<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Access ASDM from a different vlan and interface than the management in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-asdm-from-a-different-vlan-and-interface-than-the/m-p/1319912#M786713</link>
    <description>&lt;P&gt;Hello everybody,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am a new user of an ASA5510 using ASA version 8.0 and ASDM 6.0(2)&lt;/P&gt;&lt;P&gt;That firewall is used to be the central part of a network be multiple inside VLANs and Internet connection.&lt;/P&gt;&lt;P&gt;So my firewall is directly connected to a switch 3750 and couple of other swicthes are connected to that first switch.&lt;/P&gt;&lt;P&gt;At the moment, in order to connect to ASDM I have on cable in trunk between eth1 of the firewall and eth0/1 of my switch (so set as trunk line) and one cable between the management interface and eth0/48 of my switch on a specific VLAN (VLAN 69 on my switch which is just for the management interface). At the moment it is the only workaround I have found to connect to that ASDM. So basically I have one comnputer on the network on VLAN69 from which I can get the ASDM working. But all my switch have are on Vlan 1 for management purpose, so I need another computer on vlan 1 to manage my switches.&lt;/P&gt;&lt;P&gt;I am almost sure that there is a way to be able from Vlan1 to access to ASDM but I don't find how.&lt;/P&gt;&lt;P&gt;Here is my configuration of the ASA5510 :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.0(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname AFAW001&lt;/P&gt;&lt;P&gt;domain-name test.COM&lt;/P&gt;&lt;P&gt;enable password xxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 10.3.72.10 Switch01&lt;/P&gt;&lt;P&gt;....&lt;/P&gt;&lt;P&gt;name 10.3.72.37 AdminPC&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif Internet&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 62.xxx.xxx.x81 255.255.255.xxx&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif Inside_Network&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.1&lt;/P&gt;&lt;P&gt; vlan 1&lt;/P&gt;&lt;P&gt; nameif VLAN_Admin&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.3.72.1 255.255.255.128&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.3.74.241 255.255.255.240&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd h83ErV7OnuCAO8TG encrypted&lt;/P&gt;&lt;P&gt;boot system disk0:/asa802-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EEST 2&lt;/P&gt;&lt;P&gt;clock summer-time EEDT recurring last Sun Mar 3:00 last Sun Oct 4:00&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name test.COM&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;mtu Internet 1500&lt;/P&gt;&lt;P&gt;mtu Inside_Network 1500&lt;/P&gt;&lt;P&gt;mtu VLAN_Admin 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-602.bin&lt;/P&gt;&lt;P&gt;asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (Internet) 101 interface&lt;/P&gt;&lt;P&gt;nat (management) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (VLAN_Admin) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;route Internet 0.0.0.0 0.0.0.0 62.xxx.xxx.x81 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.3.72.0 255.255.255.128 VLAN_Admin&lt;/P&gt;&lt;P&gt;http 10.3.74.240 255.255.255.240 management&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;no crypto isakmp nat-traversal&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 10.3.74.242 255.255.255.255 management&lt;/P&gt;&lt;P&gt;ssh 10.3.72.37 255.255.255.255 VLAN_Admin&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 10.3.74.242-10.3.74.254 management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;  inspect ftp&lt;/P&gt;&lt;P&gt;  inspect h323 h225&lt;/P&gt;&lt;P&gt;  inspect h323 ras&lt;/P&gt;&lt;P&gt;  inspect rsh&lt;/P&gt;&lt;P&gt;  inspect rtsp&lt;/P&gt;&lt;P&gt;  inspect esmtp&lt;/P&gt;&lt;P&gt;  inspect sqlnet&lt;/P&gt;&lt;P&gt;  inspect skinny&lt;/P&gt;&lt;P&gt;  inspect sunrpc&lt;/P&gt;&lt;P&gt;  inspect xdmcp&lt;/P&gt;&lt;P&gt;  inspect sip&lt;/P&gt;&lt;P&gt;  inspect netbios&lt;/P&gt;&lt;P&gt;  inspect tftp&lt;/P&gt;&lt;P&gt;  inspect pptp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:b71e78a98adb84b4f0a5d544be20e21c&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your help&lt;/P&gt;&lt;P&gt;JB&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 16:32:35 GMT</pubDate>
