<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX 506e + 2950 VLAN trunking confusion in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-506e-2950-vlan-trunking-confusion/m-p/1591526#M564628</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV&gt;&lt;P&gt;I followed this post on experts-exchange and now have connectivity to both PIX interfaces (outside, 192.168.2.2, dmz, 192.168.3.2). However, the server still cannot ping 192.168.3.1 and 192.168.3.2, and nothing anywhere else can ping the server 192.168.3.3. Now do I need to implement the ACLs or is something strange still going on with the configuration? Port 2 on the switch, which is connected to the inside interface on the PIX, is configured to trunk to VLANs 1 - 3. Port 3 on the switch, which is connected to the server, is set to be in VLAN 3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="searchTerm"&gt;Pix&lt;/SPAN&gt; &lt;SPAN class="searchTerm"&gt;506e&lt;/SPAN&gt; will support up to 2 &lt;SPAN class="searchTerm"&gt;vlans&lt;/SPAN&gt; with 6.3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 1 Assign the interface speed to a physical interface by entering the following command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 2 Assign VLAN2 to the physical interface (ethernet0) by entering the following command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface ethernet0 vlan2 physical&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By assigning a &lt;SPAN class="searchTerm"&gt;VLAN&lt;/SPAN&gt; to the physical interface, you ensure that all frames forwarded on the interface will be tagged. &lt;SPAN class="searchTerm"&gt;VLAN&lt;/SPAN&gt; 1 is not used because that is the default native &lt;SPAN class="searchTerm"&gt;VLAN&lt;/SPAN&gt; for Cisco switches. Without the physical parameter, the default for the interface command is to create a logical interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 3 Create a new logical interface (VLAN3) and tie it to the physical interface (ethernet0) by entering the following command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface ethernet0 vlan3 logical&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will allow the &lt;SPAN class="searchTerm"&gt;PIX&lt;/SPAN&gt; Firewall to send and receive &lt;SPAN class="searchTerm"&gt;VLAN&lt;/SPAN&gt;-tagged packets with a &lt;SPAN class="searchTerm"&gt;VLAN&lt;/SPAN&gt; identifier equal to 3 on the physical interface, ethernet0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 4 Configure the logical and physical interfaces by entering the following commands:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif vlan3 dmz security50&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ipaddress outside 192.168.101.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ipaddress dmz 192.168.103.1 255.255.255.0&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 06 Mar 2011 00:50:41 GMT</pubDate>
    <dc:creator>josephnunham</dc:creator>
    <dc:date>2011-03-06T00:50:41Z</dc:date>
    <item>
      <title>PIX 506e + 2950 VLAN trunking confusion</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-2950-vlan-trunking-confusion/m-p/1591515#M564599</link>
      <description>&lt;DIV&gt;&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this is an easy one for all. I have a router on a stick setup going on and I would like to put a firewall into the picture. I have two VLANs - VLAN 2 and VLAN 3. VLAN 2 is in the 192.168.2.x network and trunks back to the router at 192.168.1.254. Before I had the firewall in place, whatever was on VLAN 2 could ping 192.168.1.254 and all worked fine and well. Now that I have put the firewall into the picture, I have lost connectivity (and my mind &lt;SPAN __jive_emoticon_name="silly" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/silly.gif"&gt;&lt;/SPAN&gt;). The trunk sits at 192.168.2.1 and I put 192.168.2.2 (outside interface on the PIX) into VLAN 2. From the 192.168.1.x network, I can ping the trunk and the outside interface on the PIX:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pinging 192.168.2.2 with 32 bytes of data:&lt;/P&gt;&lt;P&gt;Reply from 192.168.2.2: bytes=32 time=1ms TTL=254&lt;/P&gt;&lt;P&gt;Reply from 192.168.2.2: bytes=32 time=1ms TTL=254&lt;/P&gt;&lt;P&gt;Reply from 192.168.2.2: bytes=32 time=1ms TTL=254&lt;/P&gt;&lt;P&gt;Reply from 192.168.2.2: bytes=32 time=1ms TTL=254&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ping statistics for 192.168.2.2:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),&lt;/P&gt;&lt;P&gt;Approximate round trip times in milli-seconds:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Minimum = 1ms, Maximum = 1ms, Average = 1ms&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;I put the inside interface on the PIX into VLAN 3 at 192.168.3.1. I can ping the trunk:&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Pinging 192.168.3.1 with 32 bytes of data:&lt;/DIV&gt;&lt;DIV&gt;Reply from 192.168.3.1: bytes=32 time=1ms TTL=64&lt;/DIV&gt;&lt;DIV&gt;Reply from 192.168.3.1: bytes=32 time&amp;lt;1ms TTL=64&lt;/DIV&gt;&lt;DIV&gt;Reply from 192.168.3.1: bytes=32 time&amp;lt;1ms TTL=64&lt;/DIV&gt;&lt;DIV&gt;Reply from 192.168.3.1: bytes=32 time&amp;lt;1ms TTL=64&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Ping statistics for 192.168.3.1:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),&lt;/DIV&gt;&lt;DIV&gt;Approximate round trip times in milli-seconds:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Minimum = 0ms, Maximum = 1ms, Average = 0ms&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;But I cannot ping the inside interface of the PIX or the server (inside sits at 192.168.3.2 and server sits at 192.168.3.3):&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV&gt;ping 192.168.3.2&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Pinging 192.168.3.2 with 32 bytes of data:&lt;/DIV&gt;&lt;DIV&gt;Reply from 192.168.1.254: Destination host unreachable.&lt;/DIV&gt;&lt;DIV&gt;Reply from 192.168.1.254: Destination host unreachable.&lt;/DIV&gt;&lt;DIV&gt;Reply from 192.168.1.254: Destination host unreachable.&lt;/DIV&gt;&lt;DIV&gt;Reply from 192.168.1.254: Destination host unreachable.&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Ping statistics for 192.168.3.2:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;ping 192.168.3.3&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Pinging 192.168.3.3 with 32 bytes of data:&lt;/DIV&gt;&lt;DIV&gt;Reply from 192.168.1.254: Destination host unreachable.&lt;/DIV&gt;&lt;DIV&gt;Reply from 192.168.1.254: Destination host unreachable.&lt;/DIV&gt;&lt;DIV&gt;Reply from 192.168.1.254: Destination host unreachable.&lt;/DIV&gt;&lt;DIV&gt;Reply from 192.168.1.254: Destination host unreachable.&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Ping statistics for 192.168.3.3:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Some firewall configuration:&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;show running config&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;PIX Version 6.3(1)&lt;BR /&gt;interface ethernet0 auto&lt;BR /&gt;interface ethernet0 vlan2 physical&lt;BR /&gt;interface ethernet1 auto&lt;BR /&gt;interface ethernet1 vlan3 physical&lt;BR /&gt;nameif ethernet0 outside security0&lt;BR /&gt;nameif ethernet1 inside security100&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;sh int&lt;BR /&gt;interface ethernet0 "outside" is up, line protocol is up&lt;BR /&gt;&amp;nbsp; Hardware is i82559 ethernet, address is 000e.38a9.1cfd&lt;BR /&gt;&amp;nbsp; IP address 192.168.2.2, subnet mask 255.255.255.0&lt;BR /&gt;&amp;nbsp; MTU 1500 bytes, BW 100000 Kbit full duplex&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7192 packets input, 554252 bytes, 0 no buffer&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Received 7172 broadcasts, 0 runts, 0 giants&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 31 packets output, 2292 bytes, 0 underruns&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 output errors, 0 collisions, 0 interface resets&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 babbles, 0 late collisions, 0 deferred&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 lost carrier, 0 no carrier&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input queue (curr/max blocks): hardware (128/128) software (0/1)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; output queue (curr/max blocks): hardware (0/1) software (0/1)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 39 aggregate VLAN packets input, 2646 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 25 aggregate VLAN packets output, 1918 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 39 vlan2 packets input, 2646 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 26 vlan2 packets output, 1960 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7057 invalid VLAN ID errors, 0 native VLAN errors&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;interface ethernet1 "inside" is up, line protocol is up&lt;BR /&gt;&amp;nbsp; Hardware is i82559 ethernet, address is 000e.38a9.1cfe&lt;BR /&gt;&amp;nbsp; IP address 192.168.3.2, subnet mask 255.255.255.0&lt;BR /&gt;&amp;nbsp; MTU 1500 bytes, BW 100000 Kbit full duplex&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 68 packets input, 5448 bytes, 0 no buffer&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Received 20 broadcasts, 0 runts, 0 giants&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 51 packets output, 3378 bytes, 0 underruns&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 output errors, 0 collisions, 0 interface resets&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 babbles, 0 late collisions, 0 deferred&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 lost carrier, 0 no carrier&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input queue (curr/max blocks): hardware (128/128) software (0/1)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; output queue (curr/max blocks): hardware (0/1) software (0/1)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 62 aggregate VLAN packets input, 5064 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 42 aggregate VLAN packets output, 2404 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 62 vlan3 packets input, 5064 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 43 vlan3 packets output, 2446 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6 invalid VLAN ID errors, 0 native VLAN errors&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;And some switch configuration:&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Port&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Mode&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Encapsulation&amp;nbsp; Status&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Native vlan&lt;BR /&gt;Fa0/2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; on&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1q&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; trunking&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;And a network diagram. Someone told me it is a trunking issue; you be the judge. I have tried everything I know how to do and have had no luck. Thanks for the help.&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:59:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-2950-vlan-trunking-confusion/m-p/1591515#M564599</guid>
      <dc:creator>josephnunham</dc:creator>
      <dc:date>2019-03-11T19:59:54Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 506e + 2950 VLAN trunking confusion</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-2950-vlan-trunking-confusion/m-p/1591516#M564600</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the ping that fails is sourced from which IP? If the traffic comes from outside to inside remember you need to allow the traffic using ACLs and the proper NAT statement such as an static translation.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Mar 2011 02:12:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-2950-vlan-trunking-confusion/m-p/1591516#M564600</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-03-03T02:12:30Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 506e + 2950 VLAN trunking confusion</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-2950-vlan-trunking-confusion/m-p/1591517#M564603</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Paul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the response. The ping that fails comes from any host that is on the 192.168.1.x network. I believed that ACLs and NAT were the issue, but since I am no expert in firewalling, I did not want to question the person helping me. Could you show me an example of the ACLs and NAT statements? Something along the lines of ICMP permit etc?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Mar 2011 02:21:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-2950-vlan-trunking-confusion/m-p/1591517#M564603</guid>
      <dc:creator>josephnunham</dc:creator>
      <dc:date>2011-03-03T02:21:35Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 506e + 2950 VLAN trunking confusion</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-2950-vlan-trunking-confusion/m-p/1591518#M564607</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Since the ping comes from the outside you will need the ACL and NAT statements. Assuming that routing is fine you could use the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.3.0 192.168.3.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in permit icmp any 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-group outside_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The default gateway of the server on the inside should point to the IP of the inside interface of the PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By the way, you can't ping the inside interface IP if you are on the outside and you can't ping the outside interface IP if you are on the inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try also to ping from the server on the inside to the IP address of the trunk on the outside. The switch should know how to reach the 192.168.3.0&amp;nbsp; network.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Mar 2011 02:32:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-2950-vlan-trunking-confusion/m-p/1591518#M564607</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-03-03T02:32:48Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 506e + 2950 VLAN trunking confusion</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-2950-vlan-trunking-confusion/m-p/1591519#M564609</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The server cannot ping the trunk at 192.168.2.1 and it also cannot ping 192.168.3.1. All it can ping is 192.168.3.2 (PIX inside interface address) and 192.168.3.3 (itself).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Mar 2011 02:43:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-2950-vlan-trunking-confusion/m-p/1591519#M564609</guid>
      <dc:creator>josephnunham</dc:creator>
