat&amp;nbsp; statement for translating the source traffic On firewall 1, something&amp;nbsp; like this:&lt;/P&gt;
&lt;P&gt;nat (inside) 10 10.20.1.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;global (dmz) 10 interface&lt;/P&gt;
On the firewall 2, you shoudl have the following:
&lt;STRONG&gt;static (inside,dmz) 10.20.1.0 10.20.1.0&lt;/STRONG&gt;
&lt;P&gt;&lt;/P&gt;I&amp;nbsp; would request you to kindly try it and take captures. On firewall 2 as &lt;BR /&gt;well you need the access-list going from dmz to inside, so plz make&amp;nbsp; sure.
&lt;P&gt;&lt;/P&gt; &lt;/PRE&gt;
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I had suggested you this, so I think thats when you added it. Correct me if I am wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 15:11:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774764#M531330</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-12T15:11:22Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall blocking traffic between VLANS/subnets</title>
      <link>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774765#M531331</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, I should have mentioned that I tweaked that to: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; static (inside,&lt;STRONG&gt;bt_&lt;/STRONG&gt;dmz) 10.20.1.0 10.20.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, removing that seems to have done the trick! I can rdp and ping that server absolutely fine now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Second tickbox is getting servers on 10.20.2.x to be able to ping 10.20.3.x.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; The packet trace is failing on &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd55366e8, priority=110, domain=permit, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=14, user_data=0x0, cs_id=0x0, flags=0x3000, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does that mean I need to add something like &lt;STRONG&gt;access-list dmz_to_bt_dmz extended permit ip any any &lt;/STRONG&gt;to the access list?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, would I need &lt;STRONG&gt;static (dmz,bt_dmz) 10.20.2.0 10.20.2.0 netmask 255.255.255.0 &lt;/STRONG&gt;?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 15:55:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774765#M531331</guid>
      <dc:creator>KingPrawns</dc:creator>
      <dc:date>2011-09-12T15:55:31Z</dc:date>
    </item>
    <item>
      <title>Firewall blocking traffic between VLANS/subnets</title>
      <link>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774766#M531332</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Excellent!!!!!!!!! So one issue has been knocked out &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Coming to the next, you need to just add this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (dmz) 102 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;global (bt_dmz) 102 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE style="word-wrap: break-word; white-space: pre-wrap;"&gt;access-list dmz_to_inside extended permit icmp any any&lt;BR /&gt;same-security-traffic permit inter-interface&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and it should work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it does, I would need the complete packet-tracer output.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 16:08:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-blocking-traffic-between-vlans-subnets/m-p/1774766#M531332</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-12T16:08:40Z</dc:date>
    </item>
  </channel>
</rss>

