cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
611
Views
0
Helpful
3
Replies

Best configuration for this scenario?

ahughes
Level 1
Level 1

I'm fairly new at trying to create isolated network segments on Cisco switches. What i'm trying to do is have multiple isolated paths that originate from my vSphere infrastructure travel through a layer 2 link, vLAN, up to a MLS, and ultimately out to to the internet through a firewall. Each subnet might ultimately have a number of hosts on it, but I don't think the make up of those hosts will matter here.

My initial thought was creating vLAN tagged port groups on vSwitches on my vSphere infrastructure. Physical connections will go from my ESXi hosts to the 2900 series Cisco switch connected to trunk ports. Both vLANs would be configured on the switch but not assigned to physical ports. The physcial connection to the 3750 would also be a trunk port connection from the 2960. The 3750 would have SVI's created that are attached to VRFs that would control route traffic. This might be totally wrong but from what i've read it seems to be going down the correct path I think.

Two part question, is this the best way to go about designing this network? If so I seem to be really strugglying with the SVI/VRF part. Every time I create an SVI all of my hosts on the 10.10.10.x network can ping them, regardless of which vLAN they're on.

I just cannot seem to isolate the 172 network.

Crude drawing follows:

network.jpg

3 Replies 3

Giuseppe Larosa
Hall of Fame
Hall of Fame

Hello Adam,

for isolating some IP subnets from the other ones the right tool is VRF lite on C3750.

see

http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/12.2/25ew/configuration/guide/vrf.html

Each VRF lite can be formed by multiple Vlans and corresponding SVIs.

In your design each routing context / VRF should have a logical connection with the FW, so the inside interface of the FW should become a vlan tagged interface with a logical interface for each context / VRF.

In this way each VRF is isolated up to the FW. On the FW you can provide internet access to each VRF and if you like you can provide some level of inter VRF communication in a controlled way ( by stateful FW using FW ACLs).

Example:

ip vrf Workgroup

rd 1000:100

!

on all L3 interfaces belonging to the 172.0 address range do the following

interface Vlan X

ip vrf forwarding Workgroup

! now retype ip address and mask this is a needed step

ip address 172.x.y.z 255.255.255.K

create two vlans Z and W

vlan Z uses 10.0.0 0 address range and it is part of global routing table ( SVI Vlan Z)

vlan W is part of 172.0.0.0 range and it is part of VRF Workgroup (SVI Vlan W)

configure the physical port to FW as a layer 802.1Q trunk carrying Vlans Z,W

interface gix/y

switchport

switchport trunk enc dot1q

switchport mode trunk

switchport trunk allowed vlan Z.W

configure the FW to use vlan based subinterfaces with vlan tag Z and W

Hope to help

Giuseppe

I think I have achived my isolation. However I cannot seem to route traffic from my 172.16.0.x network to the default gateway,  10.0.0.2.

Hello Adam,

my suggestion included changes on the FW to offer a different gateway to the workgroup.

It is not clear how you achieved network isolation, if you used VRF lite you need a different logical interface on the FW as in VRF lite 10.0.0.2 is in another address space and it is not reachable anymore.

Hope to help

Giuseppe

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card