cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
5575
Views
25
Helpful
23
Replies

Using ASA-5510 to route VLAN WLAN connection

scottrhodes13a
Level 1
Level 1

Hi Everyone..

I am a complete newbie to Cisco equipment. So far I've been able to figure out how to do most of what I needed by using the ASDM but I have run into something that is a little more complicated that just opening a port.

We currently have a connection to our remote site. This site has a T1 internet connection. Our connection is a site to site VPN with an ASA-5510 on this end and a ASA-5505 on the other.

We are upgrading this connection to a 75mbit hybrid microwave/fiber link. The provider is going to hand it off to us as an untagged VLAN. We made the decision to route all of the remote site's internet access through this location as to avoid having to split off part of the bandwidth of this link to dedicate to internet access.

We also have an Enterasys B3 Layer 3 switch and on the test bench I believe I have successfully configured this switch to enable the VLANs to communicate with each other and allow the remote site internet access.

The main office uses ip schema 10.0/16 and the remote office uses 10.3/16

However, after giving this more thought, I believe that the ASA-5510 would be better suited to this task.

We have unused Ethernet ports on the device, so how would I configure the ASA to do this?

I am sure I would have to configure the unused port, along with VLAN config and some routing configuration, but I am completely ignorant on how to do this.

Thank You for any help,

Michael

3 Accepted Solutions

Accepted Solutions

Hello again,

The last image you included is the closest to what I would implement and what I tried to convey via the visio diagram I had attached with my previous post. The second image is much simpler, the only difference being that any broadcast traffic generated at the remote site would traverse the point-to-point link - dying at port1 on the Enterasys.

The 172.30.0.0/30 subnet would strictly be for the interfaces that either end of the point to point link are connected to. There is no particular reason I chose this subnet, you were already using 10.x.x.x ranges so throwing in a different IP scheme makes the addresses distinguishable.

You won't need to modify the client configurations at either site, just the configuration on the network equipment/routes, I included a sample IP configuration in the diagram below for a client at each site.

Scenario: (disregard reference to 172.30.0.1 being the Enterasys, I was too lazy to correct it)

On the ASA you would want to enter the following:

asa (config)# int vlan 300                                        //create vlan 300 (assuming vlan 300 is not in use already)

asa (config-if)# nameif point-to-point                         //name the zone/interface

asa (config-if)# security-level 100                              //assign security-level equal to "inside" vlan

asa (config-if)# ip add 172.30.0.1 255.255.255.252      //configure IP address

asa (config-if)# no shut                                             //bring VLAN up

asa (config-if)# int eth 2                                             //switch to interface config of interface connected to p2p link

asa (config-if)# switchport access vlan 300                  //associate with vlan 300

Return to global config mode:

asa (config)# same-security-traffic inter-interface     //permit interfaces with same security level to pass traffic

Add route for the remote network, next hop being 172.30.0.2 (2921)

asa (config)# route point-to-point 10.3.0.0 255.255.0.0 172.30.0.2

You may need to reconfigure your NAT statements (post the output of "sh run nat" from the 5510 for this).

On the 2921:

2921 (config)# int ge0/0                                                    //configure interface connected to point-to-point link

2921 (config-if)# ip add 172.30.0.2 255.255.255.252           //configure ip

2921 (config-if)# no shut                                                  //make sure the interface is up

Add default route so all traffic will get pushed over the point to point link:

2921 (config)#  ip route 0.0.0.0 0.0.0.0 172.30.0.1

Hope this helps.

View solution in original post

Michael,

The information regarding VLANs actually only pertains to the 5505 series as it uses VLANs to seperate zones, whereas the 5510 is port based. So - ignore the VLAN300 statement and just issue the commands on the next available interface. You should have one interface named "inside", one named "outside" and one named "point-to-point" (or whatever makes sense to you).

