cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
589
Views
0
Helpful
3
Replies

CAS in DMZ

Pete89
Level 2
Level 2

Hello,

I am looking to set up an IN-Band Virtual Gateway in Central Deployment where my CAS in the DMZ and my CAM is in the LAN. Here is a drawing of the setup:

http://www.flickr.com/photos/31154535@N07/4274326599/sizes/o/

Right now I only have eth0 of the CAS plugged into DMZ switch 1.  Eth0 has its default gateway set to the SVI of VLAN 710.

All I want to do at this point is add the CAS to the CAM but I am unable to do this. During the perfigo setup I assigned both interfaces the same IP and did not enable anything else like Management VLAN or VLAN tagging. My TAC guy tells me I cant add the second NIC until I have it in the CAM.

I created ACLs for CAS CAM communication as well.

But something is wrong. When I do a TCPdump on the eth0 interface while I try to add the CAS to the CAM I don’t even see packets getting there.

What am I doing wrong? Doesnt the FW need to see the CAS as a L2 device before we can get anywhere with this? Because right now the CAS is not even in the ARP table of the ASA.

Thanks,

Pedro

3 Replies 3

Faisal Sehbai
Level 7
Level 7

Pedro,

From the CAS console, can you ping the default gateway? If yes, can you ping the ASA? If yes, the CAM?

If no to any of these, where's the traffic blocked? If no to the first question, then you have basic connectivity issues to resolve first.

HTH,

Faisal

Hey Faisal,

From the CAS I can ping the SVI of the L3 VLAN for the trusted interface (vlan710 in the picture), but I cannot ping the ASA. The subinterface on the ASA is on VLAN 709 which is what the documentation calls for i.e. that the untrusted interface of the CAS and the FW need to be on the same L2 vlan.

Is that correct?

Here is some routing information:

From the DMZ switch where the CAS is dual homed:

Gateway of last resort is 192.168.10.1 to network 0.0.0.0
     192.168.10.0/25 is subnetted, 1 subnets
C       192.168.10.0 is directly connected, Vlan1
     10.0.0.0/28 is subnetted, 1 subnets
C       10.1.7.96 is directly connected, Vlan710
S*   0.0.0.0/0 [1/0] via 192.168.10.1

I want to mention that this switch has a trunked port to the failover FW.

From the other DMZ switch (in the picture you can see that there are two DMZ switches that are trunked together and running VTP transparent).

Gateway of last resort is 192.168.10.1 to network 0.0.0.0
     192.168.10.0/25 is subnetted, 1 subnets
C       192.168.10.0 is directly connected, Vlan1
S*   0.0.0.0/0 [1/0] via 192.168.10.1

I will also mention that this switch has a trunked port to the active FW.

Now from the FW:

sh route | inclu 10.1.7

C    10.1.7.8 255.255.255.248 is directly connected, NAC_homeagents_vlan702

C    10.1.7.96 255.255.255.240 is directly connected, NAC_homeagents_vlan709

I dont know if this is a L3 problem or not, because it seems to me that the FW needs to see the CAS as a L2 device no?

Thanks,

Pete

Documenting the solution for this issue for other potential designs.

If you're doing VPN with CAS in-line in a VGW setup, you have to make sure that the CAS's trusted side through which CAS/CAM communication flows doesn't go through the same ASA. If they are going through the same ASA, it will have problems identifying which VLAN to send the manamgement traffic through and cause an unnecessarily complex  and potentially impossible design. You might be able to make it work with RIP, but that again would be a pretty complex design with possible PBRs involved.

HTH,

Faisal

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: