09-06-2015 03:42 PM - edited 03-11-2019 11:33 PM
I have a ASA 5505 with Security Plus license running IOS 9.0(2). I need to print from computers on one VLAN to a printer on a different VLAN. Both VLANs are configured on the same ASA. The VLAN network I need to print from is also configured on an Aironet WiFi access point. This VLAN is a guest wireless. The VLAN with the printer I need to print to is the inside VLAN. I would like to only allow access to the printer.
09-06-2015 03:50 PM
On the ACL that you have configured on the guest-interface, there you have to allow the communication to the printer with the relevant ports for your printer (could be tcp/515 and/or tcp/9100).
09-06-2015 05:18 PM
09-07-2015 04:50 AM
You are right, your guests already have full access to your internal network. But as you write that you only want to allow traffic to the printer, that's probably not what you wanted. To change that you have to replace the second line in the "Outbound-Guest" ACL with specific permit entries.
But again, printing should work with this config.
Although one problem could be caused by your NAT-config. You can replace the line
nat (inside,any) source static any any destination static obj-172.16.1.0 obj-172.16.1.0 no-proxy-arp
by
nat (inside,outside) source static any any destination static obj-172.16.1.0 obj-172.16.1.0 no-proxy-arp route-lookup
If you only test with PING, then you should make ICMP statefully inspected:
policy-map global_policy class inspection_default inspect icmp
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide