<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Proper Syntax for creating virtual interfaces on PIX 515E in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/proper-syntax-for-creating-virtual-interfaces-on-pix-515e/m-p/1558754#M675930</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Prapanch,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you...the references you provided are basically what I've seen already. What I'm looking for is more of a script that I can enter to create the virtual interfaces, assign VLANs and trunking.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is some more specific information...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[DMZ SWITCH SIDE]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Physical configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (Internet)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&lt;DMZ switch=""&gt; ---- &lt;PIX 515=""&gt;&lt;/PIX&gt;&lt;/DMZ&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The DMZ switch has one physical connection to the PIX so I want to make this a trunk port that will carry VLAN100 and VLAN110 to the PIX. VLAN110 will have only one port assigned to it in this case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the DMZ switch size (Cisco 2950) I need to create the VLANs (100 and 110). Currently all of the ports on the switch are in VLAN1. I need to assign all of the ports currently in VLAN1 to VLAN100.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface range fastethernet0/1 – 11, fastethernet0/13 - 22, gigabit0/1-2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then I need to assign port fastethernet 0/12 as the trunk port physically connected to the PIX. I want this trunk port to carry both VLAN110 and VLAN100 traffic to the PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How do I do that (syntax)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[PIX SIDE]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to create subinterfaces on ethernet3; ethernet3.1 and ethernet3.2:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;name each new subinterface&lt;/P&gt;&lt;P&gt;Assign an IP to ethernet3.1, assign a security level of 30&lt;/P&gt;&lt;P&gt;Assign an IP to ethernet3.2, assign a security level of 30&lt;/P&gt;&lt;P&gt;Configure 3.1 and 3.2 to carry VLAN100 and VLAN110 traffic specifically&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apply an access-list acl_dmz_in to ethernet3.1&lt;/P&gt;&lt;P&gt;Apply access-list acl_dmz_out to ethernet3.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I already ave acl_dmz_in applied to etherenet3 so do I need to create another access-group for the new subinterfaces? If so how would that look?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 17 Sep 2010 16:16:17 GMT</pubDate>
    <dc:creator>smiths@prpa.org</dc:creator>
    <dc:date>2010-09-17T16:16:17Z</dc:date>
    <item>
      <title>Proper Syntax for creating virtual interfaces on PIX 515E</title>
      <link>https://community.cisco.com/t5/network-security/proper-syntax-for-creating-virtual-interfaces-on-pix-515e/m-p/1558752#M675928</link>
      <description>&lt;P&gt;Hi Folks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've not had good luck finding good or concise syntax for creating virutal interfaces on a 515E PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could someone point me in the right direction or provide me with a syntax example on how to do this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example, in my environment I'd like to take ethernet3 and make two virtual interfaces which will both carry trunk information for vlan 100 and vlan 110.&amp;nbsp; Further, I'd like ethernet3.1 to handle vlan100 and ethernet3.2 to handle vlan100.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~Steve&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:41:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/proper-syntax-for-creating-virtual-interfaces-on-pix-515e/m-p/1558752#M675928</guid>
      <dc:creator>smiths@prpa.org</dc:creator>
      <dc:date>2019-03-11T18:41:47Z</dc:date>
    </item>
    <item>
      <title>Re: Proper Syntax for creating virtual interfaces on PIX 515E</title>
      <link>https://community.cisco.com/t5/network-security/proper-syntax-for-creating-virtual-interfaces-on-pix-515e/m-p/1558753#M675929</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For command details on configuring subinterfaces, here's where you can find it:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa72/command/reference/i3_72.html#wp1726041"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/command/reference/i3_72.html#wp1726041&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For config guide on configuring subinterfaces, please refer the below page:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/intrface.html#wp1044006"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/intrface.html#wp1044006&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if this helps and if you have more questions!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Sep 2010 15:35:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/proper-syntax-for-creating-virtual-interfaces-on-pix-515e/m-p/1558753#M675929</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-09-17T15:35:36Z</dc:date>
    </item>
    <item>
      <title>Re: Proper Syntax for creating virtual interfaces on PIX 515E</title>
      <link>https://community.cisco.com/t5/network-security/proper-syntax-for-creating-virtual-interfaces-on-pix-515e/m-p/1558754#M675930</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Prapanch,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you...the references you provided are basically what I've seen already. What I'm looking for is more of a script that I can enter to create the virtual interfaces, assign VLANs and trunking.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is some more specific information...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[DMZ SWITCH SIDE]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Physical configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (Internet)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&lt;DMZ switch=""&gt; ---- &lt;PIX 515=""&gt;&lt;/PIX&gt;&lt;/DMZ&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The DMZ switch has one physical connection to the PIX so I want to make this a trunk port that will carry VLAN100 and VLAN110 to the PIX. VLAN110 will have only one port assigned to it in this case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the DMZ switch size (Cisco 2950) I need to create the VLANs (100 and 110). Currently all of the ports on the switch are in VLAN1. I need to assign all of the ports currently in VLAN1 to VLAN100.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface range fastethernet0/1 – 11, fastethernet0/13 - 22, gigabit0/1-2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then I need to assign port fastethernet 0/12 as the trunk port physically connected to the PIX. I want this trunk port to carry both VLAN110 and VLAN100 traffic to the PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How do I do that (syntax)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[PIX SIDE]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to create subinterfaces on ethernet3; ethernet3.1 and ethernet3.2:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;name each new subinterface&lt;/P&gt;&lt;P&gt;Assign an IP to ethernet3.1, assign a security level of 30&lt;/P&gt;&lt;P&gt;Assign an IP to ethernet3.2, assign a security level of 30&lt;/P&gt;&lt;P&gt;Configure 3.1 and 3.2 to carry VLAN100 and VLAN110 traffic specifically&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apply an access-list acl_dmz_in to ethernet3.1&lt;/P&gt;&lt;P&gt;Apply access-list acl_dmz_out to ethernet3.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I already ave acl_dmz_in applied to etherenet3 so do I need to create another access-group for the new subinterfaces? If so how would that look?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Sep 2010 16:16:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/proper-syntax-for-creating-virtual-interfaces-on-pix-515e/m-p/1558754#M675930</guid>
      <dc:creator>smiths@prpa.org</dc:creator>
      <dc:date>2010-09-17T16:16:17Z</dc:date>
    </item>
    <item>
      <title>Re: Proper Syntax for creating virtual interfaces on PIX 515E</title>
      <link>https://community.cisco.com/t5/network-security/proper-syntax-for-creating-virtual-interfaces-on-pix-515e/m-p/1558755#M675931</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Steve,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well i am not an expert with configuring switches. But, to configure a port as trunk, the config will be as below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface fa0/12&lt;/P&gt;&lt;P&gt;switchport mode trunk&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To configure a port as an access port, for example, fa0/1 in vlan 100, it will look like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface fa0/1&lt;/P&gt;&lt;P&gt;switchport mode access&lt;/P&gt;&lt;P&gt;switchport access vlan 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX side:&lt;/P&gt;&lt;P&gt;======&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the pix side, the behavior is going to be like this. Assuming that the native VLAN on the switch is going to be VLAN 1. Now, on the trunk link, all native VLAN packets will go untagged. These untagged packets will be processed by the physical interface on the PIX, that is, Ethernet3. So you will need to put Ethernet3 in the same subnet as VLAN1 (better put as Native VLAN) on the switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All tagged packets, that is, packets on VLAN 100 and 101, will be processed by the respective subinterfaces. So we need to put the respective subinterfaces in the respective VLAN and give them an IP address in those respective subnets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assuming VLAN 100 and 101 are in the ranges 192.168.100.0 and 192.168.101.0/24 respectively, and VLAN 1 is 192.168.1.0/24, then the congi on the PIX would look something like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Ethernet 3&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ip address 192.168.1.1 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;nameif VLAN1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;security 100&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Ethernet3.1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;vlan 100&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ip address 192.168.100.1 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;nameif VLAN100&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;security 30&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Ethernet3.2&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;vlan 101&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ip address 192.168.101.1&amp;nbsp; 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;nameif VLAN101&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;security 30&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the nameif and security-level will be based on your requirement. Applying access lists to these interfaces will be just like regular interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-group acl_dmz_in in interface VLAN100&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-group acl_dmz_out out interface VLAN101&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the above commands, the directions and access-list names will again depend on what you want to configure them as.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Importantly, to allow communication between VLAN100 and VLAN101 on the PIX, you will also need the command "same-security-traffic permit inter-interface" as they both have the same security-levels configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope the above helps!! Let me know if there is anything unclear.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Sep 2010 16:40:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/proper-syntax-for-creating-virtual-interfaces-on-pix-515e/m-p/1558755#M675931</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-09-17T16:40:44Z</dc:date>
    </item>
    <item>
      <title>Re: Proper Syntax for creating virtual interfaces on PIX 515E</title>
      <link>https://community.cisco.com/t5/network-security/proper-syntax-for-creating-virtual-interfaces-on-pix-515e/m-p/1558756#M675932</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to create subinterfaces on the DMZ port, please follow the procedure below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface ethernet 3.1&lt;/P&gt;&lt;P&gt;nameif DMZ1&lt;/P&gt;&lt;P&gt;security-level 30&lt;/P&gt;&lt;P&gt;ip address &lt;IP&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/IP&gt;&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface ethernet 3.2&lt;/P&gt;&lt;P&gt;nameif DMZ2&lt;/P&gt;&lt;P&gt;security-level 30&lt;/P&gt;&lt;P&gt;ip address &lt;IP&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/IP&gt;&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to enable communication between these two DMZ subnets, then&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security traffic permit inter-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ1_nat0_outbound permit ip &lt;DMZ1 subnet=""&gt; &lt;MASK&gt; &lt;DMZ2 subnet=""&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/DMZ2&gt;&lt;/MASK&gt;&lt;/DMZ1&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (DMZ1) 0 access-list DMZ1_nat0_outbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ2_nat0_outbound permit ip &lt;DMZ2 subnet=""&gt; &lt;MASK&gt; &lt;DMZ1 subnet=""&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/DMZ1&gt;&lt;/MASK&gt;&lt;/DMZ2&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (DMZ2) 0 access-list DMZ2_nat0_outbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want these DMZ subnets to have access to internet, then&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&amp;nbsp; -- This line could already be there&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (DMZ1) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (DMZ2) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to enable communication between specific inside hosts and these DMZ devices, then&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound permit ip host &lt;INSIDE server="" ip=""&gt; &lt;DMZ1 