<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Two BVI in one Cisco ACE context in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/two-bvi-in-one-cisco-ace-context/m-p/1969431#M37589</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is applying the service-policy to VLAN21 the only way to have it work or&amp;nbsp; will the traffic passing (bridged) through BVI20 upto FWSM and routed&amp;nbsp; down to VLAN10 to hit the service-policy work also? I ask as we've been&amp;nbsp; unable to get this second option, and the way I'd prefer it to work,&amp;nbsp; working?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ideally it should work that way as well. The idea is the packet should reach the ACE on VLAN 10. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the FWSM is able to NAT it and forward to ACE it should work. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;few things to check. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Check if the packet is going to FWSM or not. Access list or capture on firewall will show it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Check if FWSM is natting the packet to VIP ip or not? ( Check if NAT is configured for that subnet range) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;If the packet is getting natted and reaching ACE it should work. &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards, &lt;/P&gt;&lt;P&gt;Ajay Kumar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 11 Jun 2012 09:34:17 GMT</pubDate>
    <dc:creator>ajayku2</dc:creator>
    <dc:date>2012-06-11T09:34:17Z</dc:date>
    <item>
      <title>Two BVI in one Cisco ACE context</title>
      <link>https://community.cisco.com/t5/application-networking/two-bvi-in-one-cisco-ace-context/m-p/1969420#M37578</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would someone please confirm to me that it's possible to create two BVI in the same context? Also that in order for something in BVI 10 to connect to a VIP in BVI 20 it needs to pass through the upstream FWSM?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;interface vlan 10&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; description Web Production DMZ Client-side&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; bridge-group 10&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; mac-sticky enable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; access-group input ACL_BPDUAllow&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; access-group input ACL_ALLIP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; access-group output ACL_ALLIP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; service-policy input PM_MGT_ICMP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; service-policy input PM_WEB&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;interface vlan 11&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; description Web Production DMZ Server-side&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; bridge-group 10&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; mac-sticky enable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; access-group input ACL_BPDUAllow&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; access-group input ACL_ALLIP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; access-group output ACL_ALLIP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; service-policy input PM_MGT_ICMP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;interface vlan 20&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; description App Production Zone Client-side&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; bridge-group 20&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; mac-sticky enable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; access-group input ACL_BPDUAllow&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; access-group input ACL_ALLIP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; access-group output ACL_ALLIP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; service-policy input PM_MGT_ICMP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; service-policy input PM_APP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;interface vlan 21&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; description App Production Zone Server-side&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; bridge-group 20&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; mac-sticky enable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; access-group input ACL_BPDUAllow&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; access-group input ACL_ALLIP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; access-group output ACL_ALLIP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; service-policy input PM_MGT_ICMP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;interface bvi 10&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; ip address 10.10.0.2 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; alias 10.10.0.4 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; peer ip address 10.10.0.3 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; description Web Production DMZ SLB Bridge&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;interface bvi 20&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; ip address 10.20.0.2 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; alias 10.20.0.4 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; peer ip address 10.20.0.3 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; font-size: 8pt;"&gt;&amp;nbsp; description App Production Zone SLB Bridge&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We appear to be encountering an issue with a similar configuration to the above, where if something in either server VLAN (Web or App) tries to connect to a VIP in the other BVI then it doesn't traverse the upstream FWSM, it just somehow makes a direct connection which then appears to fail, I assume, due to the lack of route back?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;Martin&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jun 2012 13:37:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/two-bvi-in-one-cisco-ace-context/m-p/1969420#M37578</guid>
      <dc:creator>martin.foote</dc:creator>
      <dc:date>2012-06-05T13:37:33Z</dc:date>
    </item>
    <item>
      <title>Two BVI in one Cisco ACE context</title>
      <link>https://community.cisco.com/t5/application-networking/two-bvi-in-one-cisco-ace-context/m-p/1969421#M37579</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Martin, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes you can have two BVI in the same Context.&amp;nbsp;&amp;nbsp; Have you tried to configured a nat-pool to do source nat?&amp;nbsp; It sounds like an assymetric flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;_________________________&lt;/P&gt;&lt;P&gt;Cesar R&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jun 2012 17:59:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/two-bvi-in-one-cisco-ace-context/m-p/1969421#M37579</guid>
      <dc:creator>Cesar Roque</dc:creator>
      <dc:date>2012-06-05T17:59:47Z</dc:date>
    </item>
    <item>
      <title>Two BVI in one Cisco ACE context</title>
      <link>https://community.cisco.com/t5/application-networking/two-bvi-in-one-cisco-ace-context/m-p/1969422#M37580</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Cesar&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am pretty much certain that there is no asymmetric flow. The current setup is using CSM in bridged mode and we are migrating to ACE. The FWSM also shows hits in the current setup between Web and App zones.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My colleague found this post which seems to have been an identical issue.&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/message/3137301"&gt;https://supportforums.cisco.com/message/3137301&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However there is no explanation as to why we would need to apply the service-policy on the server side of the second BVI. It does appear to have fixed the issue, but there is no real explanation as to why it would.. it seems nonsensical. Any comments or understanding to share on this method?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have used NAT previously for servers which need to call the a client side VIP, but this is only applicable when there is one BVI not two. It should route, via FWSM?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Martin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jun 2012 21:15:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/two-bvi-in-one-cisco-ace-context/m-p/1969422#M37580</guid>
      <dc:creator>martin.foote</dc:creator>
      <dc:date>2012-06-05T21:15:54Z</dc:date>
    </item>
    <item>
      <title>Two BVI in one Cisco ACE context</title>
      <link>https://community.cisco.com/t5/application-networking/two-bvi-in-one-cisco-ace-context/m-p/1969423#M37581</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Martin, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The traffic will enter the ACE on BVI20 so we need to match the traffic at that moment, otherwise the ACE is not going to have a hit in the VIP.&amp;nbsp; That is the reason&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2012 21:59:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/two-bvi-in-one-cisco-ace-context/m-p/1969423#M37581</guid>
      <dc:creator>Cesar Roque</dc:creator>
      <dc:date>2012-06-08T21:59:30Z</dc:date>
    </item>
    <item>
      <title>Two BVI in one Cisco ACE context</title>
      <link>https://community.cisco.com/t5/application-networking/two-bvi-in-one-cisco-ace-context/m-p/1969424#M37582</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Cesar&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm still confused... If I had a switch with two VLANs with a firewall being the device routing between the two VLANs, I would expect that traffic from one VLAN would need to route through the firewall to reach the other. For ACE this doesn't seem to be the case, I'm unclear why it's allowed to shortcut the firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example I could be running different types or inspection on my "firewall", which this traffic would then be allowed to circumvent it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Martin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2012 22:29:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/two-bvi-in-one-cisco-ace-context/m-p/1969424#M37582</guid>
      <dc:creator>martin.foote</dc:creator>
      <dc:date>2012-06-08T22:29:41Z</dc:date>
    </item>
    <item>
      <title>Two BVI in one Cisco ACE context</title>
      <link>https://community.cisco.com/t5/application-networking/two-bvi-in-one-cisco-ace-context/m-p/1969425#M37583</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Martin, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please read below.&lt;/P&gt;&lt;H2&gt; Autogenerating a MAC Address for a VLAN Interface &lt;/H2&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A name="wp1061680"&gt;&lt;/A&gt;&lt;A name="wpmkr1065495"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; By default, the ACE does not allow traffic from one context to another&amp;nbsp; context over a transparent firewall. The ACE assumes that VLANs in&amp;nbsp; different contexts are in different Layer 2 domains, unless it is a&amp;nbsp; shared VLAN. The ACE allocates the same MAC address to the VLANs. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A name="wp1062064"&gt;&lt;/A&gt; &lt;/P&gt;&lt;P&gt; When you are using a firewall service module (FWSM) to bridge traffic&amp;nbsp; between two contexts on the ACE, you must assign two Layer 3 VLANs to&amp;nbsp; the same bridge domain. To support this configuration, these VLAN&amp;nbsp; interfaces require different MAC addresses. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A name="wp1062078"&gt;&lt;/A&gt; &lt;/P&gt;&lt;P&gt; To enable the autogeneration of a MAC address on a VLAN interface, use the &lt;STRONG&gt;mac address autogenerate&lt;/STRONG&gt; command in interface configuration mode. The syntax of this command is as follows: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A name="wp1062065"&gt;&lt;/A&gt; &lt;/P&gt;&lt;P&gt;mac address autogenerate &lt;/P&gt;&lt;P&gt;&lt;A name="wp1062102"&gt;&lt;/A&gt; &lt;/P&gt;&lt;P&gt; For example, enter: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A name="wp1062103"&gt;&lt;/A&gt; &lt;/P&gt;&lt;DIV&gt;&lt;PRE&gt;host1/Admin(config-if)# mac address autogenerate