      <dc:date>2011-03-03T02:43:38Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 506e + 2950 VLAN trunking confusion</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-2950-vlan-trunking-confusion/m-p/1591520#M564612</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;can you add your config please? I need to understand better your scenario.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Mar 2011 03:03:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-2950-vlan-trunking-confusion/m-p/1591520#M564612</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-03-03T03:03:07Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 506e + 2950 VLAN trunking confusion</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-2950-vlan-trunking-confusion/m-p/1591521#M564615</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sure. Do you need the config from the firewall and the switch? The router is just a WRT54G running DD-WRT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Mar 2011 03:25:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-2950-vlan-trunking-confusion/m-p/1591521#M564615</guid>
      <dc:creator>josephnunham</dc:creator>
      <dc:date>2011-03-03T03:25:49Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 506e + 2950 VLAN trunking confusion</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-2950-vlan-trunking-confusion/m-p/1591522#M564616</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;firewall and switch will be fine.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Mar 2011 03:54:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-2950-vlan-trunking-confusion/m-p/1591522#M564616</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-03-03T03:54:22Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 506e + 2950 VLAN trunking confusion</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-2950-vlan-trunking-confusion/m-p/1591523#M564619</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall running config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; show running config&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 6.3(1)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet0 vlan2 physical&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 vlan3 physical&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol ils 389&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 192.168.2.2 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address inside 192.168.3.2 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;route outside 192.168.1.0 255.255.255.0 192.168.2.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch running config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#sh running-config&lt;/P&gt;&lt;P&gt;Building configuration...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current configuration : 2182 bytes&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;version 12.1&lt;/P&gt;&lt;P&gt;no service pad&lt;/P&gt;&lt;P&gt;service timestamps debug uptime&lt;/P&gt;&lt;P&gt;service timestamps log uptime&lt;/P&gt;&lt;P&gt;service password-encryption&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip subnet-zero&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;spanning-tree mode pvst&lt;/P&gt;&lt;P&gt;no spanning-tree optimize bpdu transmission&lt;/P&gt;&lt;P&gt;spanning-tree extend system-id&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/1&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/2&lt;/P&gt;&lt;P&gt; switchport trunk allowed vlan 1-3&lt;/P&gt;&lt;P&gt; switchport mode trunk&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/3&lt;/P&gt;&lt;P&gt; switchport access vlan 3&lt;/P&gt;&lt;P&gt; switchport mode access&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/4&lt;/P&gt;&lt;P&gt; switchport mode access&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/5&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/6&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/7&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/8&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/9&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/10&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/11&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/12&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/13&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/14&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/15&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/16&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/17&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/18&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/19&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/20&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/21&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/22&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/23&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/24&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip http server&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; exec-timeout 0 0&lt;/P&gt;&lt;P&gt; logging synchronous&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; login local&lt;/P&gt;&lt;P&gt; transport input none&lt;/P&gt;&lt;P&gt;line vty 5&lt;/P&gt;&lt;P&gt; login local&lt;/P&gt;&lt;P&gt; transport input none&lt;/P&gt;&lt;P&gt;line vty 6 15&lt;/P&gt;&lt;P&gt; login&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Mar 2011 04:06:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-2950-vlan-trunking-confusion/m-p/1591523#M564619</guid>
      <dc:creator>josephnunham</dc:creator>
      <dc:date>2011-03-03T04:06:03Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 506e + 2950 VLAN trunking confusion</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-2950-vlan-trunking-confusion/m-p/1591524#M564623</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can i offer this as a solution/suggestion based on your configuration. I would change the following on port 2 of your switch to only show vlan 1-2&lt;/P&gt;&lt;P&gt;then remove the vlan 2 from the pix 506e on interface (eth0) outside interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;try this for the switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;conf&amp;nbsp; t&lt;/P&gt;&lt;P&gt;int fa0/2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no switchport trunk allowed vlan 1-3&lt;/P&gt;&lt;P&gt;switchport trunk allowed vlan 1-2&lt;/P&gt;&lt;P&gt;no shut&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on the pix506e -- remove the vlan 2&lt;/P&gt;&lt;P&gt;safe your configuration&lt;/P&gt;&lt;P&gt;then try pinging the ip address on eth0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Mar 2011 07:41:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-2950-vlan-trunking-confusion/m-p/1591524#M564623</guid>
      <dc:creator>avmailpro</dc:creator>
      <dc:date>2011-03-04T07:41:21Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 506e + 2950 VLAN trunking confusion</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-2950-vlan-trunking-confusion/m-p/1591525#M564625</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tried your suggestion, but it just made me unable to ping the eth0 address from the 192.168.1.x network. Everything else is still the same as before.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Mar 2011 21:48:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-2950-vlan-trunking-confusion/m-p/1591525#M564625</guid>
      <dc:creator>josephnunham</dc:creator>
      <dc:date>2011-03-04T21:48:09Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 506e + 2950 VLAN trunking confusion</title>
      <link>https://community.cisco.com/t5/network-security/pix-506e-2950-vlan-trunking-confusion/m-p/1591526#M564628</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV&gt;&lt;P&gt;I followed this post on experts-exchange and now have connectivity to both PIX interfaces (outside, 192.168.2.2, dmz, 192.168.3.2). However, the server still cannot ping 192.168.3.1 and 192.168.3.2, and nothing anywhere else can ping the server 192.168.3.3. Now do I need to implement the ACLs or is something strange still going on with the configuration? Port 2 on the switch, which is connected to the inside interface on the PIX, is configured to trunk to VLANs 1 - 3. Port 3 on the switch, which is connected to the server, is set to be in VLAN 3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="searchTerm"&gt;Pix&lt;/SPAN&gt; &lt;SPAN class="searchTerm"&gt;506e&lt;/SPAN&gt; will support up to 2 &lt;SPAN class="searchTerm"&gt;vlans&lt;/SPAN&gt; with 6.3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 1 Assign the interface speed to a physical interface by entering the following command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 2 Assign VLAN2 to the physical interface (ethernet0) by entering the following command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface ethernet0 vlan2 physical&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By assigning a &lt;SPAN class="searchTerm"&gt;VLAN&lt;/SPAN&gt; to the physical interface, you ensure that all frames forwarded on the interface will be tagged. &lt;SPAN class="searchTerm"&gt;VLAN&lt;/SPAN&gt; 1 is not used because that is the default native &lt;SPAN class="searchTerm"&gt;VLAN&lt;/SPAN&gt; for Cisco switches. Without the physical parameter, the default for the interface command is to create a logical interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 3 Create a new logical interface (VLAN3) and tie it to the physical interface (ethernet0) by entering the following command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface ethernet0 vlan3 logical&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will allow the &lt;SPAN class="searchTerm"&gt;PIX&lt;/SPAN&gt; Firewall to send and receive &lt;SPAN class="searchTerm"&gt;VLAN&lt;/SPAN&gt;-tagged packets with a &lt;SPAN class="searchTerm"&gt;VLAN&lt;/SPAN&gt; identifier equal to 3 on the physical interface, ethernet0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 4 Configure the logical and physical interfaces by entering the following commands:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif vlan3 dmz security50&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ipaddress outside 192.168.101.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ipaddress dmz 192.168.103.1 255.255.255.0&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 Mar 2011 00:50:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506e-2950-vlan-trunking-confusion/m-p/1591526#M564628</guid>
      <dc:creator>josephnunham</dc:creator>
      <dc:date>2011-03-06T00:50:41Z</dc:date>
    </item>
  </channel>
</rss>

