<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Inter vlan port forwarding in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3883101#M5968</link>
    <description>&lt;P&gt;the ASA is the gateway for the hosts.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;mark.&lt;/P&gt;</description>
    <pubDate>Tue, 02 Jul 2019 09:59:01 GMT</pubDate>
    <dc:creator>mark.stewart1</dc:creator>
    <dc:date>2019-07-02T09:59:01Z</dc:date>
    <item>
      <title>Inter vlan port forwarding</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3882810#M5933</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I currently have a vlan setup as below on a ASA5516, other ports are unconnected, this is connected to a Cat3650 switch with the vlans setup.&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/2&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2.10&lt;BR /&gt;vlan 10&lt;BR /&gt;nameif A&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.50.0.30 255.255.255.224&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2.12&lt;BR /&gt;vlan 12&lt;BR /&gt;nameif B&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.50.0.62 255.255.255.224&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2.20&lt;BR /&gt;vlan 20&lt;BR /&gt;nameif C&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.50.0.126 255.255.255.192&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;my issue is, i can ping and access within the same vlan, but am unsure how to go across vlans, but this has to be restricted, so for example only port 80 access between vlans A and B as an example.&lt;/P&gt;&lt;P&gt;I have atried a few things but with no luck up to now, as you can probably guss I am an absolute beginner with CISCO's, only ever used fortinets before.&lt;/P&gt;&lt;P&gt;please can somebody give me a starting point???&lt;/P&gt;&lt;P&gt;many thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;mark.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:15:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3882810#M5933</guid>
      <dc:creator>mark.stewart1</dc:creator>
      <dc:date>2020-02-21T17:15:52Z</dc:date>
    </item>
    <item>
      <title>Re: Inter vlan port forwarding</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3882817#M5934</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Do you have the command &lt;SPAN style="font-weight: bold; font-style: italic;"&gt;same-security-traffic permit inter-interface&lt;/SPAN&gt; configured?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This command is used to allow communication between 2 interfaces with the same security level.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2019 20:06:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3882817#M5934</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-07-01T20:06:46Z</dc:date>
    </item>
    <item>
      <title>Re: Inter vlan port forwarding</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3882847#M5935</link>
      <description>Hi, yes I tried inter and intra but no luck.&lt;BR /&gt;Mark.&lt;BR /&gt;</description>
      <pubDate>Mon, 01 Jul 2019 20:36:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3882847#M5935</guid>
      <dc:creator>mark.stewart1</dc:creator>
      <dc:date>2019-07-01T20:36:17Z</dc:date>
    </item>
    <item>
      <title>Re: Inter vlan port forwarding</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3882855#M5936</link>
      <description>&lt;P&gt;I think in this case it may require the following command -&lt;/P&gt;&lt;P&gt;&lt;EM&gt;same-security-traffic permit intra-interface (rather than inter)&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;I&gt;D&lt;/I&gt;o you any ACLs currently in place? I'd try the above command first and then test going between vlans. Once that's good, focus on restricting with ACL.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2019 20:39:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3882855#M5936</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-07-01T20:39:15Z</dc:date>
    </item>
    <item>
      <title>Re: Inter vlan port forwarding</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3882867#M5937</link>
      <description>&lt;P&gt;Hi, I have no ACLS set yet, I'm sure I tried both ways but I'll have ago tomorrow morning when I'm in front of the ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mark.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2019 20:47:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3882867#M5937</guid>
      <dc:creator>mark.stewart1</dc:creator>
      <dc:date>2019-07-01T20:47:42Z</dc:date>
    </item>
    <item>
      <title>Re: Inter vlan port forwarding</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3882871#M5941</link>
      <description>&lt;P&gt;I had read on one post on another site, that just enabling intra on a port won't allow inter clan access as you had to do something else?&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2019 20:54:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3882871#M5941</guid>
      <dc:creator>mark.stewart1</dc:creator>
      <dc:date>2019-07-01T20:54:03Z</dc:date>
    </item>
    <item>
      <title>Re: Inter vlan port forwarding</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3883035#M5946</link>
