I just want the 3rd vlan to be this small network for the 2 exchange servers 2nd nic. They will only talk to each other on this vlan....would that work on this ASA?
Hmm, I added an onterface to this vlan. It now says staus up, but when I ping the ip of the vlan interface all I get back is ????? from the ping. And this is from inside the asa.
jbell72
ASKER
How do I determine if I have a basic license or not?
Run sh ver command in CLI or in License tab of Device information in ASDM
jbell72
ASKER
OK, 1 more time so I am clear.
!
interface Vlan1
nameif inside
security-level 100
ip address 192.168.50.1 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
ip address 10.1.10.11 255.255.255.0
!
interface Vlan3
no forward interface Vlan1
no nameif
security-level 100
ip address 192.168.60.1 255.255.255.0
So from inisde my asa I ping 192.168.60.1 (VLAN 3 IP) and I get back
ping 192.168.60.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.60.1, timeout is 2 seconds:
?????
Success rate is 0 percent (0/5)
So that is usposed to happen? I cannot ping internally from asa to vlan3?
Svet Paperov
Correct. That's the limitation of Base license - you can access outside from the DMZ (your VLAN 3) but you cannot access inside interface. To lift that limitation you need security plus licence
Where can I buy and download the security plus license?
Svet Paperov
Any Cisco dealer, depending on your location. The licence is just an activation key that you will have to enter on the firewall.
Benjamin Van Ditmars
With the asa5505 with a basic os you can make a thrid vlan, that has access to the LAN or WAN interface. but not both. this is the ristricted DMZ but if you need 2 exchange servers to talk to the other why not create a vlan on a swicht ?. this is much cheaper