<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Internal traffic not allowed in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/internal-traffic-not-allowed/m-p/1711111#M534563</link>
    <description>&lt;P&gt;Ok, I have reviewed this configuration a couple of times and I am not seeing my error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have two internal subnets, in different VLANs with the ASA being the default router.&amp;nbsp;&amp;nbsp;&amp;nbsp; The internal zone works fine, but the zone called wireless on VLAN 13 doesn't.&amp;nbsp;&amp;nbsp; The firewall blocks all communications and the rules look correct to me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want all traffic on this wireless subnet to be allowed to cross over the firewall and NAT to the outside interface, just as the inside zone does.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration is here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.3(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname xxx-fw1&lt;/P&gt;&lt;P&gt;domain-name xxxxx.xxx&lt;/P&gt;&lt;P&gt;enable password xxxx encrypted&lt;/P&gt;&lt;P&gt;passwd xxxxxxx encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; description Internal Network&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.9.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; description Public Internet&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address xxx.xxx.xxx.xxx 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan13&lt;/P&gt;&lt;P&gt; description Guest Wireless&lt;/P&gt;&lt;P&gt; nameif Wireless-Guest&lt;/P&gt;&lt;P&gt; security-level 25&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan23&lt;/P&gt;&lt;P&gt; nameif StateNet&lt;/P&gt;&lt;P&gt; security-level 75&lt;/P&gt;&lt;P&gt; ip address xxx.xxx.xxx.xxx 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; switchport trunk allowed vlan 1,13&lt;/P&gt;&lt;P&gt; switchport trunk native vlan 1&lt;/P&gt;&lt;P&gt; switchport mode trunk&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; switchport trunk allowed vlan 1,13&lt;/P&gt;&lt;P&gt; switchport trunk native vlan 1&lt;/P&gt;&lt;P&gt; switchport mode trunk&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; switchport access vlan 23&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; switchport trunk allowed vlan 1&lt;/P&gt;&lt;P&gt; switchport trunk native vlan 1&lt;/P&gt;&lt;P&gt; switchport mode trunk&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name xxxxxxxx.xxx&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object service IMAPoverSSL&lt;/P&gt;&lt;P&gt; service tcp destination eq 993&lt;/P&gt;&lt;P&gt; description IMAP over SSL&lt;/P&gt;&lt;P&gt;object service POPoverSSL&lt;/P&gt;&lt;P&gt; service tcp destination eq 995&lt;/P&gt;&lt;P&gt; description POP3 over SSL&lt;/P&gt;&lt;P&gt;object service SMTPwTLS&lt;/P&gt;&lt;P&gt; service tcp destination eq 465&lt;/P&gt;&lt;P&gt; description SMTP with TLS&lt;/P&gt;&lt;P&gt;object network obj-192.168.9.20&lt;/P&gt;&lt;P&gt; host 192.168.9.20&lt;/P&gt;&lt;P&gt;object network obj-claggett-https&lt;/P&gt;&lt;P&gt; host 192.168.9.20&lt;/P&gt;&lt;P&gt;object network obj-claggett-imap4&lt;/P&gt;&lt;P&gt; host 192.168.9.20&lt;/P&gt;&lt;P&gt;object network obj-claggett-pop3&lt;/P&gt;&lt;P&gt; host 192.168.9.20&lt;/P&gt;&lt;P&gt;object network obj-claggett-smtp&lt;/P&gt;&lt;P&gt; host 192.168.9.20&lt;/P&gt;&lt;P&gt;object network obj-claggett-imapoverssl&lt;/P&gt;&lt;P&gt; host 192.168.9.20&lt;/P&gt;&lt;P&gt;object network obj-claggett-popoverssl&lt;/P&gt;&lt;P&gt; host 192.168.9.20&lt;/P&gt;&lt;P&gt;object network obj-claggett-smtpwTLS&lt;/P&gt;&lt;P&gt; host 192.168.9.20&lt;/P&gt;&lt;P&gt;object network obj-192.168.9.120&lt;/P&gt;&lt;P&gt; host 192.168.9.120&lt;/P&gt;&lt;P&gt;object network obj-192.168.9.119&lt;/P&gt;&lt;P&gt; host 192.168.9.119&lt;/P&gt;&lt;P&gt;object network obj-192.168.9.121&lt;/P&gt;&lt;P&gt; host 192.168.9.121&lt;/P&gt;&lt;P&gt;object network obj-wirelessnet&lt;/P&gt;&lt;P&gt; subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network WirelessClients&lt;/P&gt;&lt;P&gt; subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group service EmailServices&lt;/P&gt;&lt;P&gt; description Normal Email/Exchange Services&lt;/P&gt;&lt;P&gt; service-object object IMAPoverSSL&lt;/P&gt;&lt;P&gt; service-object object POPoverSSL&lt;/P&gt;&lt;P&gt; service-object object SMTPwTLS&lt;/P&gt;&lt;P&gt; service-object tcp destination eq https&lt;/P&gt;&lt;P&gt; service-object tcp destination eq imap4&lt;/P&gt;&lt;P&gt; service-object tcp destination eq pop3&lt;/P&gt;&lt;P&gt; service-object tcp destination eq smtp&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_1&lt;/P&gt;&lt;P&gt; service-object object IMAPoverSSL&lt;/P&gt;&lt;P&gt; service-object object POPoverSSL&lt;/P&gt;&lt;P&gt; service-object object SMTPwTLS&lt;/P&gt;&lt;P&gt; service-object tcp destination eq pop3&lt;/P&gt;&lt;P&gt; service-object tcp destination eq https&lt;/P&gt;&lt;P&gt; service-object tcp destination eq smtp&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_2&lt;/P&gt;&lt;P&gt; service-object object IMAPoverSSL&lt;/P&gt;&lt;P&gt; service-object object POPoverSSL&lt;/P&gt;&lt;P&gt; service-object object SMTPwTLS&lt;/P&gt;&lt;P&gt; service-object tcp destination eq https&lt;/P&gt;&lt;P&gt; service-object tcp destination eq pop3&lt;/P&gt;&lt;P&gt; service-object tcp destination eq smtp&lt;/P&gt;&lt;P&gt;object-group network obj_clerkpc&lt;/P&gt;&lt;P&gt; description Clerk's PCs&lt;/P&gt;&lt;P&gt; network-object object obj-192.168.9.119&lt;/P&gt;&lt;P&gt; network-object object obj-192.168.9.120&lt;/P&gt;&lt;P&gt; network-object object obj-192.168.9.121&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_2 any interface outside&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_1 any host 192.168.9.20&lt;/P&gt;&lt;P&gt;access-list StateNet_access_in extended permit ip object-group obj_clerkpc any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm warnings&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;mtu Wireless-Guest 1500&lt;/P&gt;&lt;P&gt;mtu StateNet 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-635.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface&lt;/P&gt;&lt;P&gt;object network obj-claggett-https&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp https https&lt;/P&gt;&lt;P&gt;object network obj-claggett-imap4&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp imap4 imap4&lt;/P&gt;&lt;P&gt;object network obj-claggett-pop3&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp pop3 pop3&lt;/P&gt;&lt;P&gt;object network obj-claggett-smtp&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp smtp smtp&lt;/P&gt;&lt;P&gt;object network obj-claggett-imapoverssl&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 993 993&lt;/P&gt;&lt;P&gt;object network obj-claggett-popoverssl&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 995 995&lt;/P&gt;&lt;P&gt;object network obj-claggett-smtpwTLS&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 465 465&lt;/P&gt;&lt;P&gt;object network obj-192.168.9.120&lt;/P&gt;&lt;P&gt; nat (inside,StateNet) static 10.63.198.12&lt;/P&gt;&lt;P&gt;object network obj-192.168.9.119&lt;/P&gt;&lt;P&gt; nat (any,StateNet) static 10.63.198.10&lt;/P&gt;&lt;P&gt;object network obj-192.168.9.121&lt;/P&gt;&lt;P&gt; nat (any,StateNet) static 10.63.198.11&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group StateNet_access_in in interface StateNet&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 xxx.xxx.xxx.xxx 1&lt;/P&gt;&lt;P&gt;route StateNet 10.0.0.0 255.0.0.0 10.63.xxx.x 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable 5443&lt;/P&gt;&lt;P&gt;http 192.168.9.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 74.94.142.225 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet 192.168.9.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd dns 8.8.8.8 8.8.4.4&lt;/P&gt;&lt;P&gt;dhcpd lease 10800&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.100-192.168.1.254 Wireless-Guest&lt;/P&gt;&lt;P&gt;dhcpd enable Wireless-Guest&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics host number-of-rate 2&lt;/P&gt;&lt;P&gt;threat-detection statistics port&lt;/P&gt;&lt;P&gt;threat-detection statistics protocol&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ntp server 63.240.161.99 source outside prefer&lt;/P&gt;&lt;P&gt;ntp server 207.171.30.106 source outside prefer&lt;/P&gt;&lt;P&gt;ntp server 70.86.250.6 source outside prefer&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DD" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DD&lt;/A&gt;&lt;/P&gt;&lt;P&gt;CEService&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:05c24559cf3efa9f924eacb8756addfe&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for any assistance.&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 21:05:53 GMT</pubDate>
    <dc:creator>brunellej</dc:creator>
    <dc:date>2019-03-11T21:05:53Z</dc:date>
    <item>
      <title>Internal traffic not allowed</title>
      <link>https://community.cisco.com/t5/network-security/internal-traffic-not-allowed/m-p/1711111#M534563</link>
      <description>&lt;P&gt;Ok, I have reviewed this configuration a couple of times and I am not seeing my error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have two internal subnets, in different VLANs with the ASA being the default router.&amp;nbsp;&amp;nbsp;&amp;nbsp; The internal zone works fine, but the zone called wireless on VLAN 13 doesn't.&amp;nbsp;&amp;nbsp; The firewall blocks all communications and the rules look correct to me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want all traffic on this wireless subnet to be allowed to cross over the firewall and NAT to the outside interface, just as the inside zone does.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration is here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.3(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname xxx-fw1&lt;/P&gt;&lt;P&gt;domain-name xxxxx.xxx&lt;/P&gt;&lt;P&gt;enable password xxxx encrypted&lt;/P&gt;&lt;P&gt;passwd xxxxxxx encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; description Internal Network&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.9.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; description Public Internet&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address xxx.xxx.xxx.xxx 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan13&lt;/P&gt;&lt;P&gt; description Guest Wireless&lt;/P&gt;&lt;P&gt; nameif Wireless-Guest&lt;/P&gt;&lt;P&gt; security-level 25&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan23&lt;/P&gt;&lt;P&gt; nameif StateNet&lt;/P&gt;&lt;P&gt; security-level 75&lt;/P&gt;&lt;P&gt; ip address xxx.xxx.xxx.xxx 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; switchport trunk allowed vlan 1,13&lt;/P&gt;&lt;P&gt; switchport trunk native vlan 1&lt;/P&gt;&lt;P&gt; switchport mode trunk&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; switchport trunk allowed vlan 1,13&lt;/P&gt;&lt;P&gt; switchport trunk native vlan 1&lt;/P&gt;&lt;P&gt; switchport mode trunk&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; switchport access vlan 23&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; switchport trunk allowed vlan 1&lt;/P&gt;&lt;P&gt; switchport trunk native vlan 1&lt;/P&gt;&lt;P&gt; switchport mode