<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA5510, same-securitiy-level vlan routing ? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5510-same-securitiy-level-vlan-routing/m-p/1716922#M537263</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That seems odd, because there is no VLAN 6 on the ASA. It's odd how&amp;nbsp; you move the inferface configuration to vlan 6 and it works by pinging&amp;nbsp; to vlan 1?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you mean you move the config as follows on the switch:&lt;/P&gt;&lt;P&gt;Initially:&lt;/P&gt;&lt;P&gt;interface vlan1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip address 192.168.6.9 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you move it to:&lt;/P&gt;&lt;P&gt;interface vlan6&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip address 192.168.6.9 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Doesn't make sense since there is no VLAN 6 on the ASA, or do you also move the ASA config to:&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.1&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;vlan 6&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; nameif vlan1&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.6.6 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does vlan 1 happen to be the native vlan on the switch?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 02 Jul 2011 11:49:43 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2011-07-02T11:49:43Z</dc:date>
    <item>
      <title>ASA5510, same-securitiy-level vlan routing ?</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-same-securitiy-level-vlan-routing/m-p/1716912#M537253</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm facing a problem with two vlans.&lt;/P&gt;&lt;P&gt;Each vlan has internet access by NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In each vlan there is at least one server, who should be accessible&lt;/P&gt;&lt;P&gt;from the other vlan and vice versa.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The function "same-security-traffic permit inter-interface" doesn't work,&lt;/P&gt;&lt;P&gt;because NAT control is in place - so an expert.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some experts told me it's not possible to route back out the same interface, &lt;/P&gt;&lt;P&gt;and also not route back out the seperate subinterfaces as well.&lt;/P&gt;&lt;P&gt;So what's true ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible, to get access from both vlan, to the servers in both vlan ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And if yes, please can somebody give me an hint to a working solution ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BR, Harry&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:51:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-same-securitiy-level-vlan-routing/m-p/1716912#M537253</guid>
      <dc:creator>spydertec_2</dc:creator>
      <dc:date>2019-03-11T20:51:01Z</dc:date>
    </item>
    <item>
      <title>ASA5510, same-securitiy-level vlan routing ?</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-same-securitiy-level-vlan-routing/m-p/1716913#M537254</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sure can, you just have to configure static NAT for each of the VLAN:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here we go:&lt;/P&gt;&lt;P&gt;static (vlan1,vlan2) 192.168.6.0 192.168.6.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (vlan1,vlan4) 192.168.6.0 192.168.6.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (vlan1,vlan10) 192.168.6.0 192.168.6.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (vlan1,vlan11) 192.168.6.0 192.168.6.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (vlan2,vlan4) 192.168.2.0 192.168.2.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (vlan2,vlan10) 192.168.2.0 192.168.2.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (vlan2,vlan11) 192.168.2.0 192.168.2.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (vlan10,vlan11) 192.168.10.0 192.168.10.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above static commands are bi-directional, so you don't have to configure the static for the other way round.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just have to make sure that the access-list applied to each interface allows access.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Jun 2011 01:17:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-same-securitiy-level-vlan-routing/m-p/1716913#M537254</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-06-27T01:17:26Z</dc:date>