&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards, &lt;/P&gt;&lt;P&gt;Ajay Kumar&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A name="wp1062105"&gt;&lt;/A&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Jun 2012 20:09:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/two-bvi-in-one-cisco-ace-context/m-p/1969425#M37583</guid>
      <dc:creator>ajayku2</dc:creator>
      <dc:date>2012-06-09T20:09:21Z</dc:date>
    </item>
    <item>
      <title>Two BVI in one Cisco ACE context</title>
      <link>https://community.cisco.com/t5/application-networking/two-bvi-in-one-cisco-ace-context/m-p/1969426#M37584</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ajay&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I understand this, but I am talking about two BVI in the same context with a FWSM operating at layer 3 (not transparent)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In my example I have FWSM interfaces:&lt;/P&gt;&lt;P&gt;VLAN 10 - ip address 10.10.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt;VLAN 20 - ip address 10.20.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With BVI 10 and 20 relating to the above. The link I posted previously says...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I have something on the server side of VLAN 20 which wishes to call a VIP in the VLAN 10 IP range, then it is necessary to apply the service-policy for the VIP in VLAN 10 to the server side interface of VLAN 20. This means the VIP is in a completely different IP subnet from that assocsiated with the BVI. It also means the traffic doesn't pass through my routed FWSM but means the traffic hops from one BVI to another on the ACE?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Martin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Jun 2012 20:47:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/two-bvi-in-one-cisco-ace-context/m-p/1969426#M37584</guid>
      <dc:creator>martin.foote</dc:creator>
      <dc:date>2012-06-09T20:47:17Z</dc:date>
    </item>
    <item>
      <title>Two BVI in one Cisco ACE context</title>
      <link>https://community.cisco.com/t5/application-networking/two-bvi-in-one-cisco-ace-context/m-p/1969427#M37585</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes true. When you apply policy to a particular VLAN it advertises its VIP over that vlan and start listening for that VIP. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can have the same VIP listening on multiple VLAN. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will try to get an example but you are in right direction. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACE acts as a patch of two vlans. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ideally if you are designing FWSM with L3 mode. It should be like this &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Client VLAN &amp;gt;&amp;gt; &lt;STRONG&gt;(Firewall VLAN ---- ACE VLAN) -- common vlan &lt;/STRONG&gt;&amp;gt;&amp;gt; Server VLAN &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Say &lt;STRONG&gt;VLAN 30 &amp;gt;&amp;gt; VLAN 20 &amp;gt;&amp;gt; VLAN 10 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are trying to Publish a VIP which belongs to VLAN 20 to VLAN 10. ACE will start listening to VIP on this VLAN and then any packet coming to that VLAN will match the class map and policy and the load balancing decision will be taken based on that. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know you will say that how two different subnet will communicate but in this case server will send any packet to default gateway which is ACE and ACE knows it is suppose to listen for that VIP on VLAN 10. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are worried about security then remember Client traffic cannot bypass the firewall. It is just the server traffic which is bypassing the firewall which is already in the trusted zone. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards, &lt;/P&gt;&lt;P&gt;Ajay Kumar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Jun 2012 21:53:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/two-bvi-in-one-cisco-ace-context/m-p/1969427#M37585</guid>
      <dc:creator>ajayku2</dc:creator>
      <dc:date>2012-06-09T21:53:59Z</dc:date>
    </item>
    <item>
      <title>Two BVI in one Cisco ACE context</title>
      <link>https://community.cisco.com/t5/application-networking/two-bvi-in-one-cisco-ace-context/m-p/1969428#M37586</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ajay&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have drawn a diagram to try and help. On the left I have what I would expect, if a server in VLAN21 wanted to call a VIP in VLAN10 I would expect it would use it's default gateway to route to the FWSM, pass through the firewall and then hit the VIP using the client side VLAN10. What I have read and what appears to work is that you must apply the service policy, including the VIP for VLAN 10, on the server side of the other BVI in this case VLAN 21. In this case I do not believe the traffic has to pass through the FWSM to get from the server in VLAN21 to the VIP originally in VLAN10 and onward to the servers hosted in VLAN11?&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/7/3/7/90737-BVI.gif" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;Please note both BVI and all four VLAN are in the same ACE context.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Martin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Jun 2012 22:34:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/two-bvi-in-one-cisco-ace-context/m-p/1969428#M37586</guid>