Should look something like this:

asa (config)# int eth 0/2                                      

asa (config-if)# nameif point-to-point                         //name the zone/interface

asa (config-if)# security-level 100                              //assign security-level equal to "inside" vlan

asa (config-if)# ip add 172.30.0.1 255.255.255.252      //configure IP address

asa (config-if)# no shut                                             //bring VLAN up

In regards to maintaining the VPN configuration until you are ready to cutover:

I would just configure the 5510 to allow management access from the point-to-point connection.

management-access point-to-point       

ssh 172.30.0.2 255.255.255.252           //assuming you use SSH to manage the device

The commands above should allow you to configure everything at the main site except for the default route you mentioned above. You can then go to the remote site, configure the equipment as necessary, remote into the 5510 at the main site via the point to point link and make the necessary routing changes and tear down the VPN.

Hope this helps.

P.S. - Please rate the posts if you feel they were helpful, it will help people facing a simliar issue identify the appropriate solution.

View solution in original post

Michael,

Sounds like you have an excellent handle on what you need to do.

Remote Office:

The base license on the 5505 permits 3 VLANs, one of which is restricted, meaning it can talk to one other VLAN but not both. In your case I'm not sure which is playing that role but by default VLAN1 is 'inside', VLAN2 is 'outside' and VLAN3 is 'dmz'. Based on the security levels you mentioned above it sounds like some of that got switched around for some reason, but that is ok!

If you issue a 'sh run int' you should see a line "no forward interface VLAN" on one of the interfaces, this is the line that dictates which interface for which this command is configured is not allowed to communicate with.

For example you might see "no forward interface VLAN12" under VLAN1 on the 5505 at your remote site, this would mean that VLAN1 is your restricted VLAN and that traffic generated on this interface/VLAN can only talk to VLAN2.

If you connected the point to point link to eth0/1, you would set the security-level to match the LAN:

     asa (config-if)# security-level 100

Reconfigure your restricted VLAN (VLAN1) so that it could pass traffic to VLAN12 rather than to VLAN2

     asa (config-if)#no forward interface VLAN2

Allow interfaces with the same-security level to talk to pass traffic between one another:

     asa (config)#same-security-traffic permit inter-interface

Then continue with the P2P addressing and routing we discussed in our previous posts.

Main Office:

Yes, you will need the "same-security-traffic permit inter-interface" commad on the 5510 as well - please be sure to set the security level of the P2P interface the same as the 'inside' interface.

Hope this helps!

View solution in original post

23 Replies 23

Mitchell Dyer
Level 1
Level 1

Hello Michael,

If I understand you correctly you have a point to point link between your main site and a remote site and are wanting to route internet traffic for the remote site through the main site utilizing the ASA. (please correct me if I'm wrong)

Depending on the type of point-to-point link (Layer-2 or Layer-3) it would be configured a little bit differently. If it is a layer-3 service your provider will probably assign you addresses to use. If it is a layer-2 service you can use anything that makes sense to you -- a /30 would be the obvious choice. I'm assuming it's a layer-2 service since you mentioned the provider is handing it off as an untagged VLAN.

On both the 5510 and the 5505 you'll want to configure an additional VLAN, the security-level and the IP address.

int vlan

     nameif point-to-point

     security-level

     ip address x.x.x.1 255.255.255.252

Then associate the VLAN with a physical interface (just like a switch).

int

     switchport access vlan

You will also want to enter the global config command to enable traffic between interfaces with the same security level.

same-security-traffic permit inter-interface

Then, add some routes:

Main Office: route point-to-point 10.3.0.0 255.255.0.0

Remote Office:

     route point-to-point 0.0.0.0 0.0.0.0

Some issues you might run into:

* Make sure your outbound NAT translation includes the remote offices network so your traffic originating from the site will get NAT'd out the WAN connection at the main site. (feel free to post questions if this doesn't make sense).

* If your 5505 is using the base license be careful with how the restricted VLAN is deployed as it can only 'talk to' one other VLAN, but not both. (i.e. if you had inside and outside, the restricted VLAN can either only exchange traffic with the inside VLAN or the outside VLAN, but not both without a manual configuration change).

I had a similar scenario with two 5505's on either end of a layer-2 point-to-point link, we opted for a site-to-site VPN across the point-to-point link as I wasn't overly trusting with the carrier providing the link.

Hope this helps, feel free to post questions for clarity.

Hi Mitchell,

Thank you for your reply..

You mostly have the gist of what I am trying to do, but let me clarify a few things.

Due to the insensitive nature of the data going between the two locations, I am not too worried about security of the connection. In addition, I would like to reduce the overhead by eliminating the VPN.

I believe the connection we are buying/using is a L2 link. We have the option of IP's if we want them, but in this situation I don't believe we need them. Essentially, the link is being handed off to us as an untagged VLAN connection - basically a 300 mile Ethernet cable.

If it weren't for the fact that this is a VLAN connection, I could just plug both ends into a switch on both sides, reconfigure the IP's and gateways on the remote side and be done with it since the remote location needs access to servers at this location.

But since this is a VLAN connection, I realize I will have to configure VLAN interfaces. I can do this with the Enterasys B3 layer 3 switch we have. I have already configured and tested the configuration on the switch. But as I stated, I believe the ASA may be better suited to the job.

Another thing that I forgot to mention is that the remote location also has a 2921 on site. We have dual T1 lines to the remote location. One provides POTS and one provides internet access.  I believe the router is there to service these T1 lines. Unfortunately I don't have any more information on what is there and why. I am new to this company and there isn't any documentation as to the network configuration at either location. I've figured out most of what is going on at this location simply because I am here.

Anyway, I am getting a little off track here. The idea I had was to keep it simple. Since we really don't need a site to site VPN connection, I believe we can eliminate the 5505 at the remote location, and possibly the 2921 depending on what it's being used for.

I envision one end of the VPN link going straight to the switch at the remote location, and one end going to the ASA-5510 at the main office. This way all I have to do is configure the 5510 and we're off to the races. Since there are no IT personnel at the remote location, I will have to get this side mostly set up, then go over there and complete the installation. So I am going to have to keep the transition as seamless as possible in order to reduce the down time as much as possible. I will be able to access the 5510 from the remote location.

But, I am certain you have far more experience than I at getting something like this up and running, so if I am off base, or what I am trying to do is not the best or correct way to do it, please let me know. I'm all ears. It is frustrating being so ignorant about Cisco equipment, but hey, we all had to start somewhere, right?

Thank You,

Michael

Any help here?

Thanks,

Michael

Hello Michael,

Sorry for the delayed response. So no need for the VPN across the point-to-point link - check.

I don't know what kind of timeframe you have to complete the work described above but for me - it's always a must to create a topology diagram, often times it is a lot easier to see where the problem/bottleneck lies simply by creating a document such as this. Also, it might help me assist you (I'm a visual kind of a guy). I took the liberty of creating a quick visio with what I think you have setup currently and what you are trying to accomplish.

 

To keep things simple, I would terminate the 75Mbit point to point link at the main site into one of the 5510 interfaces, and the other end in one of the 2921 Gig interfaces. Both the 2921 (http://www.cisco.com/web/partners/downloads/765/tools/quickreference/routerperformance.pdf) and the 5510 (http://www.cisco.com/en/US/prod/collateral/vpndevc/ps6032/ps6094/ps6120/product_data_sheet0900aecd802930c5.html) have the throughput to handle a point to point link of this speed. You would be able to phase out both the ASA5505 and the DS1 at the remote site.

Your previous comment regarding configuring one site then migrating the other site over is correct. You should be able to get everything setup at the main site without affecting existing traffic flow between sites and then travel to the remote site and complete the configuration of the remote site along with the final touches to get internet based traffic routed through the main site.

I think you might be overcomplicating the fact that the point to point link is a "VLAN" connection. Treat it just like you described, a 300 mi ethernet cable. The benefit of using layer 3 addresses at either end of the point to point link is to prevent unneccessary broadcast traffic from traveling over the link.

If you are concerned with throughput for inter-vlan routing at the main site (I don't know how many VLANs you have at the main site) then you would probably want to terminate the point-to-point link at the main site on the switch using a routed port or an unused VLAN, or whatever the equivalents are in Enterasys terms. Using an unused VLAN technically provides greater throughput but the link isn't fast enough to saturate a routed port anyhow so it would be irrelevant.

I'm not familiar with Enterasys (I'll be honest, I've never heard of the company) but to do this on a L3 Cisco switch:

Routed Port: (limited by the speed of the port)

     int gi 1/0/35 (assuming you are connecting the point to point link into port 35)

          no switchport

          ip add 172.30.0.1 255.255.255.252

VLAN: (limited by the speed of the backplane)

     int vlan 4000

          ip add 172.30.0.1 255.255.255.252

          no shut

     int gi 1/0/35 (assuming you are connecting the point to point link into port 35)

          switchport mode access vlan 4000

Hope this helps.

Hello Mitchell,

Thank you for your reply. I apologize for my impatience.

Your diagrams are mostly correct. I don't have Visio to use here, so I drew up my current configuration, the Enterasys B3 switch option and the 5510-2921 link options in Paint.

Below is the current set up. We currently do not have any VLANs configured at all. In reality, even counting both locations we are a fairly small network with approximately 100 workstations, laptops and servers. If you include printers, access points, switches, etc, we have approx 150 total devices on the LAN.

Now, I am not 100% sure of the set up on the remote side regarding the voice T1 line. I believe this is the way it is set up because otherwise I would have no idea why the 2921 was even there since the ASA-5505 should be able to handle the routing for the incoming data T1 line all by itself. However, I could be wrong. It certainly wouldn't be the first time.

Below is the first idea I had as far as keeping it simple. Although the Enterasys switch is routing at a layer 3 level, I believe you are correct in that this is essentially a layer 2 link. I also believe you are correct in that broadcast traffic will travel over the link. Bear in mind that I have already tested this configuration and it worked on my test bench. All I had to do in order to get it to work was to enable RIP on the ASA-5510 and it was working. As long as I configured the gateway IP on the PCs attached to the VLAN interfaces, then both VLANs could communicate freely back and forth - which is what I am after since both networks must share servers.

As a side note, I am aware that I could dedicate more of the B3 ports to VLAN 200 and use the secondary NIC cards in the servers for these ports. But I have no need at this point to keep the VLANs separate, although I know it is an option for the future if I find it necessary to do so.

Below is the second option I was thinking of. Again, I believe you are correct in stating this is a layer 3 link which would isolate the broadcast traffic. What I am confused about is the IP configuration. In your diagram, you have picked an IP of 172.30.0.0/30. I am confused as to why you would select this IP. Maybe I am not thinking about it correctly, but wouldn't the interface on both sides of the connection require it's own IP? To use the IP range you selected for example, wouldn't the Ethernet port on the 2921 need to be configured with let's say 172.30.0.10, and then the PCs on the 10.3.0.0/16 network would need 172.30.0.10 configured as a gateway? And vice-versa on the main site side. If the interface on the 5510 was configured as let's say 172.30.0.20 wouldn't the PCs on this side need their gateway set to 172.30.1.20? If so, this would cause Windows machines to complain about the gateway not being on the same subnet as defined by the IP address and subnet. This is why I set the IP's the way I did on the B3 switch experiment.

Am I missing something here?

Long story short, I am looking for the best overall way to set this up while still keeping it relatively simple and keeping the overhead on the link as low as possible.

I realize my inexperience with routing in general and setting up Cisco equipment is a huge handicap for me in this instance. I really appreciate the patience and the assistance. Step by step instructions are a HUGE help for me at this stage of my knowledge.

Thank you very much,

Michael

Hello again,

The last image you included is the closest to what I would implement and what I tried to convey via the visio diagram I had attached with my previous post. The second image is much simpler, the only difference being that any broadcast traffic generated at the remote site would traverse the point-to-point link - dying at port1 on the Enterasys.

The 172.30.0.0/30 subnet would strictly be for the interfaces that either end of the point to point link are connected to. There is no particular reason I chose this subnet, you were already using 10.x.x.x ranges so throwing in a different IP scheme makes the addresses distinguishable.

You won't need to modify the client configurations at either site, just the configuration on the network equipment/routes, I included a sample IP configuration in the diagram below for a client at each site.

