Let's say I have the following configured on my ASA 5510:
ip address 192.168.1.1 255.255.255.0 standby 192.168.1.14
ip address 192.168.2.1 255.255.255.0 standby 192.168.2.2
As you can see the ASA has my users and servers are connected to vlan 2 and vlan 1 will be used for managing the routers, switches, and firewalls.
My question is the configuration for the firewall correct and what type of configuration would I need to do on the switch? whether i need to make the port on the switch as L3 which is connecting to inside interface of ASA.
Now whether we need a layer 2 switch or layer 3 switch well.... since your ASA has only one vlan to the inside interface..i think it would make do with a layer 2 interface and it would look at the mac addresses of the dest to transfer them accordingly
My plan is to add more vlan in the inside interface. I have L3 switch with 2 switches for redundancy. How to configure the switch and ASA inside interface for the traffic to flow for all vlans between. Whether i can enable HSRP on the two switches and configure the vlan as hsrp which will connect to inside interface of ASA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :