Pala I see where your coming from with checking the routing table in the firewall. I haven't trunked the switch to the firewall and I'm trying to avoid that. I want to keep it configured as an edge device. The BNS-MGMT vlan exists only as a "wan" vlan to my switch to provide Internet access to all other nodes on all vlan's. The BNS-Mgmt vlan also exists to contain my switch, the firewall, and later on additional switches. I'm having a hard time understanding how an untagged connection to my firewall will have dot1q info in my packet headers. The routing is to be done by the switch. Specifying mutiple vlan's over 1 interface would require a tagged connection between the firewall and switch and thus I'd be creating a router on a stick. I'm trying to avoid that sort of networking mishap. The switch should NAT all packets between vlan's before the firewall ever sees it. The firewall also is configured only to restrict inbound WAN traffic. For verification of my theory, I've taken an AP and configured a static IP for it on the BNS_Mgmt vlan (10.1.20.10). The AP is able to ping the all IPs on the 10.1.20.0 network. It can ping 10.1.30.1, but not the node on BNS-Net with an ip of 10.1.30.100.