Scenario: (disregard reference to 172.30.0.1 being the Enterasys, I was too lazy to correct it)

On the ASA you would want to enter the following:

asa (config)# int vlan 300                                        //create vlan 300 (assuming vlan 300 is not in use already)

asa (config-if)# nameif point-to-point                         //name the zone/interface

asa (config-if)# security-level 100                              //assign security-level equal to "inside" vlan

asa (config-if)# ip add 172.30.0.1 255.255.255.252      //configure IP address

asa (config-if)# no shut                                             //bring VLAN up

asa (config-if)# int eth 2                                             //switch to interface config of interface connected to p2p link

asa (config-if)# switchport access vlan 300                  //associate with vlan 300

Return to global config mode:

asa (config)# same-security-traffic inter-interface     //permit interfaces with same security level to pass traffic

Add route for the remote network, next hop being 172.30.0.2 (2921)

asa (config)# route point-to-point 10.3.0.0 255.255.0.0 172.30.0.2

You may need to reconfigure your NAT statements (post the output of "sh run nat" from the 5510 for this).

On the 2921:

2921 (config)# int ge0/0                                                    //configure interface connected to point-to-point link

2921 (config-if)# ip add 172.30.0.2 255.255.255.252           //configure ip

2921 (config-if)# no shut                                                  //make sure the interface is up

Add default route so all traffic will get pushed over the point to point link:

2921 (config)#  ip route 0.0.0.0 0.0.0.0 172.30.0.1

Hope this helps.

Hello Mitchell,

Ok, I think I now completely understand what you are explaining to me. Sorry for being so dense.

A couple of questions. In your instructions above, which interface should I be configuring vlan300 for? Inside? Or are these global commands?

Also, do you think it would be possible to set up everything on the main office side that needs to be set up before going to the remote site *without* breaking our current VPN connection? It would be far easier to be able to do that since once I start messing with the connection at the remote location I may lose connectivity to the 5510. Although I do plan to take a mobile hotspot with me so I have a backup connection.

The reason I ask is because it seems to be that once I add:

asa (config)# route point-to-point 10.3.0.0 255.255.0.0 172.30.0.2

to the ASA that it will begin to try to route all traffic for the 10.3.0.0/16 network over the point to point interface instead of the Outside interface.

And one last question. Assuming that I am incorrect about the 2921 handling the voice T1, wouldn't it also be possible to use the ASA-5505 instead of the 2921 to achieve the same result?

Thanks,

Michael

Michael,

The information regarding VLANs actually only pertains to the 5505 series as it uses VLANs to seperate zones, whereas the 5510 is port based. So - ignore the VLAN300 statement and just issue the commands on the next available interface. You should have one interface named "inside", one named "outside" and one named "point-to-point" (or whatever makes sense to you).

Should look something like this:

asa (config)# int eth 0/2                                      

asa (config-if)# nameif point-to-point                         //name the zone/interface

asa (config-if)# security-level 100                              //assign security-level equal to "inside" vlan

asa (config-if)# ip add 172.30.0.1 255.255.255.252      //configure IP address

asa (config-if)# no shut                                             //bring VLAN up

In regards to maintaining the VPN configuration until you are ready to cutover:

I would just configure the 5510 to allow management access from the point-to-point connection.

management-access point-to-point       

ssh 172.30.0.2 255.255.255.252           //assuming you use SSH to manage the device

The commands above should allow you to configure everything at the main site except for the default route you mentioned above. You can then go to the remote site, configure the equipment as necessary, remote into the 5510 at the main site via the point to point link and make the necessary routing changes and tear down the VPN.

Hope this helps.

P.S. - Please rate the posts if you feel they were helpful, it will help people facing a simliar issue identify the appropriate solution.

Mitchell,

Okay, thank you for that. I was a little confused by the references to VLAN on the 5510.

I think I have the information I need to get started on this project. This main office equipment has been installed. We are waiting on the remote site to get installed and for the provider to let us know that everything is ready to go..

I will come back and rate these posts after I get everything up and running. If I have more questions I'll post them.

Thanks again for all your help, I really appreciate your time.

Michael

Hi Mitchell..

Ok, I am back.. With more information.

I have pre-configured the ASA-5510 per your instructions. No problems except with the management access. I had to remove management access from the inside interface and reassign it to the point to point interface.

Our connection should be finished and handed off to us tomorrow, which means on Monday I will be at the remote location to do the set up.

I also found out that the Cisco 2921 does not have anything to do with the telephones over there. There is separate equipment for the voice T1. It turns out that the only reason the 2921 is there is to basically convert the T1 into Ethernet.

So that opens up the possibility of using the ASA-5505 instead of the 2921.

This unit has a base license though, so I understand that only 2 VLANs can communicate with each other using this license.

But, since I am going to be shutting down the internet connection there, couldn't I reconfigure it?

The current configuration is as follows:

eth 0/0: Outside, vlan2, Security level 0

eth 0/1: Management, vlan1, security level 50 (This seems to be set up as a DMZ?)

eth 0/2-0/7: Inside, vlan12, security level 100

So what I was thinking is if I reconfigured eth 0/0, set it's security level to 100, then used the same-security-traffic inter-interface command to allow traffic between vlan1 and vlan12.

If I am correct in my thinking, how would I go about doing this? I think I can figure it out by your instructions above, but I'd like to double check just to be on the safe side.

Oh, and one more thing. Do I need the same-security-traffic inter-interface command on the ASA5510 in the remote office also?

Thank You!

Michael

Michael,

Sounds like you have an excellent handle on what you need to do.

Remote Office:

The base license on the 5505 permits 3 VLANs, one of which is restricted, meaning it can talk to one other VLAN but not both. In your case I'm not sure which is playing that role but by default VLAN1 is 'inside', VLAN2 is 'outside' and VLAN3 is 'dmz'. Based on the security levels you mentioned above it sounds like some of that got switched around for some reason, but that is ok!

If you issue a 'sh run int' you should see a line "no forward interface VLAN" on one of the interfaces, this is the line that dictates which interface for which this command is configured is not allowed to communicate with.

For example you might see "no forward interface VLAN12" under VLAN1 on the 5505 at your remote site, this would mean that VLAN1 is your restricted VLAN and that traffic generated on this interface/VLAN can only talk to VLAN2.

If you connected the point to point link to eth0/1, you would set the security-level to match the LAN:

     asa (config-if)# security-level 100

Reconfigure your restricted VLAN (VLAN1) so that it could pass traffic to VLAN12 rather than to VLAN2

     asa (config-if)#no forward interface VLAN2

Allow interfaces with the same-security level to talk to pass traffic between one another:

     asa (config)#same-security-traffic permit inter-interface

Then continue with the P2P addressing and routing we discussed in our previous posts.

Main Office:

Yes, you will need the "same-security-traffic permit inter-interface" commad on the 5510 as well - please be sure to set the security level of the P2P interface the same as the 'inside' interface.

Hope this helps!


Hi Mitchell,

Yes, this helps a lot.

I had to re-read your post to understand what you are saying, but I got it now. My thought was to reconfigure the "outside" interfarec, but your suggestion is to reconfigure the "management" interface instead. Two different ways to achieve the same result.

I am nowhere near being an expert, but I think I am slowly starting to wrap my head around these devices and I am becoming slightly more comfortable with the CLI. Now if I just knew the commands and how to use them better I wouldn't feel as lost.

Thanks very much for the help.

Michael

Mitchell Dyer
Level 1
Level 1

Glad you've got your head around it.

Please rate if it was helpful so people know there is a solution in the topic somewhere.

Hi Mitchell...

Ok.. I am stuck now... I configured both devices, but I cannot get traffic to pass over the link. I have verified that the WAN link is working because I can manage the 5510 from the remote location. When I connect the 5505 to the link, I can ping the 5510 from inside the 5505. But that is all I can do.

The WAN interface on the 5510 side is named Mabton

The WAN interface on the 5505 side is named MountVernon

I configured the 5510 with:

#  route Mabton 10.3.0.0 255.255.0.0 172.30.0.2

I configured the 5505 with:

# route MountVernon 0.0.0.0 0.0.0.0 172.30.0.1

I tried some variables but nothing seems to work. I can paste my running config for you if you'd like.

I am hoping you are available since I am at the remote location and stuck.

Thanks,

Michael

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card