    <dc:creator>billetj01</dc:creator>
    <dc:date>2019-03-11T16:32:35Z</dc:date>
    <item>
      <title>Access ASDM from a different vlan and interface than the management</title>
      <link>https://community.cisco.com/t5/network-security/access-asdm-from-a-different-vlan-and-interface-than-the/m-p/1319912#M786713</link>
      <description>&lt;P&gt;Hello everybody,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am a new user of an ASA5510 using ASA version 8.0 and ASDM 6.0(2)&lt;/P&gt;&lt;P&gt;That firewall is used to be the central part of a network be multiple inside VLANs and Internet connection.&lt;/P&gt;&lt;P&gt;So my firewall is directly connected to a switch 3750 and couple of other swicthes are connected to that first switch.&lt;/P&gt;&lt;P&gt;At the moment, in order to connect to ASDM I have on cable in trunk between eth1 of the firewall and eth0/1 of my switch (so set as trunk line) and one cable between the management interface and eth0/48 of my switch on a specific VLAN (VLAN 69 on my switch which is just for the management interface). At the moment it is the only workaround I have found to connect to that ASDM. So basically I have one comnputer on the network on VLAN69 from which I can get the ASDM working. But all my switch have are on Vlan 1 for management purpose, so I need another computer on vlan 1 to manage my switches.&lt;/P&gt;&lt;P&gt;I am almost sure that there is a way to be able from Vlan1 to access to ASDM but I don't find how.&lt;/P&gt;&lt;P&gt;Here is my configuration of the ASA5510 :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.0(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname AFAW001&lt;/P&gt;&lt;P&gt;domain-name test.COM&lt;/P&gt;&lt;P&gt;enable password xxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 10.3.72.10 Switch01&lt;/P&gt;&lt;P&gt;....&lt;/P&gt;&lt;P&gt;name 10.3.72.37 AdminPC&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif Internet&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 62.xxx.xxx.x81 255.255.255.xxx&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif Inside_Network&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.1&lt;/P&gt;&lt;P&gt; vlan 1&lt;/P&gt;&lt;P&gt; nameif VLAN_Admin&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.3.72.1 255.255.255.128&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.3.74.241 255.255.255.240&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd h83ErV7OnuCAO8TG encrypted&lt;/P&gt;&lt;P&gt;boot system disk0:/asa802-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EEST 2&lt;/P&gt;&lt;P&gt;clock summer-time EEDT recurring last Sun Mar 3:00 last Sun Oct 4:00&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name test.COM&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;mtu Internet 1500&lt;/P&gt;&lt;P&gt;mtu Inside_Network 1500&lt;/P&gt;&lt;P&gt;mtu VLAN_Admin 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-602.bin&lt;/P&gt;&lt;P&gt;asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (Internet) 101 interface&lt;/P&gt;&lt;P&gt;nat (management) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (VLAN_Admin) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;route Internet 0.0.0.0 0.0.0.0 62.xxx.xxx.x81 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.3.72.0 255.255.255.128 VLAN_Admin&lt;/P&gt;&lt;P&gt;http 10.3.74.240 255.255.255.240 management&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;no crypto isakmp nat-traversal&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 10.3.74.242 255.255.255.255 management&lt;/P&gt;&lt;P&gt;ssh 10.3.72.37 255.255.255.255 VLAN_Admin&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 10.3.74.242-10.3.74.254 management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;  inspect ftp&lt;/P&gt;&lt;P&gt;  inspect h323 h225&lt;/P&gt;&lt;P&gt;  inspect h323 ras&lt;/P&gt;&lt;P&gt;  inspect rsh&lt;/P&gt;&lt;P&gt;  inspect rtsp&lt;/P&gt;&lt;P&gt;  inspect esmtp&lt;/P&gt;&lt;P&gt;  inspect sqlnet&lt;/P&gt;&lt;P&gt;  inspect skinny&lt;/P&gt;&lt;P&gt;  inspect sunrpc&lt;/P&gt;&lt;P&gt;  inspect xdmcp&lt;/P&gt;&lt;P&gt;  inspect sip&lt;/P&gt;&lt;P&gt;  inspect netbios&lt;/P&gt;&lt;P&gt;  inspect tftp&lt;/P&gt;&lt;P&gt;  inspect pptp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:b71e78a98adb84b4f0a5d544be20e21c&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your help&lt;/P&gt;&lt;P&gt;JB&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:32:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-asdm-from-a-different-vlan-and-interface-than-the/m-p/1319912#M786713</guid>
      <dc:creator>billetj01</dc:creator>
      <dc:date>2019-03-11T16:32:35Z</dc:date>
    </item>
    <item>
      <title>Re: Access ASDM from a different vlan and interface than the man</title>
      <link>https://community.cisco.com/t5/network-security/access-asdm-from-a-different-vlan-and-interface-than-the/m-p/1319913#M786714</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;JB-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you required to trunk? There is only one VLAN on it, so for simplicity sake, you make want to remove the trunk and have it connect as an access port. Under interface Ethernet0/1 you should remove the security level. Other than that your config looks good. When on VLAN1, can you SSH into the ASA? Ping it? Anything in the log?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Oct 2009 14:18:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-asdm-from-a-different-vlan-and-interface-than-the/m-p/1319913#M786714</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-10-28T14:18:26Z</dc:date>
    </item>
    <item>
      <title>Re: Access ASDM from a different vlan and interface than the man</title>
      <link>https://community.cisco.com/t5/network-security/access-asdm-from-a-different-vlan-and-interface-than-the/m-p/1319914#M786715</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry, I have forgot to let some "..." to show where I have cut in my config. I have about 20 vlans in my configuration with dhcp enable and NAT. All the VLAN I have hidden are subcontractors which are sharing the same internet access. So I need that trunk.&lt;/P&gt;&lt;P&gt;When I am on VLAN1 at the moment I can not do anything to the ASA, no ping, no ssh, nothing.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Oct 2009 16:51:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-asdm-from-a-different-vlan-and-interface-than-the/m-p/1319914#M786715</guid>
      <dc:creator>billetj01</dc:creator>
      <dc:date>2009-10-28T16:51:23Z</dc:date>
    </item>
    <item>
      <title>Re: Access ASDM from a different vlan and interface than the man</title>
      <link>https://community.cisco.com/t5/network-security/access-asdm-from-a-different-vlan-and-interface-than-the/m-p/1319915#M786716</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you see your IP in the ARP table of the ASA?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Oct 2009 18:30:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-asdm-from-a-different-vlan-and-interface-than-the/m-p/1319915#M786716</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-10-28T18:30:34Z</dc:date>
    </item>
    <item>
      <title>Re: Access ASDM from a different vlan and interface than the man</title>
      <link>https://community.cisco.com/t5/network-security/access-asdm-from-a-different-vlan-and-interface-than-the/m-p/1319916#M786717</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Intersting, it is not in the ARP table of the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the actual config of the ASA :&lt;/P&gt;&lt;P&gt;*****************************&lt;/P&gt;&lt;P&gt;ASA Version 8.0(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname AFAW001&lt;/P&gt;&lt;P&gt;domain-name test.COM&lt;/P&gt;&lt;P&gt;enable password h83ErV7OnuCAO8TG encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif Internet&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 62.xxx.xxx.x82 255.255.255.xxx&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif Inside_Network&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.1&lt;/P&gt;&lt;P&gt; vlan 1&lt;/P&gt;&lt;P&gt; nameif VLAN_Admin&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.3.72.1 255.255.255.128&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.10&lt;/P&gt;&lt;P&gt; vlan 10&lt;/P&gt;&lt;P&gt; nameif VLAN_Visitor&lt;/P&gt;&lt;P&gt; security-level 30&lt;/P&gt;&lt;P&gt; ip address 10.3.72.129 255.255.255.128&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;...... (VLANs)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.3.74.241 255.255.255.240&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd xxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;boot system disk0:/asa802-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EEST 2&lt;/P&gt;&lt;P&gt;clock summer-time EEDT recurring last Sun Mar 3:00 last Sun Oct 4:00&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name OL3.AREVA.COM&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;mtu Internet 1500&lt;/P&gt;&lt;P&gt;mtu Inside_Network 1500&lt;/P&gt;&lt;P&gt;mtu VLAN_Admin 1500&lt;/P&gt;&lt;P&gt;.....&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-602.bin&lt;/P&gt;&lt;P&gt;asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (Internet) 101 interface&lt;/P&gt;&lt;P&gt;nat (management) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (VLAN_Admin) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (VLAN_Visitor) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;.....&lt;/P&gt;&lt;P&gt;route Internet 0.0.0.0 0.0.0.0 62.xxx.xxx.x81 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.3.72.0 255.255.255.128 VLAN_Admin&lt;/P&gt;&lt;P&gt;http 10.3.74.240 255.255.255.240 management&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;no crypto isakmp nat-traversal&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 10.3.74.242 255.255.255.255 management&lt;/P&gt;&lt;P&gt;ssh 10.3.72.37 255.255.255.255 VLAN_Admin&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 10.3.74.242-10.3.74.254 management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 10.3.72.130-10.3.72.254 VLAN_Visitor&lt;/P&gt;&lt;P&gt;dhcpd dns 212.86.0.5 212.86.0.6 interface VLAN_Visitor&lt;/P&gt;&lt;P&gt;dhcpd enable VLAN_Visitor&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;....&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;  inspect ftp&lt;/P&gt;&lt;P&gt;  inspect h323 h225&lt;/P&gt;&lt;P&gt;  inspect h323 ras&lt;/P&gt;&lt;P&gt;  inspect rsh&lt;/P&gt;&lt;P&gt;  inspect rtsp&lt;/P&gt;&lt;P&gt;  inspect esmtp&lt;/P&gt;&lt;P&gt;  inspect sqlnet&lt;/P&gt;&lt;P&gt;  inspect skinny&lt;/P&gt;&lt;P&gt;  inspect sunrpc&lt;/P&gt;&lt;P&gt;  inspect xdmcp&lt;/P&gt;&lt;P&gt;  inspect sip&lt;/P&gt;&lt;P&gt;  inspect netbios&lt;/P&gt;&lt;P&gt;  inspect tftp&lt;/P&gt;&lt;P&gt;  inspect pptp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:2aa198c41a4b426d33a3d4fd097818c2&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;********************&lt;/P&gt;&lt;P&gt;and the result of show route on the ASA :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gateway of last resort is 62.xxx.xxx.x81 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;C    10.3.72.0 255.255.255.128 is directly connected, VLAN_Admin&lt;/P&gt;&lt;P&gt;C    10.3.74.240 255.255.255.240 is directly connected, management&lt;/P&gt;&lt;P&gt;....&lt;/P&gt;&lt;P&gt;C    10.3.72.128 255.255.255.128 is directly connected, VLAN_Visitor&lt;/P&gt;&lt;P&gt;C    62.xxx.xxx.x80 255.255.255.xxx is directly connected, Internet&lt;/P&gt;&lt;P&gt;S*   0.0.0.0 0.0.0.0 [1/0] via 62.xxx.xxx.x81, Internet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Oct 2009 08:07:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-asdm-from-a-different-vlan-and-interface-than-the/m-p/1319916#M786717</guid>
      <dc:creator>billetj01</dc:creator>
      <dc:date>2009-10-29T08:07:07Z</dc:date>
    </item>
    <item>
      <title>Re: Access ASDM from a different vlan and interface than the man</title>
      <link>https://community.cisco.com/t5/network-security/access-asdm-from-a-different-vlan-and-interface-than-the/m-p/1319917#M786718</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you don't see your MAC in the ARP table, there is a layer1/2 problem. You'll need to make sure your PC has the correct IP address (10.3.72.x), your in the correct VLAN (1), and the VLAN is on the trunk. Also you may want to remove the nameif on the main interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;no nameif Inside_Network &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;I&gt;If you use subinterfaces, you typically do not also want the physical interface to pass traffic, because the physical interface passes untagged packets. This property is also true for the active physical interface in a redundant interface pair. Because the physical or redundant interface must be enabled for the subinterface to pass traffic, ensure that the physical or redundant interface does not pass traffic by leaving out the nameif command. If you want to let the physical or redundant interface pass untagged packets, you can configure the nameif command as usual.