<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VLAN REACHABLITY THROUGH FIREWALL in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vlan-reachablity-through-firewall/m-p/1447111#M654342</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The static statement is called identity NAT. It will instruct the firewall to pass 192.168.1.0 traffic from inside interface to outside interface without any change (i.e. no nat). It will also instruct the firewall to allow connections originated on the outside interface to the hosts belonging to 192.168.1.x subnet (bi-directional traffic). So, in other words, with that configuration, the hosts on the outside subnet will be able to see the actual IP of the inside VLAN hosts and they will be able to initiate connections to those devices. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;https://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008046f31a.shtml#SIN1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 15 Jul 2010 04:30:28 GMT</pubDate>
    <dc:creator>Nagaraja Thanthry</dc:creator>
    <dc:date>2010-07-15T04:30:28Z</dc:date>
    <item>
      <title>VLAN REACHABLITY THROUGH FIREWALL</title>
      <link>https://community.cisco.com/t5/network-security/vlan-reachablity-through-firewall/m-p/1447108#M654339</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have a requirement like this&lt;/P&gt;&lt;P&gt;L3 switch connected to PIX that PIX connected to othernetworks.&lt;/P&gt;&lt;P&gt;TOPOLOGY&lt;/P&gt;&lt;P&gt;--------------------&lt;/P&gt;&lt;P&gt;Switch---&amp;gt;PIX---&amp;gt;Othernetworks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have created L3 vlans on switch ( 3 vlans created and assigned 3 different subnet)&lt;/P&gt;&lt;P&gt;my requirement says all vlans must ping with pix gateway and also all vlans must reach the othernetworks as well,&lt;BR /&gt;Even traffic must flow two way&lt;/P&gt;&lt;P&gt;It would be great if experts can help me with sample commands, how to put route for reachablity etc.&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Pramod KG&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:11:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-reachablity-through-firewall/m-p/1447108#M654339</guid>
      <dc:creator>pramod</dc:creator>
      <dc:date>2019-03-11T18:11:49Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN REACHABLITY THROUGH FIREWALL</title>
      <link>https://community.cisco.com/t5/network-security/vlan-reachablity-through-firewall/m-p/1447109#M654340</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assume that the 3 VLAN IP addresses are 192.168.1.0/24, 192.168.2.0/24, and 192.168.3.0/24 with the firewall being in 192.168.1.x subnet. Let the switch SVI address be 192.168.1.1 and PIX address be 192.168.1.2. Let the remote network be 172.16.x.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the Switch:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface vlan 1&lt;/P&gt;&lt;P&gt;ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface vlan 2&lt;/P&gt;&lt;P&gt;ip address 192.168.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface vlan 3&lt;/P&gt;&lt;P&gt;ip address 192.168.3.1 255.255.255.0&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip routing&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 192.168.1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the firewall:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 172.16.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.1.2 255.255.255.0&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route inside 192.168.2.0 255.255.255.0 192.168.1.1&lt;/P&gt;&lt;P&gt;route inside 192.168.3.0 255.255.255.0 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.1.0 192.168.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.2.0 192.168.2.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.3.0 192.168.3.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_permit_in permit ip 172.16.0.0 255.255.0.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_permit_in permit ip 172.16.0.0 255.255.0.0 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_permit_in permit ip 172.16.0.0 255.255.0.0 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group outside_permit_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the above example, both 172.16.x.x and 192.168.x.x can communicate seamlessly. If you want to restrict the communication, you can change the access-list rules accordingly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Jul 2010 03:36:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-reachablity-through-firewall/m-p/1447109#M654340</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-07-15T03:36:58Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN REACHABLITY THROUGH FIREWALL</title>
      <link>https://community.cisco.com/t5/network-security/vlan-reachablity-through-firewall/m-p/1447110#M654341</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks a lot Naga for your excellent reply!&lt;/P&gt;&lt;P&gt;I have a doubt ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.1.0 192.168.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please explain the above cmd what exactly do ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;why the subnet is same for both inside and outside ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Jul 2010 04:24:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-reachablity-through-firewall/m-p/1447110#M654341</guid>
      <dc:creator>pramod</dc:creator>
      <dc:date>2010-07-15T04:24:57Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN REACHABLITY THROUGH FIREWALL</title>
      <link>https://community.cisco.com/t5/network-security/vlan-reachablity-through-firewall/m-p/1447111#M654342</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The static statement is called identity NAT. It will instruct the firewall to pass 192.168.1.0 traffic from inside interface to outside interface without any change (i.e. no nat). It will also instruct the firewall to allow connections originated on the outside interface to the hosts belonging to 192.168.1.x subnet (bi-directional traffic). So, in other words, with that configuration, the hosts on the outside subnet will be able to see the actual IP of the inside VLAN hosts and they will be able to initiate connections to those devices. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;https://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008046f31a.shtml#SIN1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Jul 2010 04:30:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-reachablity-through-firewall/m-p/1447111#M654342</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-07-15T04:30:28Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN REACHABLITY THROUGH FIREWALL</title>
      <link>https://community.cisco.com/t5/network-security/vlan-reachablity-through-firewall/m-p/1447112#M654343</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks much for your excellent support &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Jul 2010 07:51:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vlan-reachablity-through-firewall/m-p/1447112#M654343</guid>
      <dc:creator>pramod</dc:creator>
      <dc:date>2010-07-15T07:51:16Z</dc:date>
    </item>
  </channel>
</rss>

