<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Problem with VLANs and NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/problem-with-vlans-and-nat/m-p/1194974#M876561</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Milan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA should just have a static route for 192.168.10.0/24 to the router interface connected to the 192.168.12.0/25 network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The router should have a default route pointing to the ASA for all traffic NOT in it's local routing table, 192.168.12.0/24 &amp;amp; 192.168.10.0/24 will be connected - the router is the device that will route between the 2 subnets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ALL machines on the 192.168.12.0/24 should have a default gateway of the router.  ALL machines on the 192.166.10.0/24 should have a default gateway of the router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you just configure the nat statements in the PIX so the internal subnets 192.168.12.0/24 &amp;amp; 192.168.10.0/24 can browse the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The router should be used as the primary layer 3 device to route traffic between 192.168.12.0/24 &amp;lt;&amp;gt; 192.168.10.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 12 Feb 2009 14:32:01 GMT</pubDate>
    <dc:creator>andrew.prince</dc:creator>
    <dc:date>2009-02-12T14:32:01Z</dc:date>
    <item>
      <title>Problem with VLANs and NAT</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-vlans-and-nat/m-p/1194969#M876551</link>
      <description>&lt;P&gt;I am using ASA5510 with outside interface connected to Internet over PPPoE, inside for HQ LAN and one more interface connected to remote office. Traffic to remote office should be tagged with certain VLAN tag. Remote location should access HQ LAN and also access Internet thrugh this ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The current configuration allows both LANs (HQ and remote office) to access Internet over outside, but the traffic between LANs is not possible. At the moment the global command is executed, there is no traffic between HQ LAN (192.168.5.0) and remote LAN (192.168.10.0).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I ping the remote LAN from the ASA,  ping is working. If I make a ping but from inside interface, ping is not working. If I ping from remote LAN to tehc subinterface addresse 192.168.12.1, ping is working. It seems like NAT disabled the traffic between remote LAN and HQ LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any advice? I need ping working between remote LAN and HQ LAN, as well as other ip traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.0(3) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname fwvodabd1&lt;/P&gt;&lt;P&gt;enable password ********* encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; pppoe client vpdn group pppoegrp&lt;/P&gt;&lt;P&gt; ip address pppoe setroute &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.5.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2.1&lt;/P&gt;&lt;P&gt; vlan 3101&lt;/P&gt;&lt;P&gt; nameif tehc&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.12.1 255.255.255.252 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd ********* encrypted&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu tehc 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-603.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (tehc) 1 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;route tehc 192.168.10.0 255.255.255.0 192.168.12.2 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;no crypto isakmp nat-traversal&lt;/P&gt;&lt;P&gt;telnet 192.168.10.0 255.255.255.0 tehc&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;vpdn group pppoegrp request dialout pppoe&lt;/P&gt;&lt;P&gt;vpdn group pppoegrp localname *********&lt;/P&gt;&lt;P&gt;vpdn group pppoegrp ppp authentication pap&lt;/P&gt;&lt;P&gt;vpdn username vodovodb1 password ********* &lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;  inspect ftp &lt;/P&gt;&lt;P&gt;  inspect h323 h225 &lt;/P&gt;&lt;P&gt;  inspect h323 ras &lt;/P&gt;&lt;P&gt;  inspect rsh &lt;/P&gt;&lt;P&gt;  inspect rtsp &lt;/P&gt;&lt;P&gt;  inspect esmtp &lt;/P&gt;&lt;P&gt;  inspect sqlnet &lt;/P&gt;&lt;P&gt;  inspect skinny  &lt;/P&gt;&lt;P&gt;  inspect sunrpc &lt;/P&gt;&lt;P&gt;  inspect xdmcp &lt;/P&gt;&lt;P&gt;  inspect sip  &lt;/P&gt;&lt;P&gt;  inspect netbios &lt;/P&gt;&lt;P&gt;  inspect tftp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:d60f6017f39aa6a81a30902aa39ed0e6&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;fwvodabd1(config)# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:49:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-vlans-and-nat/m-p/1194969#M876551</guid>
      <dc:creator>milan.markovic</dc:creator>
      <dc:date>2019-03-11T14:49:21Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VLANs and NAT</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-vlans-and-nat/m-p/1194970#M876554</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Questions:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) What device is 192.168.12.2 1?&lt;/P&gt;&lt;P&gt;2) Is your layer 2 device configured with the correct vlans?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Feb 2009 13:26:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-vlans-and-nat/m-p/1194970#M876554</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2009-02-12T13:26:04Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VLANs and NAT</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-vlans-and-nat/m-p/1194971#M876556</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi milan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You definitely need 3 things in order for this to work:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1- On the ASA, you need to exclude traffic between the HQ and the Remote office from NATing (NAT exclude also called NAT zero):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside-NAT-Exclude line 1 permit ip 192.168.5.0 255.255.255.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside-NAT-Exclude&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2- Allow icmp echo and echo reply on the ACLs relying between the inside and tech interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3- a static route on the layer 3 device (192.168.12.2):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 192.168.5.0 255.255.255.0 192.168.12.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers and good luck&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Feb 2009 13:47:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-vlans-and-nat/m-p/1194971#M876556</guid>
      <dc:creator>Mo'ath Al Rawashdeh</dc:creator>
      <dc:date>2009-02-12T13:47:27Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VLANs and NAT</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-vlans-and-nat/m-p/1194972#M876557</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tried what you suggested, but there is no traffic between inside and tehc interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The tehc interface is connected with one Sarian router, and remote LAN is at the other Sarian's router interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Without any nat and/or global command in ASA configuration, traffic (and ping) between local and remote LAN is going well, but none of the LAN can reach the Internet.&lt;/P&gt;&lt;P&gt;When I add nat/global commands, to allow Internet traffic, both LANs can reach internet over outside interface, but then there is no traffic inbetween local and remote LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I can debug traffic on remote Sarian router, I can see that I can ping 192.168.12.2 from ASA tehc interface, but cannot from ASA inside interface. At the moment when I ping from inside LAN, there is no traffic registered on remote Sarian router. It really seems that NAT excemption should help, but I tried with your suggestion and other similar possibilities, without any help. All the time, there is traffic to outside, but no intertraffic between inside LAN and LAN behind tehc interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any debug method (seems that ASA does not support some NAT debugging technics that are present on Cisco routers)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Feb 2009 14:25:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-vlans-and-nat/m-p/1194972#M876557</guid>
      <dc:creator>milan.markovic</dc:creator>
      <dc:date>2009-02-12T14:25:29Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VLANs and NAT</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-vlans-and-nat/m-p/1194973#M876559</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you decrease the security level (to 90 or less) for interface Ethernet0/2.1 and try NAT exclude?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Feb 2009 14:28:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-vlans-and-nat/m-p/1194973#M876559</guid>
      <dc:creator>Mo'ath Al Rawashdeh</dc:creator>
      <dc:date>2009-02-12T14:28:29Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VLANs and NAT</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-vlans-and-nat/m-p/1194974#M876561</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Milan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA should just have a static route for 192.168.10.0/24 to the router interface connected to the 192.168.12.0/25 network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The router should have a default route pointing to the ASA for all traffic NOT in it's local routing table, 192.168.12.0/24 &amp;amp; 192.168.10.0/24 will be connected - the router is the device that will route between the 2 subnets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ALL machines on the 192.168.12.0/24 should have a default gateway of the router.  ALL machines on the 192.166.10.0/24 should have a default gateway of the router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you just configure the nat statements in the PIX so the internal subnets 192.168.12.0/24 &amp;amp; 192.168.10.0/24 can browse the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The router should be used as the primary layer 3 device to route traffic between 192.168.12.0/24 &amp;lt;&amp;gt; 192.168.10.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Feb 2009 14:32:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-vlans-and-nat/m-p/1194974#M876561</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2009-02-12T14:32:01Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VLANs and NAT</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-vlans-and-nat/m-p/1194975#M876564</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When I decreased sec level of tehc interface to 90, I was able to reach remote LAN from local (inside) LAN. Access from remote LAN to local LAN is not allowed (probably due to decreased sec level on tehc interface). Of course, all that together with nat exclude commands you suggested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any advice how to allow traffic from remote LAN to local LAN, not loosing the internet traffic from both LANs?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And some more help with icmp access-lists, to allow pinging between LANs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks anyway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Feb 2009 14:53:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-vlans-and-nat/m-p/1194975#M876564</guid>
      <dc:creator>milan.markovic</dc:creator>
      <dc:date>2009-02-12T14:53:33Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VLANs and NAT</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-vlans-and-nat/m-p/1194976#M876565</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Traffic from lower security level to higher security level is denied by default. What is needed in this case is an inbound access list on the tehc interface allowing this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list tehc-inbound line 1 extended permit ip 192.168.10.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-group tehc-inbound in interface tehc &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please rate once your issue is solved &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Feb 2009 15:00:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-vlans-and-nat/m-p/1194976#M876565</guid>
      <dc:creator>Mo'ath Al Rawashdeh</dc:creator>
      <dc:date>2009-02-12T15:00:01Z</dc:date>
    </item>
  </channel>
</rss>

