If you want the traffic between thos vlans to be inspected by the FWSM( which i don't recomend) you will have to create a vlan interface for each vlan in the FWSM with security levels and the appropiate rules. The way I'll do it will be creating a SVI for each vlan in the MFSC with a default route point to the inside interface ip address of the FWSM.
If you create a vlan interface for every vlan in the FWSM using the same security levels on every interface and use the same-security-traffic permit inter-interface command you still have to create rules for every vlan interface in the FWSM to allow the traffic between the vlan's.
Another disadvantage is that if you use FWSM to do all the routing for your vlan's the Bandwidth and packets per seconds it's degraded from 32-720Gbps to 5.5Gbps and 15-400Mpps to 2.8Mpps. If you really need to use a firewall between every vlan then do it that way.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...