<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5505 help in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-help/m-p/888572#M973237</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is what I would do. I would permit same-security interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By default, interfaces on the same security level cannot communicate with each other. Allowing&lt;/P&gt;&lt;P&gt;communication between same security interfaces lets traffic flow freely between all same security&lt;/P&gt;&lt;P&gt;interfaces without access lists.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you enable same security interface communication, you can still configure interfaces at different&lt;/P&gt;&lt;P&gt;security levels as usual.&lt;/P&gt;&lt;P&gt;To enable interfaces on the same security level so that they can communicate with each other, enter the&lt;/P&gt;&lt;P&gt;following command:&lt;/P&gt;&lt;P&gt;hostname(config)# same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;To disable this setting, use the no form of this command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then create an ACL to allow traffic from your host on one network to the printer, storage, etc on the other.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list extended inside1_to_inside2 permit tcp 192.168.2.0 255.255.255.0 host 192.168.3.5 eq 9100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Don't forget to apply the ACL to the interface and in the right direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group inside1_to_inside2 in interface inside1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 24 Oct 2007 12:23:48 GMT</pubDate>
    <dc:creator>Collin Clark</dc:creator>
    <dc:date>2007-10-24T12:23:48Z</dc:date>
    <item>
      <title>ASA 5505 help</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-help/m-p/888567#M973232</link>
      <description>&lt;P&gt;hi guys.&lt;/P&gt;&lt;P&gt;i would like to know how to provide access from all my vlans that reside on my asa 5505 to certain network resources, such as mail server,file srv, network printers....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my network layout is as follows:&lt;/P&gt;&lt;P&gt;2811=&amp;gt;ASA5505=&amp;gt;CATALYST Express 500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the 2811 only connects to the internet, and with static nat, gives everything that comes to my public ip to its inside fa0/0. the asa then does everything else. all the vlans reside on the asa5505, and all the routing and natting happens on the asa5505.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have enabled the inter and intra-vlan routing, but no success.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;example:&lt;/P&gt;&lt;P&gt;i want a client that reside on vlan2 with an ip of 192.168.2.5 and default gateway 192.168.2.1 (asa5505) to be able to access a printer on 192.168.3.11(vlan3) and a client on 192.168.3.23(vlan3) to be able to access the mail server on 192.168.2.2(vlan2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please Help?!?!?!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:29:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-help/m-p/888567#M973232</guid>
      <dc:creator>konstaninosoregano</dc:creator>
      <dc:date>2019-03-11T11:29:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 help</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-help/m-p/888568#M973233</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How many VLANs do you have? Do you want everything to communicate between the VLANs or just somethings like printing?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Oct 2007 15:19:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-help/m-p/888568#M973233</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2007-10-23T15:19:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 help</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-help/m-p/888569#M973234</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i have 3 vlans.&lt;/P&gt;&lt;P&gt;i dont want everything to communicate amongst eachother in the vlans.&lt;/P&gt;&lt;P&gt;i want all users from all vlans to be able to have access to my mailserver,to network printers, and a network storage.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Oct 2007 15:22:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-help/m-p/888569#M973234</guid>
      <dc:creator>konstaninosoregano</dc:creator>
      <dc:date>2007-10-23T15:22:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 help</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-help/m-p/888570#M973235</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You'll need to look at doing same security interfaces or NAT, along with ACLs. You need to document IPs, ports, and protocols for communications between systems. Once that is done you can start to make configuration changes.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Oct 2007 15:36:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-help/m-p/888570#M973235</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2007-10-23T15:36:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 help</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-help/m-p/888571#M973236</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i already have all of this documented.&lt;/P&gt;&lt;P&gt;what type of config changes do i need to make?&lt;/P&gt;&lt;P&gt;when you say protocols, you mean smtp,http etc,dns etc??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my server resides at 192.168.2.2&lt;/P&gt;&lt;P&gt;my network printer is 192.168.3.11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i need users from all vlans to be able to access the above mentioned network resources.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i am posting my asa 5505 config so you can better understand, so you could perhaps help me better!thank you!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Oct 2007 15:48:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-help/m-p/888571#M973236</guid>
      <dc:creator>konstaninosoregano</dc:creator>
      <dc:date>2007-10-23T15:48:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 help</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-help/m-p/888572#M973237</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is what I would do. I would permit same-security interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By default, interfaces on the same security level cannot communicate with each other. Allowing&lt;/P&gt;&lt;P&gt;communication between same security interfaces lets traffic flow freely between all same security&lt;/P&gt;&lt;P&gt;interfaces without access lists.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you enable same security interface communication, you can still configure interfaces at different&lt;/P&gt;&lt;P&gt;security levels as usual.&lt;/P&gt;&lt;P&gt;To enable interfaces on the same security level so that they can communicate with each other, enter the&lt;/P&gt;&lt;P&gt;following command:&lt;/P&gt;&lt;P&gt;hostname(config)# same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;To disable this setting, use the no form of this command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then create an ACL to allow traffic from your host on one network to the printer, storage, etc on the other.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list extended inside1_to_inside2 permit tcp 192.168.2.0 255.255.255.0 host 192.168.3.5 eq 9100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Don't forget to apply the ACL to the interface and in the right direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group inside1_to_inside2 in interface inside1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Oct 2007 12:23:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-help/m-p/888572#M973237</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2007-10-24T12:23:48Z</dc:date>
    </item>
  </channel>
</rss>