trunk&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name xxxxxxxx.xxx&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object service IMAPoverSSL&lt;/P&gt;&lt;P&gt; service tcp destination eq 993&lt;/P&gt;&lt;P&gt; description IMAP over SSL&lt;/P&gt;&lt;P&gt;object service POPoverSSL&lt;/P&gt;&lt;P&gt; service tcp destination eq 995&lt;/P&gt;&lt;P&gt; description POP3 over SSL&lt;/P&gt;&lt;P&gt;object service SMTPwTLS&lt;/P&gt;&lt;P&gt; service tcp destination eq 465&lt;/P&gt;&lt;P&gt; description SMTP with TLS&lt;/P&gt;&lt;P&gt;object network obj-192.168.9.20&lt;/P&gt;&lt;P&gt; host 192.168.9.20&lt;/P&gt;&lt;P&gt;object network obj-claggett-https&lt;/P&gt;&lt;P&gt; host 192.168.9.20&lt;/P&gt;&lt;P&gt;object network obj-claggett-imap4&lt;/P&gt;&lt;P&gt; host 192.168.9.20&lt;/P&gt;&lt;P&gt;object network obj-claggett-pop3&lt;/P&gt;&lt;P&gt; host 192.168.9.20&lt;/P&gt;&lt;P&gt;object network obj-claggett-smtp&lt;/P&gt;&lt;P&gt; host 192.168.9.20&lt;/P&gt;&lt;P&gt;object network obj-claggett-imapoverssl&lt;/P&gt;&lt;P&gt; host 192.168.9.20&lt;/P&gt;&lt;P&gt;object network obj-claggett-popoverssl&lt;/P&gt;&lt;P&gt; host 192.168.9.20&lt;/P&gt;&lt;P&gt;object network obj-claggett-smtpwTLS&lt;/P&gt;&lt;P&gt; host 192.168.9.20&lt;/P&gt;&lt;P&gt;object network obj-192.168.9.120&lt;/P&gt;&lt;P&gt; host 192.168.9.120&lt;/P&gt;&lt;P&gt;object network obj-192.168.9.119&lt;/P&gt;&lt;P&gt; host 192.168.9.119&lt;/P&gt;&lt;P&gt;object network obj-192.168.9.121&lt;/P&gt;&lt;P&gt; host 192.168.9.121&lt;/P&gt;&lt;P&gt;object network obj-wirelessnet&lt;/P&gt;&lt;P&gt; subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network WirelessClients&lt;/P&gt;&lt;P&gt; subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group service EmailServices&lt;/P&gt;&lt;P&gt; description Normal Email/Exchange Services&lt;/P&gt;&lt;P&gt; service-object object IMAPoverSSL&lt;/P&gt;&lt;P&gt; service-object object POPoverSSL&lt;/P&gt;&lt;P&gt; service-object object SMTPwTLS&lt;/P&gt;&lt;P&gt; service-object tcp destination eq https&lt;/P&gt;&lt;P&gt; service-object tcp destination eq imap4&lt;/P&gt;&lt;P&gt; service-object tcp destination eq pop3&lt;/P&gt;&lt;P&gt; service-object tcp destination eq smtp&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_1&lt;/P&gt;&lt;P&gt; service-object object IMAPoverSSL&lt;/P&gt;&lt;P&gt; service-object object POPoverSSL&lt;/P&gt;&lt;P&gt; service-object object SMTPwTLS&lt;/P&gt;&lt;P&gt; service-object tcp destination eq pop3&lt;/P&gt;&lt;P&gt; service-object tcp destination eq https&lt;/P&gt;&lt;P&gt; service-object tcp destination eq smtp&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_2&lt;/P&gt;&lt;P&gt; service-object object IMAPoverSSL&lt;/P&gt;&lt;P&gt; service-object object POPoverSSL&lt;/P&gt;&lt;P&gt; service-object object SMTPwTLS&lt;/P&gt;&lt;P&gt; service-object tcp destination eq https&lt;/P&gt;&lt;P&gt; service-object tcp destination eq pop3&lt;/P&gt;&lt;P&gt; service-object tcp destination eq smtp&lt;/P&gt;&lt;P&gt;object-group network obj_clerkpc&lt;/P&gt;&lt;P&gt; description Clerk's PCs&lt;/P&gt;&lt;P&gt; network-object object obj-192.168.9.119&lt;/P&gt;&lt;P&gt; network-object object obj-192.168.9.120&lt;/P&gt;&lt;P&gt; network-object object obj-192.168.9.121&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_2 any interface outside&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_1 any host 192.168.9.20&lt;/P&gt;&lt;P&gt;access-list StateNet_access_in extended permit ip object-group obj_clerkpc any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm warnings&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;mtu Wireless-Guest 1500&lt;/P&gt;&lt;P&gt;mtu StateNet 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-635.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface&lt;/P&gt;&lt;P&gt;object network obj-claggett-https&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp https https&lt;/P&gt;&lt;P&gt;object network obj-claggett-imap4&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp imap4 imap4&lt;/P&gt;&lt;P&gt;object network obj-claggett-pop3&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp pop3 pop3&lt;/P&gt;&lt;P&gt;object network obj-claggett-smtp&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp smtp smtp&lt;/P&gt;&lt;P&gt;object network obj-claggett-imapoverssl&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 993 993&lt;/P&gt;&lt;P&gt;object network obj-claggett-popoverssl&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 995 995&lt;/P&gt;&lt;P&gt;object network obj-claggett-smtpwTLS&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 465 465&lt;/P&gt;&lt;P&gt;object network obj-192.168.9.120&lt;/P&gt;&lt;P&gt; nat (inside,StateNet) static 10.63.198.12&lt;/P&gt;&lt;P&gt;object network obj-192.168.9.119&lt;/P&gt;&lt;P&gt; nat (any,StateNet) static 10.63.198.10&lt;/P&gt;&lt;P&gt;object network obj-192.168.9.121&lt;/P&gt;&lt;P&gt; nat (any,StateNet) static 10.63.198.11&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group StateNet_access_in in interface StateNet&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 xxx.xxx.xxx.xxx 1&lt;/P&gt;&lt;P&gt;route StateNet 10.0.0.0 255.0.0.0 10.63.xxx.x 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable 5443&lt;/P&gt;&lt;P&gt;http 192.168.9.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 74.94.142.225 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet 192.168.9.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd dns 8.8.8.8 8.8.4.4&lt;/P&gt;&lt;P&gt;dhcpd lease 10800&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.100-192.168.1.254 Wireless-Guest&lt;/P&gt;&lt;P&gt;dhcpd enable Wireless-Guest&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics host number-of-rate 2&lt;/P&gt;&lt;P&gt;threat-detection statistics port&lt;/P&gt;&lt;P&gt;threat-detection statistics protocol&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ntp server 63.240.161.99 source outside prefer&lt;/P&gt;&lt;P&gt;ntp server 207.171.30.106 source outside prefer&lt;/P&gt;&lt;P&gt;ntp server 70.86.250.6 source outside prefer&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DD" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DD&lt;/A&gt;&lt;/P&gt;&lt;P&gt;CEService&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:05c24559cf3efa9f924eacb8756addfe&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for any assistance.&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:05:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internal-traffic-not-allowed/m-p/1711111#M534563</guid>
      <dc:creator>brunellej</dc:creator>
      <dc:date>2019-03-11T21:05:53Z</dc:date>
    </item>
    <item>
      <title>Internal traffic not allowed</title>
      <link>https://community.cisco.com/t5/network-security/internal-traffic-not-allowed/m-p/1711112#M534564</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You don't have any nat setup for the guest wireless interface.&amp;nbsp; It'd look something like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network obj-wirelessnet&lt;/P&gt;&lt;P&gt; subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (Wireless-Guest,outside) static interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That would PAT all of the hosts on the guest network to the outside ip address.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 31 Jul 2011 01:50:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internal-traffic-not-allowed/m-p/1711112#M534564</guid>
      <dc:creator>clooney</dc:creator>
      <dc:date>2011-07-31T01:50:14Z</dc:date>
    </item>
  </channel>
</rss>

