<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cicsco ASA 5525 vlans in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cicsco-asa-5525-vlans/m-p/3759507#M8526</link>
    <description>Hi&lt;BR /&gt;By default the ASA will block pings,   you can use a inspect icmp global policy to allow pings through between different networks&lt;BR /&gt;Rob</description>
    <pubDate>Fri, 07 Dec 2018 10:26:15 GMT</pubDate>
    <dc:creator>shaps</dc:creator>
    <dc:date>2018-12-07T10:26:15Z</dc:date>
    <item>
      <title>Cicsco ASA 5525 vlans</title>
      <link>https://community.cisco.com/t5/network-security/cicsco-asa-5525-vlans/m-p/3759452#M8525</link>
      <description>&lt;P&gt;Dear all&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have issue between vlans. I created&amp;nbsp; 8 vlans by port-channel In Cisco&amp;nbsp; ASA 5525. I tried ping between two vlans but ping showed us "time out". Could you suggestion how to configure my asa than between two vlans is working .&lt;/P&gt;&lt;P&gt;Sorry&amp;nbsp; my bad english&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BR&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mirzo&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:32:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cicsco-asa-5525-vlans/m-p/3759452#M8525</guid>
      <dc:creator>Mirzo</dc:creator>
      <dc:date>2020-02-21T16:32:49Z</dc:date>
    </item>
    <item>
      <title>Re: Cicsco ASA 5525 vlans</title>
      <link>https://community.cisco.com/t5/network-security/cicsco-asa-5525-vlans/m-p/3759507#M8526</link>
      <description>Hi&lt;BR /&gt;By default the ASA will block pings,   you can use a inspect icmp global policy to allow pings through between different networks&lt;BR /&gt;Rob</description>
      <pubDate>Fri, 07 Dec 2018 10:26:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cicsco-asa-5525-vlans/m-p/3759507#M8526</guid>
      <dc:creator>shaps</dc:creator>
      <dc:date>2018-12-07T10:26:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cicsco ASA 5525 vlans</title>
      <link>https://community.cisco.com/t5/network-security/cicsco-asa-5525-vlans/m-p/3759508#M8527</link>
      <description>&lt;P&gt;Try this,&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa82/command/reference/cmd_ref/s1.html#wp1422126" target="_self"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa82/command/reference/cmd_ref/s1.html#wp1422126&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Dec 2018 10:30:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cicsco-asa-5525-vlans/m-p/3759508#M8527</guid>
      <dc:creator>Kasun Bandara</dc:creator>
      <dc:date>2018-12-07T10:30:05Z</dc:date>
    </item>
    <item>
      <title>Re: Cicsco ASA 5525 vlans</title>
      <link>https://community.cisco.com/t5/network-security/cicsco-asa-5525-vlans/m-p/3759509#M8528</link>
      <description>HI Shaps&lt;BR /&gt;&lt;BR /&gt;How to do it. Could send me the example.&lt;BR /&gt;&lt;BR /&gt;Thank you&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 07 Dec 2018 10:31:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cicsco-asa-5525-vlans/m-p/3759509#M8528</guid>
      <dc:creator>Mirzo</dc:creator>
      <dc:date>2018-12-07T10:31:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cicsco ASA 5525 vlans</title>
      <link>https://community.cisco.com/t5/network-security/cicsco-asa-5525-vlans/m-p/3759512#M8529</link>
      <description>&lt;P&gt;To ICMP inspection use below.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.speaknetworks.com/enable-icmp-inspection-to-allow-ping-traffic-passing-asa/" target="_self"&gt;https://www.speaknetworks.com/enable-icmp-inspection-to-allow-ping-traffic-passing-asa/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Dec 2018 10:36:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cicsco-asa-5525-vlans/m-p/3759512#M8529</guid>
      <dc:creator>Kasun Bandara</dc:creator>
      <dc:date>2018-12-07T10:36:26Z</dc:date>
    </item>
    <item>
      <title>Re: Cicsco ASA 5525 vlans</title>
      <link>https://community.cisco.com/t5/network-security/cicsco-asa-5525-vlans/m-p/3759513#M8530</link>
      <description>Hi Kasun Bandara&lt;BR /&gt;You see blow my config:&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address xxxx xxxx standby xxxxx&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;description LAN Failover Interface&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;channel-group 1 mode on&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;channel-group 1 mode on&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;channel-group 1 mode on&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;channel-group 1 mode on&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/6&lt;BR /&gt;channel-group 1 mode on&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/7&lt;BR /&gt;channel-group 1 mode on&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;management-only&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1&lt;BR /&gt;lacp max-bundle 8&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.10&lt;BR /&gt;vlan 10&lt;BR /&gt;nameif M&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.18.1.254 255.255.255.0 standby 172.18.1.253&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.20&lt;BR /&gt;vlan 20&lt;BR /&gt;nameif S&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.18.2.254 255.255.255.0 standby 172.18.2.253&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.30&lt;BR /&gt;vlan 30&lt;BR /&gt;nameif D&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.18.3.254 255.255.255.0 