i have represented a preview of my n/w in the attachment, i have about 10- 15 host connected to the L2 switches, The L3 switches will be the gateway, and they are configured for HSRP, i.e i'll have the gateway as the standby Ip configured Right???
Now i need to connect the two L3 switches to the ASA and route traffic for 192.168.0.0 n/w through the Asa, users from the 192.168.0.0 n/w will also access my servers in the 172.16.0.0 n/w, for that i can use nat ( inside, outside) 172.16.0.0 172.16.0.0 etc and do the jOb,
Now my doubt is,
I need to connect the 2 L3 switches to the ASA inside and i do not have another switch to place in between, i.e. i have to use two physical interface on the ASA as INSIDE, how is this possible
And will i use the same standy IP to route on the ASA for the traffic coming from the 192.168.0.0 N/w to the 172.16.0.0 n/w
you cannot create VLANS in CISco ASA 5510+ directly, VLANS are possible only on SUb interfaces, i already had this idea but, Vlans are available only on ASA5505 as it is switchport capable. the others just are not capanle of switching.
I need a help on configuring HSRP on SUP level on 2 of the 6513 switches. Can you help us to know how we can configure HSRP between two SUP32 or can you provide us a document that will help us to conigure it? Your reply on this will be really appreciated.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...