<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: asa virtual lan in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-virtual-lan/m-p/1529348#M696150</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Since ASA will be the L3 hop, you would need to create ASA physical interface in the same VLAN as the users VLAN. Just connect the ASA inside interface to the switch port and assign the switch port the same VLAN as the user VLAN. All users and ASA inside interface will then be in the same VLAN and subnet, and ASA will be the default gateway for your users.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 02 Sep 2010 11:32:02 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2010-09-02T11:32:02Z</dc:date>
    <item>
      <title>asa virtual lan</title>
      <link>https://community.cisco.com/t5/network-security/asa-virtual-lan/m-p/1529347#M696144</link>
      <description>&lt;P&gt;i have an asa to which a switch will be attached. this switch wil have multiple end user ports but all on same vlan, so i have to create vlan on asa port which will attach to the layer2 switch.&lt;/P&gt;&lt;P&gt;how do i create this vlan scene. is subinterface the only possible way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you for help.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:33:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-virtual-lan/m-p/1529347#M696144</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2019-03-11T18:33:58Z</dc:date>
    </item>
    <item>
      <title>Re: asa virtual lan</title>
      <link>https://community.cisco.com/t5/network-security/asa-virtual-lan/m-p/1529348#M696150</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Since ASA will be the L3 hop, you would need to create ASA physical interface in the same VLAN as the users VLAN. Just connect the ASA inside interface to the switch port and assign the switch port the same VLAN as the user VLAN. All users and ASA inside interface will then be in the same VLAN and subnet, and ASA will be the default gateway for your users.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Sep 2010 11:32:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-virtual-lan/m-p/1529348#M696150</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-09-02T11:32:02Z</dc:date>
    </item>
    <item>
      <title>Re: asa virtual lan</title>
      <link>https://community.cisco.com/t5/network-security/asa-virtual-lan/m-p/1529349#M696157</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;would normal vlan command work on asa for this or there is other way to do this.&lt;/P&gt;&lt;P&gt;it will be great help if commands used for this scene is shown for me .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Sep 2010 15:20:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-virtual-lan/m-p/1529349#M696157</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2010-09-02T15:20:31Z</dc:date>
    </item>
    <item>
      <title>Re: asa virtual lan</title>
      <link>https://community.cisco.com/t5/network-security/asa-virtual-lan/m-p/1529350#M696162</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The ASA needs sub-interfaces for the clan command).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But as already suggested if you put 10 users and the ASA interfaces on the same vlans on the switch then the ASA will see all the user traffic. So having all ports of the users and the ASA's inside are access ports for vlan x on the switch then it will work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it is clear.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Sep 2010 17:17:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-virtual-lan/m-p/1529350#M696162</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-09-02T17:17:15Z</dc:date>
    </item>
    <item>
      <title>Re: asa virtual lan</title>
      <link>https://community.cisco.com/t5/network-security/asa-virtual-lan/m-p/1529351#M696166</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks, so will it be as below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int gigabitethernet 0/1.1&lt;/P&gt;&lt;P&gt;&amp;nbsp; nameif temporary&lt;/P&gt;&lt;P&gt;&amp;nbsp; vlan 75&lt;/P&gt;&lt;P&gt; security-level 75&lt;/P&gt;&lt;P&gt; ip address 192.168.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and all user ports will be on this vlan . correction is welcome, if this is not correct.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Sep 2010 03:19:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-virtual-lan/m-p/1529351#M696166</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2010-09-03T03:19:07Z</dc:date>
    </item>
    <item>
      <title>Re: asa virtual lan</title>
      <link>https://community.cisco.com/t5/network-security/asa-virtual-lan/m-p/1529352#M696169</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No.&lt;/P&gt;&lt;P&gt;What you showed there is only if you need this ASA port to be a trunk that passes many vlans.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you only want one vlan on this interface you just make the port that this interface connects to on the switch a an access port that belongs to that vlans on the switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it is clear now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Sep 2010 03:22:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-virtual-lan/m-p/1529352#M696169</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-09-03T03:22:40Z</dc:date>
    </item>
    <item>
      <title>Re: asa virtual lan</title>
      <link>https://community.cisco.com/t5/network-security/asa-virtual-lan/m-p/1529353#M696172</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If, on the switch side you have a single VLAN, then you do not need the&lt;/P&gt;&lt;P&gt;subinterface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the switch side:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface gigabitethernet 0/1&lt;/P&gt;&lt;P&gt;Description userport&lt;/P&gt;&lt;P&gt;switchport access vlan 75&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface gigabitethernet 0/24&lt;/P&gt;&lt;P&gt;Description Firewall Inside&lt;/P&gt;&lt;P&gt;switchport access vlan 75&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the firewall:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface gi 0/1&lt;/P&gt;&lt;P&gt; nameif temporary&lt;/P&gt;&lt;P&gt; security-level 75&lt;/P&gt;&lt;P&gt; ip address 192.168.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt;Exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Sep 2010 03:24:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-virtual-lan/m-p/1529353#M696172</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-09-03T03:24:23Z</dc:date>
    </item>
  </channel>
</rss>