standby 172.18.3.253&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.40&lt;BR /&gt;vlan 40&lt;BR /&gt;nameif I&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.18.4.254 255.255.255.0 standby 172.18.4.253&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.50&lt;BR /&gt;vlan 50&lt;BR /&gt;nameif D&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.18.5.254 255.255.255.0 standby 172.18.5.253&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.60&lt;BR /&gt;vlan 60&lt;BR /&gt;nameif I&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.18.6.254 255.255.255.0 standby 172.18.6.253&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.70&lt;BR /&gt;vlan 70&lt;BR /&gt;nameif A&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.18.7.254 255.255.255.0 standby 172.18.7.253&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.80&lt;BR /&gt;vlan 80&lt;BR /&gt;nameif N&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.18.8.254 255.255.255.0 standby 172.18.8.253&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1.90&lt;BR /&gt;vlan 90&lt;BR /&gt;nameif I&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.18.9.254 255.255.255.0 standby 172.18.9.253&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone TJT 5&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network S&lt;BR /&gt;subnet 172.18.2.0 255.255.255.0&lt;BR /&gt;object network E&lt;BR /&gt;subnet 172.18.3.0 255.255.255.0&lt;BR /&gt;object network I&lt;BR /&gt;subnet 172.18.4.0 255.255.255.0&lt;BR /&gt;object network D&lt;BR /&gt;subnet 172.18.5.0 255.255.255.0&lt;BR /&gt;object network I&lt;BR /&gt;subnet 172.18.6.0 255.255.255.0&lt;BR /&gt;object network A&lt;BR /&gt;subnet 172.18.7.0 255.255.255.0&lt;BR /&gt;object network IN&lt;BR /&gt;subnet 172.18.8.0 255.255.255.0&lt;BR /&gt;object network N&lt;BR /&gt;subnet 172.18.9.0 255.255.255.0&lt;BR /&gt;object network M&lt;BR /&gt;subnet 172.18.1.0 255.255.255.0&lt;BR /&gt;access-list all extended permit ip any any&lt;BR /&gt;access-list icmp extended permit icmp any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging message 325007 level warnings&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;failover&lt;BR /&gt;failover lan unit primary&lt;BR /&gt;failover lan interface failover GigabitEthernet0/1&lt;BR /&gt;failover key *****&lt;BR /&gt;failover interface ip failover 10.50.50.1 255.255.255.252 standby 10.50.50.2&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 xxxx 1&lt;BR /&gt;</description>
      <pubDate>Fri, 07 Dec 2018 10:38:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cicsco-asa-5525-vlans/m-p/3759513#M8530</guid>
      <dc:creator>Mirzo</dc:creator>
      <dc:date>2018-12-07T10:38:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cicsco ASA 5525 vlans</title>
      <link>https://community.cisco.com/t5/network-security/cicsco-asa-5525-vlans/m-p/3759515#M8531</link>
      <description>&lt;P&gt;Try with below command&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;CODE&gt;policy-map global_policy
   class inspection_default
   inspect icmp&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;if you are using ASDM, go to service policy menu and edit global service policy to enable ICMP inspection&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Dec 2018 10:41:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cicsco-asa-5525-vlans/m-p/3759515#M8531</guid>
      <dc:creator>Kasun Bandara</dc:creator>
      <dc:date>2018-12-07T10:41:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cicsco ASA 5525 vlans</title>
      <link>https://community.cisco.com/t5/network-security/cicsco-asa-5525-vlans/m-p/3759523#M8532</link>
      <description>I done this steps. but it does not help me&lt;BR /&gt;&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect icmp&lt;BR /&gt;inspect icmp error&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_2&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection</description>
      <pubDate>Fri, 07 Dec 2018 10:50:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cicsco-asa-5525-vlans/m-p/3759523#M8532</guid>
      <dc:creator>Mirzo</dc:creator>
      <dc:date>2018-12-07T10:50:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cicsco ASA 5525 vlans</title>
      <link>https://community.cisco.com/t5/network-security/cicsco-asa-5525-vlans/m-p/3759524#M8533</link>
      <description>My PC ip is 172.18.2.25 I tried to ping GW 172.18.2.254 ping going on successfully. than i try to ping other GW 172.18.3.254 whom installed other vlans my ping is showed time out. i did't reach other vlans</description>
      <pubDate>Fri, 07 Dec 2018 10:55:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cicsco-asa-5525-vlans/m-p/3759524#M8533</guid>
      <dc:creator>Mirzo</dc:creator>
      <dc:date>2018-12-07T10:55:33Z</dc:date>
    </item>
    <item>
      <title>Re: Cicsco ASA 5525 vlans</title>
      <link>https://community.cisco.com/t5/network-security/cicsco-asa-5525-vlans/m-p/3759527#M8534</link>
      <description>It may be worth removing the ACLs and letting the security zones  do there thing,  failing that check the hit count on the ACL and or run a packet capture  and show all denied traffic,  something like&lt;BR /&gt;packet capture NAME type asp real-time drop type all&lt;BR /&gt;This should help see what is going on</description>
      <pubDate>Fri, 07 Dec 2018 11:11:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cicsco-asa-5525-vlans/m-p/3759527#M8534</guid>
      <dc:creator>shaps</dc:creator>
      <dc:date>2018-12-07T11:11:31Z</dc:date>
    </item>
  </channel>
</rss>