&lt;/I&gt; The firewall could be moving the packets to the wrong interface because the main interface and E0/1.1 are both processing vlan 1 packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa81/config/guide/intrface.html#wp1044006" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa81/config/guide/intrface.html#wp1044006&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Oct 2009 14:15:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-asdm-from-a-different-vlan-and-interface-than-the/m-p/1319917#M786718</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-10-29T14:15:38Z</dc:date>
    </item>
    <item>
      <title>Re: Access ASDM from a different vlan and interface than the man</title>
      <link>https://community.cisco.com/t5/network-security/access-asdm-from-a-different-vlan-and-interface-than-the/m-p/1319918#M786719</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Status :&lt;/P&gt;&lt;P&gt;******&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;*******&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IP address of the computer in VLAN Admin correct :10.3.72.37 255.255.255.128 GW 10.3.72.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And maybe could help the config of the 1st switch : &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;version 12.2&lt;/P&gt;&lt;P&gt;no service pad&lt;/P&gt;&lt;P&gt;service timestamps debug uptime&lt;/P&gt;&lt;P&gt;service timestamps log uptime&lt;/P&gt;&lt;P&gt;no service password-encryption&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ASWE0001&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;enable secret 5 xxxxx&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;username root privilege 15 password 7 xxxxx&lt;/P&gt;&lt;P&gt;no aaa new-model&lt;/P&gt;&lt;P&gt;clock timezone CST -2&lt;/P&gt;&lt;P&gt;clock summer-time HEL recurring&lt;/P&gt;&lt;P&gt;switch 1 provision ws-c3750-48ts&lt;/P&gt;&lt;P&gt;no ip subnet-zero&lt;/P&gt;&lt;P&gt;no ip source-route&lt;/P&gt;&lt;P&gt;no ip domain-lookup&lt;/P&gt;&lt;P&gt;ip domain-name xxxxx&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;errdisable recovery cause psecure-violation&lt;/P&gt;&lt;P&gt;errdisable recovery interval 120&lt;/P&gt;&lt;P&gt;no file verify auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;spanning-tree mode rapid-pvst&lt;/P&gt;&lt;P&gt;no spanning-tree optimize bpdu transmission&lt;/P&gt;&lt;P&gt;spanning-tree extend system-id&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;vlan internal allocation policy ascending&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet1/0/1&lt;/P&gt;&lt;P&gt; description linktoFirewall&lt;/P&gt;&lt;P&gt; switchport trunk encapsulation dot1q&lt;/P&gt;&lt;P&gt; switchport mode trunk&lt;/P&gt;&lt;P&gt; udld port aggressive&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet1/0/2&lt;/P&gt;&lt;P&gt; description To S&lt;/P&gt;&lt;P&gt; switchport access vlan xx&lt;/P&gt;&lt;P&gt; switchport mode access&lt;/P&gt;&lt;P&gt; no mdix auto&lt;/P&gt;&lt;P&gt; no cdp enable&lt;/P&gt;&lt;P&gt; spanning-tree portfast&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;.....&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/0/1&lt;/P&gt;&lt;P&gt; description LinkToBuilding C&lt;/P&gt;&lt;P&gt; switchport trunk encapsulation dot1q&lt;/P&gt;&lt;P&gt; switchport mode trunk&lt;/P&gt;&lt;P&gt; udld port aggressive&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/0/2&lt;/P&gt;&lt;P&gt; description LinktoBuilding F&lt;/P&gt;&lt;P&gt; switchport trunk encapsulation dot1q&lt;/P&gt;&lt;P&gt; switchport mode trunk&lt;/P&gt;&lt;P&gt; udld port aggressive&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/0/3&lt;/P&gt;&lt;P&gt; description LinkToBuilding B&lt;/P&gt;&lt;P&gt; switchport trunk encapsulation dot1q&lt;/P&gt;&lt;P&gt; switchport mode trunk&lt;/P&gt;&lt;P&gt; udld port aggressive&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/0/4&lt;/P&gt;&lt;P&gt; description LinkToBuilding Q&lt;/P&gt;&lt;P&gt; switchport trunk encapsulation dot1q&lt;/P&gt;&lt;P&gt; switchport mode trunk&lt;/P&gt;&lt;P&gt; udld port aggressive&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; ip address 10.3.72.10 255.255.255.128&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip default-gateway 10.3.72.1&lt;/P&gt;&lt;P&gt;ip