    </item>
    <item>
      <title>ASA5510, same-securitiy-level vlan routing ?</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-same-securitiy-level-vlan-routing/m-p/1716914#M537255</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Jennifer,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for your quick answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I apply those static NAT commands by ASDM, I get the following error for each of them:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ERROR: mapped-address conflict with existing static&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I did by also by CLI - with no error &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And here the ACL for vlan 1 and vlan 11:&lt;/P&gt;&lt;P&gt;access-list vlan1_access_in_1 extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list vlan11_access_in_1 extended permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group vlan1_access_in_1 in interface vlan1&lt;/P&gt;&lt;P&gt;access-group vlan11_access_in_1 in interface vlan11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I alos allowed icmp to all vlans - but nothing happened - what did i wrong ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BR&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Jun 2011 23:11:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-same-securitiy-level-vlan-routing/m-p/1716914#M537255</guid>
      <dc:creator>spydertec_2</dc:creator>
      <dc:date>2011-06-27T23:11:30Z</dc:date>
    </item>
    <item>
      <title>ASA5510, same-securitiy-level vlan routing ?</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-same-securitiy-level-vlan-routing/m-p/1716915#M537256</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you also please share the latest running conifg, and advise where you are trying to ping from and to?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please also ensure that the host doesn't have Windows firewall, or any other host firewall that might be blocking inbound access.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Jun 2011 23:18:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-same-securitiy-level-vlan-routing/m-p/1716915#M537256</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-06-27T23:18:29Z</dc:date>
    </item>
    <item>
      <title>ASA5510, same-securitiy-level vlan routing ?</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-same-securitiy-level-vlan-routing/m-p/1716916#M537257</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm trying to ping from vlan11 (192.168.1.2) tp vlan1 (192.168.6.1)&lt;/P&gt;&lt;P&gt;The firewalls on the access hosts are off.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;esult of the command: "sh run"&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(2) &lt;BR /&gt;!&lt;BR /&gt;hostname ASAHY&lt;BR /&gt;enable password &lt;REMOVED&gt; encrypted&lt;BR /&gt;passwd &lt;REMOVED&gt; encrypted &lt;REMOVED&gt;&lt;BR /&gt;names&lt;BR /&gt;name 192.168.6.1 SRV1&lt;BR /&gt;name 192.168.1.2 SRV2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; speed 100&lt;BR /&gt; duplex full&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; pppoe client vpdn group ISP&lt;BR /&gt; ip address &lt;REMOVED&gt; 255.255.255.255 pppoe &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1.1&lt;BR /&gt; vlan 1&lt;BR /&gt; nameif vlan1&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.6.6 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1.2&lt;BR /&gt; vlan 2&lt;BR /&gt; nameif vlan2&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.2.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1.4&lt;BR /&gt; vlan 4&lt;BR /&gt; nameif vlan4&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.4.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1.10&lt;BR /&gt; vlan 10&lt;BR /&gt; nameif vlan10&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.10.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1.11&lt;BR /&gt; vlan 11&lt;BR /&gt; nameif vlan11&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.254 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif Management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 172.16.3.1 255.255.255.0 &lt;BR /&gt; management-only&lt;BR /&gt;!&lt;/REMOVED&gt;&lt;/REMOVED&gt;&lt;/REMOVED&gt;&lt;/REMOVED&gt;&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;BR /&gt;clock timezone CEST 1&lt;BR /&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group service NATvlan10&lt;BR /&gt; service-object tcp eq www &lt;BR /&gt; service-object tcp eq https &lt;BR /&gt; service-object udp eq domain &lt;BR /&gt; service-object tcp eq pop3 &lt;BR /&gt; service-object tcp eq smtp &lt;BR /&gt; service-object udp eq 21 &lt;BR /&gt; service-object udp eq 20 &lt;BR /&gt; service-object tcp eq ftp &lt;BR /&gt; service-object tcp eq ftp-data &lt;BR /&gt; service-object icmp echo-reply&lt;BR /&gt; service-object icmp source-quench&lt;BR /&gt; service-object icmp unreachable&lt;BR /&gt; service-object icmp time-exceeded&lt;BR /&gt;object-group service NATvlan11&lt;BR /&gt; service-object tcp eq www &lt;BR /&gt; service-object tcp eq https &lt;BR /&gt; service-object udp eq domain &lt;BR /&gt; service-object tcp eq pop3 &lt;BR /&gt; service-object tcp eq smtp &lt;BR /&gt; service-object udp eq 21 &lt;BR /&gt; service-object udp eq 20 &lt;BR /&gt; service-object tcp eq ftp &lt;BR /&gt; service-object tcp eq ftp-data &lt;BR /&gt; service-object icmp echo-reply&lt;BR /&gt; service-object icmp source-quench&lt;BR /&gt; service-object icmp unreachable&lt;BR /&gt; service-object icmp time-exceeded&lt;BR /&gt;object-group service NATvlan2&lt;BR /&gt; service-object tcp eq www &lt;BR /&gt; service-object tcp eq https &lt;BR /&gt; service-object udp eq domain &lt;BR /&gt; service-object tcp eq pop3 &lt;BR /&gt; service-object tcp eq smtp &lt;BR /&gt; service-object udp eq 21 &lt;BR /&gt; service-object udp eq 20 &lt;BR /&gt; service-object tcp eq ftp &lt;BR /&gt; service-object tcp eq ftp-data &lt;BR /&gt; service-object icmp echo-reply&lt;BR /&gt; service-object icmp source-quench&lt;BR /&gt; service-object icmp unreachable&lt;BR /&gt; service-object icmp time-exceeded&lt;BR /&gt;object-group service NATvlan4&lt;BR /&gt; service-object tcp eq www &lt;BR /&gt; service-object tcp eq https &lt;BR /&gt; service-object udp eq domain &lt;BR /&gt; service-object tcp eq pop3 &lt;BR /&gt; service-object tcp eq smtp &lt;BR /&gt; service-object udp eq 21 &lt;BR /&gt; service-object udp eq 20 &lt;BR /&gt; service-object tcp eq ftp &lt;BR /&gt; service-object tcp eq ftp-data &lt;BR /&gt; service-object icmp echo-reply&lt;BR /&gt; service-object icmp source-quench&lt;BR /&gt; service-object icmp unreachable&lt;BR /&gt; service-object icmp time-exceeded&lt;BR /&gt;object-group service NATvlan1&lt;BR /&gt; service-object tcp eq www &lt;BR /&gt; service-object tcp eq https &lt;BR /&gt; service-object udp eq domain &lt;BR /&gt; service-object udp eq 21 &lt;BR /&gt; service-object udp eq 20 &lt;BR /&gt; service-object tcp eq ftp &lt;BR /&gt; service-object tcp eq ftp-data &lt;BR /&gt; service-object icmp echo-reply&lt;BR /&gt; service-object icmp source-quench&lt;BR /&gt; service-object icmp unreachable&lt;BR /&gt; service-object icmp time-exceeded&lt;BR /&gt;object-group network DataWebShop&lt;BR /&gt; description Direct to Access&lt;BR /&gt; network-object Data1 255.255.255.0&lt;BR /&gt; network-object host Data3&lt;BR /&gt; network-object host Data2&lt;BR /&gt;access-list insidevlan10 extended permit object-group NATvlan10 192.168.10.0 255.255.255.0 any &lt;BR /&gt;access-list insidevlan11 extended permit object-group NATvlan11 192.168.1.0 255.255.255.0 any &lt;BR /&gt;access-list insidevlan2 extended permit object-group NATvlan2 192.168.2.0 255.255.255.0 any &lt;BR /&gt;access-list insidevlan4 extended permit object-group NATvlan4 192.168.4.0 255.255.255.0 any &lt;BR /&gt;access-list insideACL6 extended permit object-group NATvlan1 192.168.6.0 255.255.255.0 any &lt;BR /&gt;access-list insideACL6 extended permit ip 192.168.6.0 255.255.255.0 192.168.110.0 255.255.255.0 &lt;BR /&gt;access-list insideACL6 extended permit udp 192.168.6.0 255.255.255.0 object-group DataWebShop eq 443 &lt;BR /&gt;access-list 100 extended permit ip 192.168.6.0 255.255.255.0 192.168.110.0 255.255.255.0 &lt;BR /&gt;access-list TrafficEnc extended permit ip 192.168.6.0 255.255.255.0 192.168.110.0 255.255.255.0 &lt;BR /&gt;access-list servicesACL extended permit tcp any host &lt;REMOVED&gt; eq 3390 &lt;BR /&gt;access-list servicesACL extended permit udp object-group DataWebShop host SRV1 eq 443 &lt;BR /&gt;access-list NATvlan2 extended permit ip 192.168.2.0 255.255.255.0 any &lt;BR /&gt;access-list NATvlan4 extended permit ip 192.168.4.0 255.255.255.0 any &lt;BR /&gt;access-list NATvlan10 extended permit ip 192.168.10.0 255.255.255.0 any &lt;BR /&gt;access-list NATvlan11 extended permit ip 192.168.1.0 255.255.255.0 any &lt;BR /&gt;access-list NATvlan1 extended permit ip 192.168.6.0 255.255.255.0 any &lt;BR /&gt;access-list vlan1_access_in_1 extended permit ip any any &lt;BR /&gt;access-list vlan11_access_in_1 extended permit ip any any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu vlan1 1500&lt;BR /&gt;mtu vlan11 1500&lt;BR /&gt;mtu vlan2 1500&lt;BR /&gt;mtu vlan4 1500&lt;BR /&gt;mtu vlan10 1500&lt;BR /&gt;mtu Management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat-control&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (outside) 1 192.168.110.0 255.255.255.0&lt;BR /&gt;nat (vlan1) 0 access-list 100&lt;BR /&gt;nat (vlan1) 1 access-list NATvlan1&lt;BR /&gt;nat (vlan11) 1 access-list NATvlan11&lt;BR /&gt;nat (vlan2) 1 access-list NATvlan2&lt;BR /&gt;nat (vlan4) 1 access-list NATvlan4&lt;BR /&gt;nat (vlan10) 1 access-list NATvlan10&lt;BR /&gt;static (vlan11,outside) tcp interface 3390 Druesberg 3389 netmask 255.255.255.255 &lt;BR /&gt;static (vlan1,outside) tcp interface ftp-data SRV1 ftp-data netmask 255.255.255.255 &lt;BR /&gt;static (vlan1,outside) udp interface 443 SRV1 443 netmask 255.255.255.255 &lt;BR /&gt;static (vlan1,vlan2) 192.168.6.0 192.168.6.0 netmask 255.255.255.0 &lt;BR /&gt;static (vlan1,vlan4) 192.168.6.0 192.168.6.0 netmask 255.255.255.0 &lt;BR /&gt;static (vlan1,vlan10) 192.168.6.0 192.168.6.0 netmask 255.255.255.0 &lt;BR /&gt;static (vlan1,vlan11) 192.168.6.0 192.168.6.0 netmask 255.255.255.0 &lt;BR /&gt;static (vlan2,vlan4) 192.168.2.0 192.168.2.0 netmask 255.255.255.0 &lt;BR /&gt;static (vlan2,vlan10) 192.168.2.0 192.168.2.0 netmask 255.255.255.0 &lt;BR /&gt;static (vlan2,vlan11) 192.168.2.0 192.168.2.0 netmask 255.255.255.0 &lt;BR /&gt;static (vlan10,vlan11) 192.168.10.0 192.168.10.0 netmask 255.255.255.0 &lt;BR /&gt;access-group servicesACL in interface outside&lt;BR /&gt;access-group vlan1_access_in_1 in interface vlan1&lt;BR /&gt;access-group vlan11_access_in_1 in interface vlan11&lt;BR /&gt;access-group insidevlan2 in interface vlan2&lt;BR /&gt;access-group insidevlan4 in interface vlan4&lt;BR /&gt;access-group insidevlan10 in interface vlan10&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 &lt;REMOVED&gt; 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication enable console LOCAL &lt;BR /&gt;aaa authentication http console LOCAL &lt;BR /&gt;aaa authentication serial console LOCAL &lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;aaa authentication telnet console LOCAL &lt;BR /&gt;aaa authorization command LOCAL &lt;BR /&gt;aaa local authentication attempts max-fail 3&lt;BR /&gt;http server enable&lt;BR /&gt;http 172.16.3.0 255.255.255.0 Management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set myset esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map newmap 10 match address TrafficEnc&lt;BR /&gt;crypto map newmap 10 set peer &lt;REMOVED&gt; &lt;BR /&gt;crypto map newmap 10 set transform-set myset&lt;BR /&gt;crypto map newmap 10 set nat-t-disable&lt;BR /&gt;crypto map newmap interface outside&lt;BR /&gt;crypto isakmp identity address &lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption des&lt;BR /&gt; hash md5&lt;BR /&gt; group 1&lt;BR /&gt; lifetime 28800&lt;BR /&gt;crypto isakmp policy 65535&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 1&lt;BR /&gt; lifetime 28800&lt;BR /&gt;telnet 192.168.6.0 255.255.255.0 vlan1&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh &lt;REMOVED&gt; 255.255.255.255 outside&lt;BR /&gt;ssh &lt;REMOVED&gt; 255.255.255.255 outside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;vpdn group ISP request dialout pppoe&lt;BR /&gt;vpdn group ISP localname &lt;REMOVED&gt;&lt;BR /&gt;vpdn group ISP ppp authentication chap&lt;BR /&gt;vpdn username &lt;REMOVED&gt; password &lt;REMOVED&gt; store-local&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 212.90.197.226 source outside prefer&lt;BR /&gt;webvpn&lt;BR /&gt;username &lt;REMOVED&gt; password &lt;REMOVED&gt; encrypted privilege 15&lt;BR /&gt;tunnel-group &lt;REMOVED&gt; type ipsec-l2l&lt;BR /&gt;tunnel-group &lt;REMOVED&gt; ipsec-attributes&lt;BR /&gt; pre-shared-key &lt;REMOVED&gt;&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;call-home&lt;BR /&gt; profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email &lt;A href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:&lt;REMOVED&gt;&lt;BR /&gt;: end&lt;/REMOVED&gt;&lt;/REMOVED&gt;&lt;/REMOVED&gt;&lt;/REMOVED&gt;&lt;/REMOVED&gt;&lt;/REMOVED&gt;&lt;/REMOVED&gt;&lt;/REMOVED&gt;&lt;/REMOVED&gt;&lt;/REMOVED&gt;&lt;/REMOVED&gt;&lt;/REMOVED&gt;&lt;/REMOVED&gt;&lt;/REMOVED&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Jun 2011 05:52:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-same-securitiy-level-vlan-routing/m-p/1716916#M537257</guid>
      <dc:creator>spydertec_2</dc:creator>
      <dc:date>2011-06-28T05:52:24Z</dc:date>
    </item>
    <item>
      <title>ASA5510, same-securitiy-level vlan routing ?</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-same-securitiy-level-vlan-routing/m-p/1716917#M537258</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, that should be allowed as per the configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, just confirming that those hosts only have 1 NIC, and its default gateway is set to its corresponding ASA interfaces?&lt;/P&gt;&lt;P&gt;ie: for host 192.168.1.2, subnet mask is 255.255.255.0 and the default gateway is 192.168.1.254?&lt;/P&gt;&lt;P&gt;for host 192.168.6.1, subnet mask is 255.255.255.0 and default gateway is 192.168.6.6?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please try from other hosts?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Jun 2011 08:56:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-same-securitiy-level-vlan-routing/m-p/1716917#M537258</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-06-28T08:56:56Z</dc:date>
    </item>
    <item>
      <title>ASA5510, same-securitiy-level vlan routing ?</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-same-securitiy-level-vlan-routing/m-p/1716918#M537259</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jennifer,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for your quick answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There must be something wrong with those static NAT statements, because after I've typed in those, I can't access the&lt;/P&gt;&lt;P&gt;Internet anymore - on all Vlans.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't see the reason - do you have an idea for this behavior ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Jun 2011 16:06:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-same-securitiy-level-vlan-routing/m-p/1716918#M537259</guid>
      <dc:creator>spydertec_2</dc:creator>
      <dc:date>2011-06-28T16:06:46Z</dc:date>
    </item>
    <item>
      <title>ASA5510, same-securitiy-level vlan routing ?</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-same-securitiy-level-vlan-routing/m-p/1716919#M537260</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jennifer,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;as I've tested configuration I realized that I can't ping vlan 1 (192.168.6.6) from the L3-switch attached to the ASA.&lt;/P&gt;&lt;P&gt;As I moved the Config to vlan 6 -it worked again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The main issue, the routing still doesn't work. &lt;/P&gt;&lt;P&gt;I can't access resources on other vlans.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please can you have a look again ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Harry&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jun 2011 21:10:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-same-securitiy-level-vlan-routing/m-p/1716919#M537260</guid>
      <dc:creator>spydertec_2</dc:creator>
      <dc:date>2011-06-29T21:10:49Z</dc:date>
    </item>
    <item>
      <title>ASA5510, same-securitiy-level vlan routing ?</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-same-securitiy-level-vlan-routing/m-p/1716920#M537261</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What is the L3 switch that is attached to the ASA has as its ip address? Does it have any interface vlan ip address?&lt;/P&gt;&lt;P&gt;What vlan and what ip address of the L3 switch are you trying to ping the ASA from?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do you mean by you moved the config to vlan 6? what do you move and where?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration looks correct. All NATing has been completed that allows the communicate between VLANs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please try communication between all VLANs and advise which works and which doesn't? You can't ping the ASA interfaces from the opposite interfaces, so that test will always fail if you are testing that.&lt;/P&gt;&lt;P&gt;Eg: you can't ping from host in VLAN 1 towards ASA VLAN 6 interface.&lt;/P&gt;&lt;P&gt;You can only ping from host in VLAN 1 towards ASA VLAN 1 interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you test to ping, please test from host to host, not pinging any ASA interfaces. Please also try to application apart from ping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At this point, the config looks ok, but you might need to troubleshoot hop by hop where it's failing because it doesn't seem to be a config issue at this stage.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jun 2011 08:01:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-same-securitiy-level-vlan-routing/m-p/1716920#M537261</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-06-30T08:01:14Z</dc:date>
    </item>
    <item>
      <title>ASA5510, same-securitiy-level vlan routing ?</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-same-securitiy-level-vlan-routing/m-p/1716921#M537262</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Jennifer,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks again for answering.&lt;/P&gt;&lt;P&gt;Your explanations lights up the things !&lt;/P&gt;&lt;P&gt;****&lt;/P&gt;&lt;P&gt;Just a few explanations to my statements above:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At eth0 of the ASA there is a L3-switch on Gig 0/1 directly connected. &lt;/P&gt;&lt;P&gt;The Gig 0/1 is in trunking mode. Vlan 1 has the IP 192.168.6.9&lt;/P&gt;&lt;P&gt;Every Access devices (th two servers) are in a vlan on this switch or behind this switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At the L3 - switch I've a VTP domain behind, for which the L3 - switch is accting as a VTP server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From this L3 - switch (console) I was trying to ping the vlan 1 of ASA and this didn't worked.&lt;/P&gt;&lt;P&gt;So I took the decision to test the behavior by moving the interface config and the attached rules of the ASA to vlan 6. &lt;/P&gt;&lt;P&gt;After this step I was able to ping from 192.168.6.9 (Vlan 1&amp;nbsp; L3 - switch) to the vlan&amp;nbsp; of the ASA.&lt;/P&gt;&lt;P&gt;At this point i still don't understand why it doeasn't work with vlan 1&lt;/P&gt;&lt;P&gt;****&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway, I'll try to ping and share/mount folders from other vlans.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll come back.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks by your clarifying explanations&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jun 2011 22:11:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-same-securitiy-level-vlan-routing/m-p/1716921#M537262</guid>
      <dc:creator>spydertec_2</dc:creator>
      <dc:date>2011-06-30T22:11:14Z</dc:date>
    </item>
    <item>
      <title>ASA5510, same-securitiy-level vlan routing ?</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-same-securitiy-level-vlan-routing/m-p/1716922#M537263</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That seems odd, because there is no VLAN 6 on the ASA. It's odd how&amp;nbsp; you move the inferface configuration to vlan 6 and it works by pinging&amp;nbsp; to vlan 1?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you mean you move the config as follows on the switch:&lt;/P&gt;&lt;P&gt;Initially:&lt;/P&gt;&lt;P&gt;interface vlan1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip address 192.168.6.9 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you move it to:&lt;/P&gt;&lt;P&gt;interface vlan6&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip address 192.168.6.9 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Doesn't make sense since there is no VLAN 6 on the ASA, or do you also move the ASA config to:&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.1&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;vlan 6&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; nameif vlan1&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.6.6 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does vlan 1 happen to be the native vlan on the switch?