subnet=""&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/DMZ1&gt;&lt;/INSIDE&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound permit ip host &lt;INSIDE server="" ip=""&gt; &lt;DMZ2 subnet=""&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/DMZ2&gt;&lt;/INSIDE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ1_access_outbound permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group DMZ1_access_outbound in interface DMZ1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ2_access_outbound permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group DMZ2_access_outbound in interface DMZ2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Sep 2010 16:49:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/proper-syntax-for-creating-virtual-interfaces-on-pix-515e/m-p/1558756#M675932</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-09-17T16:49:52Z</dc:date>
    </item>
    <item>
      <title>Re: Proper Syntax for creating virtual interfaces on PIX 515E</title>
      <link>https://community.cisco.com/t5/network-security/proper-syntax-for-creating-virtual-interfaces-on-pix-515e/m-p/1558757#M675933</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;NT,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you. This should help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I&amp;nbsp; don't think we need the two DMZ segments to share traffic between them,&amp;nbsp; but the VLAN100 side certainly does. So given your syntax all I would&amp;nbsp; need to do is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface ethernet 3.1&lt;/P&gt;&lt;P&gt;vlan100&lt;BR /&gt; nameif DMZ1&lt;/P&gt;&lt;P&gt;security-level 30&lt;BR /&gt; ip address &lt;IP&gt; &lt;MASK&gt;&lt;BR /&gt; exit&lt;/MASK&gt;&lt;/IP&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt; interface ethernet 3.2&lt;/P&gt;&lt;P&gt;vlan110&lt;BR /&gt; nameif DMZ2&lt;/P&gt;&lt;P&gt;security-level 30&lt;BR /&gt; ip address &lt;IP&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/IP&gt;&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (DMZ1) 1 0.0.0.0 0.0.0.0 (this is already here since our current DMZ has access to the Internet)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using your naming convension, DMZ2 will be the&amp;nbsp; 'inside' DMZ link and I would need an access-group and apply an&amp;nbsp; access-list allowing our internal systems proper communication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt; access-group DMZ2_access_internal in interface DMZ2&lt;/P&gt;&lt;P&gt;&lt;BR /&gt; access-list DMZ2_access_internal permit tcp any host UAG1_Corp eq www &lt;BR /&gt; access-list DMZ2_access_internal permit tcp any host UAG1_Corp eq https &lt;BR /&gt; access-list DMZ2_access_internal permit tcp any host UAG1_Corp eq 445 &lt;BR /&gt; access-list DMZ2_access_internal permit udp any host UAG1_Corp eq 445 &lt;BR /&gt; access-list DMZ2_access_internal permit tcp any host UAG1_Corp eq 88 &lt;BR /&gt; access-list DMZ2_access_internal permit udp any host UAG1_Corp eq 88 &lt;BR /&gt; access-list DMZ2_access_internal permit tcp any host UAG1_Corp eq ldap &lt;BR /&gt; access-list DMZ2_access_internal permit udp any host UAG1_Corp eq 389 &lt;BR /&gt; access-list DMZ2_access_internal permit tcp any host UAG1_Corp eq ldaps &lt;BR /&gt; access-list DMZ2_access_internal permit udp any host UAG1_Corp eq 636 &lt;BR /&gt; access-list DMZ2_access_internal permit tcp any host UAG1_Corp eq 3268 &lt;BR /&gt; access-list DMZ2_access_internal permit udp any host UAG1_Corp eq 3268 &lt;BR /&gt; access-list DMZ2_access_internal permit tcp any host UAG1_Corp eq 3269 &lt;BR /&gt; access-list DMZ2_access_internal permit udp any host UAG1_Corp eq 3269 &lt;BR /&gt; access-list DMZ2_access_internal permit tcp any host UAG1_Corp eq domain &lt;BR /&gt; access-list DMZ2_access_internal permit udp any host UAG1_Corp eq domain &lt;BR /&gt; access-list DMZ2_access_internal permit udp any host UAG1_Corp eq radius &lt;BR /&gt; access-list DMZ2_access_internal permit udp any host UAG1_Corp eq 1812&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there anything on the PIX side I need to configure to allow trunking traffic from the DMZ switch?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Sep 2010 17:13:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/proper-syntax-for-creating-virtual-interfaces-on-pix-515e/m-p/1558757#M675933</guid>
      <dc:creator>smiths@prpa.org</dc:creator>
      <dc:date>2010-09-17T17:13:30Z</dc:date>
    </item>
    <item>
      <title>Re: Proper Syntax for creating virtual interfaces on PIX 515E</title>
      <link>https://community.cisco.com/t5/network-security/proper-syntax-for-creating-virtual-interfaces-on-pix-515e/m-p/1558758#M675934</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As long as you have created the sub-interfaces, that is pretty much all you need on the firewall side to enable trunk communication. Please make sure that on the switch side, the native VLAN is something other than VLAN 100 or VLAN 110.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, I forgot to include a keyword in the earlier configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface ethernet 3.1&lt;/P&gt;&lt;P&gt; vlan 100&lt;BR /&gt; nameif DMZ1&lt;BR /&gt; security-level 30&lt;BR /&gt; ip address &lt;IP&gt; &lt;MASK&gt;&lt;BR /&gt; exit&lt;BR /&gt; &lt;BR /&gt; interface ethernet 3.2&lt;/MASK&gt;&lt;/IP&gt;&lt;/P&gt;&lt;P&gt; vlan 110&lt;BR /&gt; nameif DMZ2&lt;BR /&gt; security-level 30&lt;BR /&gt; ip address &lt;IP&gt; &lt;MASK&gt;&lt;BR /&gt;exit&lt;/MASK&gt;&lt;/IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You still need "same-security-traffic permit inter-interface" along with the access-list entries to enable communication between these two subnets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Sep 2010 17:20:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/proper-syntax-for-creating-virtual-interfaces-on-pix-515e/m-p/1558758#M675934</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-09-17T17:20:08Z</dc:date>
    </item>
    <item>
      <title>Re: Proper Syntax for creating virtual interfaces on PIX 515E</title>
      <link>https://community.cisco.com/t5/network-security/proper-syntax-for-creating-virtual-interfaces-on-pix-515e/m-p/1558759#M675935</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;NT,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You mentioned this: "same-security-traffic permit inter-interface" along with the&amp;nbsp; access-list entries to enable communication between these two subnets. Is this so the PIX see's both VLANs or allows traffic between these? The idea is to segment the two so they are unaware of one another. The "UAG" box will process any traffic between the two VLANs. Specifically, this is will be a Microsoft Unified Access Gatway used to process inbound and outbound emails so I don't think we need to allow traffic between the two VLANs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully that makes sense.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Sep 2010 17:25:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/proper-syntax-for-creating-virtual-interfaces-on-pix-515e/m-p/1558759#M675935</guid>
      <dc:creator>smiths@prpa.org</dc:creator>
      <dc:date>2010-09-17T17:25:35Z</dc:date>
    </item>
    <item>
      <title>Re: Proper Syntax for creating virtual interfaces on PIX 515E</title>
      <link>https://community.cisco.com/t5/network-security/proper-syntax-for-creating-virtual-interfaces-on-pix-515e/m-p/1558760#M675936</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where will this UAG box be located? If it will be in a different segment than DMZ1/DMZ2, then you do not need to enable communication between these two segments. Also, you need to make sure that both segments can talk to UAG box. So, you need to configure NAT translation for the UAG box on both interfaces. Can you post a rough sketch of how devices are connected to the PIX?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Sep 2010 17:30:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/proper-syntax-for-creating-virtual-interfaces-on-pix-515e/m-p/1558760#M675936</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-09-17T17:30:17Z</dc:date>
    </item>
    <item>
      <title>Re: Proper Syntax for creating virtual interfaces on PIX 515E</title>
      <link>https://community.cisco.com/t5/network-security/proper-syntax-for-creating-virtual-interfaces-on-pix-515e/m-p/1558761#M675937</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;NT,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a sketch of what we're trying to accomplish:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/" /&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/5/9/1/7195-Capture.JPG" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Sep 2010 17:50:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/proper-syntax-for-creating-virtual-interfaces-on-pix-515e/m-p/1558761#M675937</guid>
      <dc:creator>smiths@prpa.org</dc:creator>
      <dc:date>2010-09-17T17:50:04Z</dc:date>
    </item>
    <item>
      <title>Re: Proper Syntax for creating virtual interfaces on PIX 515E</title>
      <link>https://community.cisco.com/t5/network-security/proper-syntax-for-creating-virtual-interfaces-on-pix-515e/m-p/1558762#M675938</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The port labeled "11" will be in the VLAN110 on the DMZ switch.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Sep 2010 17:52:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/proper-syntax-for-creating-virtual-interfaces-on-pix-515e/m-p/1558762#M675938</guid>
      <dc:creator>smiths@prpa.org</dc:creator>
      <dc:date>2010-09-17T17:52:35Z</dc:date>
    </item>
  </channel>
</rss>