      <description>Hi Mark,&lt;BR /&gt;&lt;BR /&gt;The switchport on the 3650 you have connected to physical ASA port GigabitEthernet1/2. What is the config from that switchport?&lt;BR /&gt;&lt;BR /&gt;What is the native VLAN on the trunk? Let us know Output from -&lt;BR /&gt;&lt;BR /&gt;show int trunk&lt;BR /&gt;&lt;BR /&gt;On the ASA, do you have ACL applied?&lt;BR /&gt;&lt;BR /&gt;show us output from&lt;BR /&gt;&lt;BR /&gt;show run access-group&lt;BR /&gt;&lt;BR /&gt;One last thing - How are you testing this? Via Pinging between hosts? If so, have you enabled ICMP Inspection? Have a look at the output from -&lt;BR /&gt;show run policy-map&lt;BR /&gt;&lt;BR /&gt;If you do not see inspect icmp under the policy then please add it using the following commands.&lt;BR /&gt;&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect icmp&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 02 Jul 2019 07:37:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3883035#M5946</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-07-02T07:37:47Z</dc:date>
    </item>
    <item>
      <title>Re: Inter vlan port forwarding</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3883040#M5949</link>
      <description>&lt;P&gt;, I have added the inter setting, but still no inter vlan comms?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;mark.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2019 07:44:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3883040#M5949</guid>
      <dc:creator>mark.stewart1</dc:creator>
      <dc:date>2019-07-02T07:44:59Z</dc:date>
    </item>
    <item>
      <title>Re: Inter vlan port forwarding</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3883061#M5951</link>
      <description>&lt;P&gt;Hi GRANT3779,&lt;/P&gt;&lt;P&gt;Switchport from the ASA:-&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/0/2&lt;BR /&gt;switchport trunk native vlan 10&lt;BR /&gt;switchport mode trunk&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Switch#show int trunk&lt;/P&gt;&lt;P&gt;Port Mode Encapsulation Status Native vlan&lt;BR /&gt;Gi1/0/2 on 802.1q trunking 10&lt;BR /&gt;Po1 on 802.1q trunking 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Port Vlans allowed on trunk&lt;BR /&gt;Gi1/0/2 1-4094&lt;BR /&gt;Po1 1-4094&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Port Vlans allowed and active in management domain&lt;BR /&gt;Gi1/0/2 1-2,10,12,20-21,501-503,665-668,901-902&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;below gives no output as shown&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FW01(config)# show run access-group&lt;BR /&gt;FW01(config)#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;FW01# show run policy-map&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect icmp&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_2&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;!&lt;BR /&gt;FW01#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;many thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;mark.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2019 08:35:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3883061#M5951</guid>
      <dc:creator>mark.stewart1</dc:creator>
      <dc:date>2019-07-02T08:35:55Z</dc:date>
    </item>
    <item>
      <title>Re: Inter vlan port forwarding</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3883074#M5953</link>
      <description>Thanks Mark,&lt;BR /&gt;&lt;BR /&gt;I would create a "dummy" vlan, e.g 666 and set this as the native VLAN. Bring the port down/up.&lt;BR /&gt;&lt;BR /&gt;interface GigabitEthernet1/0/2&lt;BR /&gt;switchport trunk native vlan 666&lt;BR /&gt;switchport mode trunk&lt;BR /&gt;&lt;BR /&gt;Also, on the ASA did you enter the "INTRA" command rather than "INTER"?</description>
      <pubDate>Tue, 02 Jul 2019 08:55:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3883074#M5953</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-07-02T08:55:05Z</dc:date>
    </item>
    <item>
      <title>Re: Inter vlan port forwarding</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3883078#M5954</link>
      <description>&lt;P&gt;Hi, below is the full config, obvious things changed.....&lt;/P&gt;&lt;P&gt;like i said, I can now ping all the devices from the ASA, but still no from within the vlans.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FW01# show run&lt;BR /&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;BR /&gt;: Serial Number: ---------------&lt;BR /&gt;: Hardware: ASA5516, 8192 MB RAM, CPU Atom C2000 series 2416 MHz, 1 CPU (8 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.8(2)&lt;BR /&gt;!&lt;BR /&gt;hostname FW01&lt;BR /&gt;domain-name LOCAL.local&lt;BR /&gt;enable password -----------------------------------------&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;names&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;no nameif&lt;BR /&gt;security-level 100&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2.2&lt;BR /&gt;vlan 2&lt;BR /&gt;nameif A&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.50.0.222 255.255.255.224&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2.10&lt;BR /&gt;vlan 10&lt;BR /&gt;nameif B&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.50.0.30 255.255.255.224&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2.12&lt;BR /&gt;vlan 12&lt;BR /&gt;nameif C&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.50.0.62 255.255.255.224&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2.20&lt;BR /&gt;vlan 20&lt;BR /&gt;nameif D&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.50.0.126 255.255.255.192&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2.21&lt;BR /&gt;vlan 21&lt;BR /&gt;nameif E&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.50.0.190 255.255.255.192&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 0&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;domain-name SCADA.local&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;pager lines 24&lt;BR /&gt;mtu management 1500&lt;BR /&gt;mtu System_Device 1500&lt;BR /&gt;mtu Network_Device 1500&lt;BR /&gt;mtu Scada 1500&lt;BR /&gt;mtu Server 1500&lt;BR /&gt;mtu Control 1500&lt;BR /&gt;no failover&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect icmp&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_2&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;no active&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank" rel="noopener"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination address email callhome@cisco.com&lt;BR /&gt;destination transport-method http&lt;BR /&gt;subscribe-to-alert-group diagnostic&lt;BR /&gt;subscribe-to-alert-group environment&lt;BR /&gt;subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:-----------------------------&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2019 09:24:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3883078#M5954</guid>
      <dc:creator>mark.stewart1</dc:creator>
      <dc:date>2019-07-02T09:24:08Z</dc:date>
    </item>
    <item>
      <title>Re: Inter vlan port forwarding</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3883089#M5955</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Can you provide output from "show arp" on the ASA. Did you say you can ping your end hosts from the ASA directly?&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 02 Jul 2019 09:25:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3883089#M5955</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-07-02T09:25:52Z</dc:date>
    </item>
    <item>
      <title>Re: Inter vlan port forwarding</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3883092#M5958</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Show arp below:-&lt;/P&gt;&lt;P&gt;FW01# show arp&lt;BR /&gt;B 10.50.0.2 2004.0ff7.4c58 2&lt;BR /&gt;B 10.50.0.21 2004.0ff7.8728 25&lt;BR /&gt;B 10.50.0.9 1065.3080.8e24 136&lt;BR /&gt;D 10.50.0.70 6c2b.59d7.6afa 282&lt;BR /&gt;D 10.50.0.71 e4e7.49aa.3380 651&lt;BR /&gt;E 10.50.0.136 dc44.2780.4461 2712&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ye i can ping all teh devices shown above from the ASA directly, if I select the correct vlan interface.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2019 09:29:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3883092#M5958</guid>
      <dc:creator>mark.stewart1</dc:creator>
      <dc:date>2019-07-02T09:29:32Z</dc:date>
    </item>
    <item>
      <title>Re: Inter vlan port forwarding</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3883098#M5961</link>
      <description>Is the ASA the GW for these hosts or are you running L3 with SVIs on your switch?</description>
      <pubDate>Tue, 02 Jul 2019 09:55:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3883098#M5961</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-07-02T09:55:51Z</dc:date>
    </item>
    <item>
      <title>Re: Inter vlan port forwarding</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3883100#M5966</link>
      <description>&lt;P&gt;ok, just tried something ive seen on a video using packet-tracer , and i get the following:-&lt;/P&gt;&lt;P&gt;FW01# packet-tracer input D tcp 10.50.0.70 80 10.50.0.2 80 detailed&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fbd661aea80, priority=1, domain=permit, deny=false&lt;BR /&gt;hits=2453, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;input_ifc=Scada, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 10.50.0.2 using egress ifc B&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fbd663c9d60, priority=110, domain=permit, deny=true&lt;BR /&gt;hits=2143, user_data=0x0, cs_id=0x0, flags=0x3000, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Scada, output_ifc=any&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: D&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: B&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so it looks like access list is automatically blocking any inter vlan traffic?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;mark.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2019 09:58:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3883100#M5966</guid>
      <dc:creator>mark.stewart1</dc:creator>
      <dc:date>2019-07-02T09:58:22Z</dc:date>
    </item>
    <item>
      <title>Re: Inter vlan port forwarding</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3883101#M5968</link>
      <description>&lt;P&gt;the ASA is the gateway for the hosts.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;mark.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2019 09:59:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3883101#M5968</guid>
      <dc:creator>mark.stewart1</dc:creator>
      <dc:date>2019-07-02T09:59:01Z</dc:date>
    </item>
    <item>
      <title>Re: Inter vlan port forwarding</title>
      <link>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3883109#M5970</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Many thanks, it looks like it was a combination of things, it looks like the native vlan was causing issues on the port as now with no native vlan and Inter (yes i know, i would of thought intra???) specified I can now access all vlans from each other.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;many thanks for you help GRANT3779.&lt;/P&gt;&lt;P&gt;I'll mark you down as the answer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;mark.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2019 10:10:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inter-vlan-port-forwarding/m-p/3883109#M5970</guid>
      <dc:creator>mark.stewart1</dc:creator>
      <dc:date>2019-07-02T10:10:27Z</dc:date>
    </item>
  </channel>
</rss>