      <dc:creator>martin.foote</dc:creator>
      <dc:date>2012-06-09T22:34:41Z</dc:date>
    </item>
    <item>
      <title>Two BVI in one Cisco ACE context</title>
      <link>https://community.cisco.com/t5/application-networking/two-bvi-in-one-cisco-ace-context/m-p/1969429#M37587</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Question : I would expect, if a server in VLAN21 wanted to call a VIP in VLAN10 I&amp;nbsp; would expect it would use it's default gateway to route to the FWSM&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Answer: If the default gateway on servers in vlan21 is pointing to ACE. This is not going to happen. If the default gateway is pointing to FWSM then only the way you expect will work. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Usually when the ACE is in routed mode all the server point it's default gateway to ACE. In that case if the packet reach on ACE ( default gateway) looking for a virtual IP then it will process the packet for that VIP instead of forwarding it to FWSM. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Question : What I have read and what appears to work is that you must apply the&amp;nbsp; service policy, including the VIP for VLAN 10, on the server side of the&amp;nbsp; other BVI in this case VLAN 21. In this case I do not believe the&amp;nbsp; traffic has to pass through the FWSM to get from the server in VLAN21 to&amp;nbsp; the VIP originally in VLAN10 and onward to the servers hosted in&amp;nbsp; VLAN11?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes your understanding is correct the traffic will not pass through FWSM. It will go straight to the ACE and ACE will load balance the traffic to VLAN 11. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thats the reason why you apply policy on VLAN 21 as well. So that packet will be matched on vlan21 and load balancing decision will be taken. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards, &lt;/P&gt;&lt;P&gt;Ajay Kumar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Jun 2012 07:33:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/two-bvi-in-one-cisco-ace-context/m-p/1969429#M37587</guid>
      <dc:creator>ajayku2</dc:creator>
      <dc:date>2012-06-11T07:33:46Z</dc:date>
    </item>
    <item>
      <title>Two BVI in one Cisco ACE context</title>
      <link>https://community.cisco.com/t5/application-networking/two-bvi-in-one-cisco-ace-context/m-p/1969430#M37588</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI Ajay&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The servers in VLAN21 do have their default gateway pointing at FWSM.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems like the use of the service-policy on VLAN21 to load balance to servers in VLAN11 is just the way it can work... I understand that this configuration works on the ACE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I guess my question is now:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is applying the service-policy to VLAN21 the only way to have it work or will the traffic passing (bridged) through BVI20 upto FWSM and routed down to VLAN10 to hit the service-policy work also? I ask as we've been unable to get this second option, and the way I'd prefer it to work, working?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many Thanks&lt;/P&gt;&lt;P&gt;Martin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Jun 2012 08:58:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/two-bvi-in-one-cisco-ace-context/m-p/1969430#M37588</guid>
      <dc:creator>martin.foote</dc:creator>
      <dc:date>2012-06-11T08:58:35Z</dc:date>
    </item>
    <item>
      <title>Two BVI in one Cisco ACE context</title>
      <link>https://community.cisco.com/t5/application-networking/two-bvi-in-one-cisco-ace-context/m-p/1969431#M37589</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is applying the service-policy to VLAN21 the only way to have it work or&amp;nbsp; will the traffic passing (bridged) through BVI20 upto FWSM and routed&amp;nbsp; down to VLAN10 to hit the service-policy work also? I ask as we've been&amp;nbsp; unable to get this second option, and the way I'd prefer it to work,&amp;nbsp; working?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ideally it should work that way as well. The idea is the packet should reach the ACE on VLAN 10. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the FWSM is able to NAT it and forward to ACE it should work. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;few things to check. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Check if the packet is going to FWSM or not. Access list or capture on firewall will show it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Check if FWSM is natting the packet to VIP ip or not? ( Check if NAT is configured for that subnet range) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;If the packet is getting natted and reaching ACE it should work. &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards, &lt;/P&gt;&lt;P&gt;Ajay Kumar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Jun 2012 09:34:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/two-bvi-in-one-cisco-ace-context/m-p/1969431#M37589</guid>
      <dc:creator>ajayku2</dc:creator>
      <dc:date>2012-06-11T09:34:17Z</dc:date>
    </item>
  </channel>
</rss>