classless&lt;/P&gt;&lt;P&gt;no ip http server&lt;/P&gt;&lt;P&gt;ip http authentication local&lt;/P&gt;&lt;P&gt;no ip http secure-server&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list 99 permit any log&lt;/P&gt;&lt;P&gt;snmp-server community public RO&lt;/P&gt;&lt;P&gt;snmp-server community SubC RW&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;control-plane&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;alias exec sis sh inter status&lt;/P&gt;&lt;P&gt;alias exec s sh ru&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; logging synchronous&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; access-class 99 in&lt;/P&gt;&lt;P&gt; exec-timeout 0 0&lt;/P&gt;&lt;P&gt; logging synchronous&lt;/P&gt;&lt;P&gt; login local&lt;/P&gt;&lt;P&gt; transport input ssh&lt;/P&gt;&lt;P&gt;line vty 5 15&lt;/P&gt;&lt;P&gt; no login&lt;/P&gt;&lt;P&gt; no exec&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;P&gt;*******&lt;/P&gt;&lt;P&gt;So far no communictaion and still nothing in the ARP table, not even the switches. Really strange.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Oct 2009 12:53:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-asdm-from-a-different-vlan-and-interface-than-the/m-p/1319918#M786719</guid>
      <dc:creator>billetj01</dc:creator>
      <dc:date>2009-10-30T12:53:58Z</dc:date>
    </item>
    <item>
      <title>Re: Access ASDM from a different vlan and interface than the man</title>
      <link>https://community.cisco.com/t5/network-security/access-asdm-from-a-different-vlan-and-interface-than-the/m-p/1319919#M786720</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is strange. Can you do a show interface trunk and make sure VLAN 1 is on it? In the ASA do you see the MAC/IP in the ARP table? You may have to ping the switch from the ASA first.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Oct 2009 14:42:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-asdm-from-a-different-vlan-and-interface-than-the/m-p/1319919#M786720</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-10-30T14:42:06Z</dc:date>
    </item>
    <item>
      <title>Re: Access ASDM from a different vlan and interface than the man</title>
      <link>https://community.cisco.com/t5/network-security/access-asdm-from-a-different-vlan-and-interface-than-the/m-p/1319920#M786721</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry for the delayed answer.&lt;/P&gt;&lt;P&gt;So on the switch, here is the answer from show interface trunk :&lt;/P&gt;&lt;P&gt;******************************&lt;/P&gt;&lt;P&gt;show interfaces trunk&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Port        Mode         Encapsulation  Status        Native vlan&lt;/P&gt;&lt;P&gt;Fa1/0/1     on           802.1q         trunking      1&lt;/P&gt;&lt;P&gt;Gi1/0/1     on           802.1q         trunking      1&lt;/P&gt;&lt;P&gt;Gi1/0/2     on           802.1q         trunking      1&lt;/P&gt;&lt;P&gt;Gi1/0/3     on           802.1q         trunking      1&lt;/P&gt;&lt;P&gt;Gi1/0/4     on           802.1q         trunking      1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Port        Vlans allowed on trunk&lt;/P&gt;&lt;P&gt;Fa1/0/1     1-4094&lt;/P&gt;&lt;P&gt;Gi1/0/1     1-4094&lt;/P&gt;&lt;P&gt;Gi1/0/2     1-4094&lt;/P&gt;&lt;P&gt;Gi1/0/3     1-4094&lt;/P&gt;&lt;P&gt;Gi1/0/4     1-4094&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Port        Vlans allowed and active in management domain&lt;/P&gt;&lt;P&gt;Fa1/0/1     1,4,10,30-47,50,69,371-372&lt;/P&gt;&lt;P&gt;Gi1/0/1     1,4,10,30-47,50,69,371-372&lt;/P&gt;&lt;P&gt;Gi1/0/2     1,4,10,30-47,50,69,371-372&lt;/P&gt;&lt;P&gt;Gi1/0/3     1,4,10,30-47,50,69,371-372&lt;/P&gt;&lt;P&gt;Gi1/0/4     1,4,10,30-47,50,69,371-372&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Port        Vlans in spanning tree forwarding state and not pruned&lt;/P&gt;&lt;P&gt;Fa1/0/1     1,4,10,30-47,50,69,371-372&lt;/P&gt;&lt;P&gt;Gi1/0/1     1,4,10,30-47,50,69,371-372&lt;/P&gt;&lt;P&gt;Gi1/0/2     1,4,10,30-47,50,69,371-372&lt;/P&gt;&lt;P&gt;Gi1/0/3     1,4,10,30-47,50,69,371-372&lt;/P&gt;&lt;P&gt;Gi1/0/4     1,4,10,30-47,50,69,371-372&lt;/P&gt;&lt;P&gt;***************************&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And still no ARP table entries for the switches. i've tried to put it as a static arp but nothing better.&lt;/P&gt;&lt;P&gt;If I remember, when There was a name on the main interface (Inside) I had the switch entries but tagged as being from the global interface, not the VLAN_Admin interface. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Nov 2009 13:51:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-asdm-from-a-different-vlan-and-interface-than-the/m-p/1319920#M786721</guid>
      <dc:creator>billetj01</dc:creator>
      <dc:date>2009-11-10T13:51:11Z</dc:date>
    </item>
    <item>
      <title>Re: Access ASDM from a different vlan and interface than the man</title>
      <link>https://community.cisco.com/t5/network-security/access-asdm-from-a-different-vlan-and-interface-than-the/m-p/1319921#M786722</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you see the MAC address of the PC on the switch port it is connected too? Can post the results?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show mac address-table interface fastEthernet 0/1&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Nov 2009 22:30:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-asdm-from-a-different-vlan-and-interface-than-the/m-p/1319921#M786722</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-11-10T22:30:33Z</dc:date>
    </item>
    <item>
      <title>Re: Access ASDM from a different vlan and interface than the man</title>
      <link>https://community.cisco.com/t5/network-security/access-asdm-from-a-different-vlan-and-interface-than-the/m-p/1319922#M786723</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, result of the command on the switch port where my PC on VLAN_Admin is connected :&lt;/P&gt;&lt;P&gt;*****************&lt;/P&gt;&lt;P&gt;show mac address-table interface fastEthernet 0/1&lt;/P&gt;&lt;P&gt;          Mac Address Table&lt;/P&gt;&lt;P&gt;-------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vlan    Mac Address       Type        Ports&lt;/P&gt;&lt;P&gt;----    -----------       --------    -----&lt;/P&gt;&lt;P&gt;   1    0012.7959.716e    DYNAMIC     Fa0/1&lt;/P&gt;&lt;P&gt;Total Mac Addresses for this criterion: 1&lt;/P&gt;&lt;P&gt;*********************&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the same switch, I have the PC which is on the management VLAN, and that one appears in the ASA arp Table.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Nov 2009 06:26:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-asdm-from-a-different-vlan-and-interface-than-the/m-p/1319922#M786723</guid>
      <dc:creator>billetj01</dc:creator>
      <dc:date>2009-11-11T06:26:47Z</dc:date>
    </item>
    <item>
      <title>Re: Access ASDM from a different vlan and interface than the man</title>
      <link>https://community.cisco.com/t5/network-security/access-asdm-from-a-different-vlan-and-interface-than-the/m-p/1319923#M786724</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great. Looking at the management protocols you have configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;http 10.3.72.0 255.255.255.128 VLAN_Admin&lt;/P&gt;&lt;P&gt;ssh 10.3.72.37 255.255.255.255 VLAN_Admin &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is your IP in this range? Do you use SSH or ASDM?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Nov 2009 14:56:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-asdm-from-a-different-vlan-and-interface-than-the/m-p/1319923#M786724</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-11-11T14:56:44Z</dc:date>
    </item>
    <item>
      <title>Re: Access ASDM from a different vlan and interface than the man</title>
      <link>https://community.cisco.com/t5/network-security/access-asdm-from-a-different-vlan-and-interface-than-the/m-p/1319924#M786725</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The IP address of the computer on the VLAN_Admin is 10.3.72.37, mask 255.255.255.128, GW 10.3.72.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At the moment I am trying with ssh, faster to test. Then if I succeed to have the ssh traffic going across, I think the https will be easy for ASDM.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Nov 2009 07:36:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-asdm-from-a-different-vlan-and-interface-than-the/m-p/1319924#M786725</guid>
      <dc:creator>billetj01</dc:creator>
      <dc:date>2009-11-12T07:36:13Z</dc:date>
    </item>
  </channel>
</rss>