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Jul 2011 11:49:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-same-securitiy-level-vlan-routing/m-p/1716922#M537263</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-07-02T11:49:43Z</dc:date>
    </item>
    <item>
      <title>ASA5510, same-securitiy-level vlan routing ?</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-same-securitiy-level-vlan-routing/m-p/1716923#M537264</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm sorry for the confusions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have created a Vlan 6 on the ASA and also on the Switch.&lt;/P&gt;&lt;P&gt;The Vlan 1 now is the native Vlan.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;actualy it looks like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.11&lt;/P&gt;&lt;P&gt; vlan 11&lt;/P&gt;&lt;P&gt; nameif vlan11&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.254 255.255.255.0&lt;/P&gt;&lt;P&gt; no shut&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.2&lt;/P&gt;&lt;P&gt; vlan 2&lt;/P&gt;&lt;P&gt; nameif vlan2&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt; no shut&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.4&lt;/P&gt;&lt;P&gt; vlan 4&lt;/P&gt;&lt;P&gt; nameif vlan4&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.4.1 255.255.255.0&lt;/P&gt;&lt;P&gt; no shut&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.6&lt;/P&gt;&lt;P&gt; vlan 6&lt;/P&gt;&lt;P&gt; nameif vlan6&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.6.6 255.255.255.0&lt;/P&gt;&lt;P&gt; no shut&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.10&lt;/P&gt;&lt;P&gt; vlan 10&lt;/P&gt;&lt;P&gt; nameif vlan10&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt; no shut&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;with this config in place, I'm now able to ping from the switch 6.9 to the ASA on 6.6 and vice versa.&lt;/P&gt;&lt;P&gt;Before when the same config was on vlan 1, I couldn't ping like this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That sounds odd to me too.&lt;/P&gt;&lt;P&gt;As you said above it should work with the access-list - at least to ping between the two&lt;/P&gt;&lt;P&gt;hosts on vlan 6 and 11:&lt;/P&gt;&lt;P&gt;access-list vlan1_access_in_1 extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list vlan11_access_in_1 extended permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group vlan1_access_in_1 in interface vlan1&lt;/P&gt;&lt;P&gt;access-group vlan11_access_in_1 in interface vlan11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm thinking about to upgrade the current IOS to 8.4X ... and to create the config on a new base.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you see any mistake in the config above ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Jul 2011 12:38:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-same-securitiy-level-vlan-routing/m-p/1716923#M537264</guid>
      <dc:creator>spydertec_2</dc:creator>
      <dc:date>2011-07-02T12:38:54Z</dc:date>
    </item>
    <item>
      <title>ASA5510, same-securitiy-level vlan routing ?</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-same-securitiy-level-vlan-routing/m-p/1716924#M537265</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, the config looks absolutely fine to me.&lt;/P&gt;&lt;P&gt;I would upgrade to the latest version of 8.2.x.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just FYI, version 8.3 and above has new changes to NAT, so it's completely different to version 8.2 or below. You might want to take a look at those NAT section first prior to upgrading to 8.4.x.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Jul 2011 03:23:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-same-securitiy-level-vlan-routing/m-p/1716924#M537265</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-07-03T03:23:40Z</dc:date>
    </item>
  </channel>
</rss>

