Today i use Cisco 2811 router for inter-vlan routing.
I must a lot of time add or modify Access-list for policy routing.
Ant it is not very easy with CLI command
I want change this router with ASA Firewall for inter vlan routing.
It is better to manage Access-list with ASDM interface. But i have this problem :
Each Sub Interface is configure with the VLAN id.
But Firewall use different security level for this interface. And if i want establish routing between Lower security level interface to higher security level interface i must create A static Nat for each IP address.
Does anyone know if it is possible to doing routing inter-vlan without using Static nat, but only access-list like a router
If you require NAT then you will have to use static NAT for traffic flows from low to high security level interfaces. If you do not require NAT then you could turn off NAT with the command no nat-control. Then global/nat and or static NAT is not required. With NAT Control off you can still use access lists to control which traffic is allowed in or out per interface.
Question We run asr9001 with XR 6.1.3, and we have a very long delay to
login w/ SSH 1 or 2 to the device compare to IOS device. After
investigation, the there is 1s delay between the client KEXDH_INIT and
the server (XR) KEXDH_REPLY. After debug ssh serv...
Introduction The purpose of this document is to demonstrate the Open
Shortest Path First (OSPF) behavior when the V-bit (Virtual-link bit) is
present in a non-backbone area. The V-bit is signaled in Type-1 LSA only
if the router is the endpoint of one or ...
Hi, I am seeing quite a few issues with patch install and wanted to
share my experience and workaround to this. Login to admin via CLI, then
access root with the “shell” command Issue “df –h” and you’ll probably
see the following directory full or nearly ...