09-25-2008 09:43 PM - edited 03-11-2019 06:49 AM
Hi, Currently we have two sites which are connected via STS IP Sec Tunnel and using Cisco ASA 5505. By default three zones are created:-
1) DMZ
2) Inside
3) Outside
Inside and DMZ are a part of V-lan 1 and outside is V-lan2. We have make exempted rule for communication between Inside and DMZ and added other remote local network also.
Now we have decided to make seperate V-lans for Inside and DMZ of eack site. Just want to know do we need any additional change in the configuration for communication among V-lans locally and remotely. Thanks
Solved! Go to Solution.
09-26-2008 05:41 AM
this is 4 from me andrew :)
09-26-2008 05:46 AM
:o)
09-26-2008 06:21 AM
Can you explain both scenario, if possible. Thanks
09-26-2008 06:24 AM
Ray,
The solution is born from the problem.
What are you trying to do/what do you want to do - if you do not know this, there is no solution - I hope this is plain enough.
09-26-2008 05:19 PM
ok i will explain both :)
first one
lets say we have two internal vlans
vlan 10 10.1.1.0/24
vlan 20 20.1.1.0/24
and the scenario like
access_switch with two vlan 10,20---L3 switch---ASA--internet--
ok
now lets consider the first way which is intervaln on the switch
i will creat third valn for the port connected from L3 switch and ASA called vlan 50
and the ASA ip is 50.1.1.1
now on the access switchs only make L2 vlans like
vlan 10
vlan 20
and the link between L2 switch and L3 switch is trunk
on L3 switch we need to creat L2 and L3 vlans
like:
vlan 10
interface vlan 10
ip address 10.1.1.1 255.255.255.0
no shut
vlan 20
interface vlan 20
ip address 20.1.1.1 255.255.255.0
no shut
vlan 50
interface vlan 50
ip address 50.1.1.2 255.255.255.0
no shut
now enable ip routing on L3 switch
ip routing
now make the port with ASA as acces port and put it in valn 50
now creat a defualt route point to ASA inside IP
ip route 0.0.0.0 0.0.0.0 5.1.1.1
if u do show ip route
u will see all VLANs interfaces as directly connected and defualt static route to the ASA
on ASA u need two route for internal networks through vlan50 interface
like
route inside 10.1.1.0 255.255.255.0 50.1.1.2
route inside 20.1.1.0 255.255.255.0 50.1.1.2
route outisde 0.0.0.0 0.0.0.0 interface [outisde interface]
nat (inside) 1 0 0
global (outisde) 1 interface
the defualt gateway for hosts in vlan 10 wil be 10.1.1.1
in vlan 20 will be 20.1.1.1
OR...:
dont make the VLAN interface on the L3 switch only L2 vlans and on the switch creat trunk port to the ASA and on ASA creat two subinterfaces each one in corsponding vlan like vlan 10 and vlan 20 and the same IP addressing
or
on the L3 switch
create make two access ports each one in a vlan that u have like one 10 and the other 20
and connect the access ports to diffrent physical por on ASA
now each vlan has its own interface or subinterface
both works and in both ways each ASA interface will have IP in this case this IP will be the defual gateway for the hosts in the corsponding vlan
thus the communication will be through ASA
u need only the route be done on the ASA
as we have done above each netwrok through the right interface and good luck u need ACLs as well from lower security to hgiher security interface communications
if helpful Rate
09-26-2008 11:23 PM
Thank you so much!! I Appreciate for this gr8 answers. Still something want to ask :
1) Scenario 1 :- Why you didn't make a trunk port when you connected L3 Switch and ASA Int. As I know both tunnels traffic if goes from the one interface then we make Trunk.
2) Scenario 2 :- You made sub-interfaces on a switch, then which of the settings need to be done on ASA to communication between V-lans 10 or 20. And is it required to make any third V-lan on that interface where you created sub-interfaces. Please show one example if possible. Thanks
09-26-2008 11:57 PM
for ) Scenario 1 :
i made it as access port in diffrent vlan because here we are routing between vlans on the L3 switch and the communication will be between vlans on the L3 switch through thier SVIs and between vlans and the ASA through L3 vlan 50 SVI thrunk mean L2
by the way
u can make routed interface on the L3 switch between the switch and the ASA onstead of vlan 50 and the port will be exactly like u have a router connected to the ASA and u can keep the same defualt route that point to the ASA inside interface this is another way
and about the 2) Scenario 2:
here u can make the switch port trunk dot1q and on the ASA creat subinterfaces one in vlan 10 with it is own IP address in vlan 10 IP range and the same idea for vlan 20
on ASA will lokks like u have inside1 and inside2
or u can make two access port on L3 switch each one in the corsponding vlan and this way u will need two physical interfaces on the ASA each one in the corsponding vlan IP range
on ASA will be the same idea u will see two interfaces like inside1 and inside2 or u may name it like inside and dmz
here the switch pass L2 only if vlan 10 wanna talk to vlan 20 need to send traffic to the ASA and ASA will route the traffic and u can control the traffic using nat or ACLs
good luck
if helpful Rate
u
09-27-2008 12:32 AM
WOW!!! Outstanding!!!
My all confusion part now has been cleaned. I am very much impressed with your response. Thank you so much once again.
between vlans and the ASA through L3 vlan 50 SVI thrunk mean L2 : Can you explain in more details.
2)what SVI stands?
Thanks
09-27-2008 12:38 AM
SVI means switch virtual interface
like
interface vlan 10
ip address x.x.x.x
i meant if u have SVIs the communication will be through the L3 switch between vlans
and traffic from those vlans to outside will be through ASA
host in vlan 10 will sent packet to it is defualt gateway IP which is vlan 10 SVI on L3 switch
we have routing enabled and we have defualt route point to ASA IP which is in vlan 50 then the L3 will route the traffic to vlan 50 then ASA inside interface
hope this helpful
if helpful Rate
09-27-2008 12:51 AM
Now my all points are cleared. Thank you once again!!
09-27-2008 01:52 AM
Another Question : Suppose we have created three V-lans on L3 switch like:
1) Int e0/0 Vlan10 10.0.0.1
2) Int e0/0 Vlan20 20.0.0.2
3) Int e0/3 Vkan30 30.0.0.3
4) Int e0/4--connected---Trunk---L2---nd configured three same above Vlan. Then what wud be the gateway of L2 hosts? As I think the gateway wud be the int IP of L3 V-lans IP. Am I right? Thanks!!!!
09-27-2008 01:55 AM
first u r right :)
but here
1) Int e0/0 Vlan10 10.0.0.1
2) Int e0/0 Vlan20 20.0.0.2
3) Int e0/3 Vkan30 30.0.0.3
why u have SVI and physical interface what did u mean in this ?
09-27-2008 02:02 AM
Generally I was asking... But in the right way we shd reserve one interface for all V-lans on L3 and create sub-interfaces for V-lans. Right?
09-27-2008 02:11 AM
nooo this idea with router on stick
now we are talking about multilyaer switch doning intervlan routing
u need uplink trun from L2 switch to pass all vlan tags
in the L3 switch u need the same L2 vlans created and layer 3 vlan interfaces as well which is the SVI for each vlan and this SVI as mentioned before will be the default gateway for hosots in that vlan
and then u need to enable ip routign on the L3 switch
and if u have other L3 switches have other vlans and SVIs u my use routign protocol like RIR EIGRP to route between L3 switches like u have routers and u can get big L2/L3 switchedd and routed network
hope this helpful
09-27-2008 07:36 PM
Can we make sub interfaces on L3 Switch like as in ASA. Thanks!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide