<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Routing To Firewall in Routing and SD-WAN</title>
    <link>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3932762#M322522</link>
    <description>&lt;P&gt;that is what I suggested. if the users are behind FW, they can reach to 10.10.0.0/16 network below method of the network path.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;users-10.20.100.0/24---FW----SWTA --SWB -- your destination IP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;or you can also have different segment directly connected to SwitchB with L2 / L3 extension.(if you do not like to have SWITCH A intervention in the network)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 30 Sep 2019 20:28:40 GMT</pubDate>
    <dc:creator>balaji.bandi</dc:creator>
    <dc:date>2019-09-30T20:28:40Z</dc:date>
    <item>
      <title>Routing To Firewall</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3932533#M322501</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is my topology as attached. I have site A (Switch A) connected to FW (all same subnet)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know have Site B (Switch B) connecting to Site A (Switch A) however I want only 1 subnet out of Site B (10.20.100.0/24) behind Site A firewall - is this possible?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Sep 2019 14:34:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3932533#M322501</guid>
      <dc:creator>NetworkGuy!</dc:creator>
      <dc:date>2019-09-30T14:34:23Z</dc:date>
    </item>
    <item>
      <title>Re: Routing To Firewall</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3932559#M322505</link>
      <description>&lt;P&gt;yes possible, make only ACL rule for that /24 to allow outside, so rest will be denied.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Sep 2019 15:00:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3932559#M322505</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-09-30T15:00:08Z</dc:date>
    </item>
    <item>
      <title>Re: Routing To Firewall</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3932601#M322507</link>
      <description>&lt;P&gt;Sorry didnt get it&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want 10.20.100.0/24 (Site B) subnet behind the firewall in SIte A which is a routed link. clear?&lt;/P&gt;</description>
      <pubDate>Mon, 30 Sep 2019 15:42:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3932601#M322507</guid>
      <dc:creator>NetworkGuy!</dc:creator>
      <dc:date>2019-09-30T15:42:44Z</dc:date>
    </item>
    <item>
      <title>Re: Routing To Firewall</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3932616#M322510</link>
      <description>&lt;P&gt;will the attached work using VRF on the switches?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;basically I am using a link from FW to Switch A (VRF-1) and from Switch A - Switch B (same VRF) and creating the SVI on Switch B for 10.20.100.x/24 (VRF-1) and addin static route "ip route VRF-1 0.0.0.0 0.0.0.0 10.10.253.2 (IP address of FW) - will this work?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Sep 2019 16:16:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3932616#M322510</guid>
      <dc:creator>NetworkGuy!</dc:creator>
      <dc:date>2019-09-30T16:16:36Z</dc:date>
    </item>
    <item>
      <title>Re: Routing To Firewall</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3932629#M322511</link>
      <description>&lt;P&gt;Your first post vs new post not really matched as per requirement you mentioned earlier.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;VRF, is seperate instance of routing, as long as the Routing and rechability available there is no reason i see failing here.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;until i misunderstood your requirement.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Sep 2019 16:38:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3932629#M322511</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-09-30T16:38:21Z</dc:date>
    </item>
    <item>
      <title>Re: Routing To Firewall</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3932649#M322513</link>
      <description>&lt;P&gt;ok let me be clear in requirement&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Site A which has Switch A and FW - these are in 10.10.0.0/16 subnet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Site B which has Switch B - this site is in 10.20.0.0/16 subnet. however I want 10.20.100.0/x subnet ALONE behind the firewall due to security restrictions in my organization. so the vrf method which i posted above will work?&lt;/P&gt;</description>
      <pubDate>Mon, 30 Sep 2019 17:06:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3932649#M322513</guid>
      <dc:creator>NetworkGuy!</dc:creator>
      <dc:date>2019-09-30T17:06:47Z</dc:date>
    </item>
    <item>
      <title>Re: Routing To Firewall</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3932700#M322518</link>
      <description>&lt;P&gt;You can have 10.20.100.0/24 behind ASA, this is not an issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I do not see any requirement of VRF here-? who will be accessing the 10.20.100.0/24 network ?&lt;/P&gt;
&lt;P&gt;If that subnet already behind the FW that means you going to have ACL which control who will be accessing the trusted device IP address and rest will be denied.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Sep 2019 18:47:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3932700#M322518</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-09-30T18:47:46Z</dc:date>
    </item>
    <item>
      <title>Re: Routing To Firewall</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3932735#M322520</link>
      <description>&lt;P&gt;The physical users are located in Site B where their laptop should have 10.20.100.0/24. these will need access back to 10.10.0.0/16 but will need to go through firewall&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if I have it behind the firewall how will I extend the plan over the routed link to Site B? hence vrf configuration to bring it back&lt;/P&gt;</description>
      <pubDate>Mon, 30 Sep 2019 19:51:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3932735#M322520</guid>
      <dc:creator>NetworkGuy!</dc:creator>
      <dc:date>2019-09-30T19:51:53Z</dc:date>
    </item>
    <item>
      <title>Re: Routing To Firewall</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3932762#M322522</link>
      <description>&lt;P&gt;that is what I suggested. if the users are behind FW, they can reach to 10.10.0.0/16 network below method of the network path.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;users-10.20.100.0/24---FW----SWTA --SWB -- your destination IP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;or you can also have different segment directly connected to SwitchB with L2 / L3 extension.(if you do not like to have SWITCH A intervention in the network)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Sep 2019 20:28:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3932762#M322522</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-09-30T20:28:40Z</dc:date>
    </item>
    <item>
      <title>Re: Routing To Firewall</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3932784#M322524</link>
      <description>Ok so 10.20.100.x/24 is behind firewall now how will I extend this to Sw B&lt;BR /&gt;using routed link?&lt;BR /&gt;</description>
      <pubDate>Mon, 30 Sep 2019 21:17:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3932784#M322524</guid>
      <dc:creator>NetworkGuy!</dc:creator>
      <dc:date>2019-09-30T21:17:19Z</dc:date>
    </item>
    <item>
      <title>Re: Routing To Firewall</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3932801#M322528</link>
      <description>&lt;P&gt;yes you can use below path with routed link as mentioned other post. below path.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;users-10.20.100.0/24---FW----SWTA --SWB -- your destination IP.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Sep 2019 21:53:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3932801#M322528</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-09-30T21:53:32Z</dc:date>
    </item>
    <item>
      <title>Re: Routing To Firewall</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3932808#M322529</link>
      <description>&lt;P&gt;Hello&lt;BR /&gt;Below is a working topology for hosts in the vrf subnet on swB to reach hosts in the same vrf&amp;nbsp; on swA&amp;gt;&lt;BR /&gt;As for accessing host in the global network 10.20.0.0/16 on swB&amp;nbsp; A vrf host will&amp;nbsp; traverse the vrf link to SwA and then it routed out of it own vrf into the global rib back to swB over the non vrf link.&lt;BR /&gt;&lt;BR /&gt;THB you wouldn't really require any vrf with just two subnets&amp;nbsp; if you then it leaked back to the global route table. access control can be accomplished just by access-lists.&lt;BR /&gt;&lt;BR /&gt;Anyway below I have used sub-interfaces i dont have any l3 switch but the L3 addressing and routing would be the same, also I have applied a RACL to allow only established tcp traffic and deny certain udp traffic (if any) from the global subnet into the vrf.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Switch A&lt;/U&gt;&lt;/STRONG&gt;&lt;BR /&gt;interface FastEthernet0/1&lt;BR /&gt;description link to SwB&lt;BR /&gt;ip address 10.10.254.1 255.255.0.0&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;interface FastEthernet2/0&lt;BR /&gt;description VRF link to SwB&lt;BR /&gt;ip vrf forwarding stan&lt;BR /&gt;ip address 10.10.253.6 255.255.255.252&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;router eigrp 10&lt;BR /&gt;network 10.10.254.1 0.0.0.0&lt;BR /&gt;no auto-summary&lt;/P&gt;
&lt;P&gt;router eigrp 100&lt;BR /&gt;no auto-summary&lt;BR /&gt;address-family ipv4 vrf stan&lt;BR /&gt;network 10.10.253.6 0.0.0.0&lt;BR /&gt;redistribute static &amp;lt;---------------redistributes global subnet to SwB vrf rib&lt;BR /&gt;no auto-summary&lt;BR /&gt;autonomous-system 100&lt;BR /&gt;exit-address-family&lt;/P&gt;
&lt;P&gt;ip route 10.10.253.4 255.255.255.252 FastEthernet2/0 &amp;lt;---------makes global rib awre of vrf &lt;BR /&gt;ip route vrf stan 10.20.0.0 255.255.0.0 10.10.254.2 global &amp;lt;----add global subnet into vrf&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Switch B&lt;/U&gt;&lt;/STRONG&gt;&lt;BR /&gt;interface FastEthernet0/1&lt;BR /&gt;description link to SwA&lt;BR /&gt;ip address 10.10.254.2 255.255.0.0&lt;/P&gt;
&lt;P&gt;interface FastEthernet0/0.10&lt;BR /&gt;description Global subnet&lt;BR /&gt;encapsulation dot1Q 10&lt;BR /&gt;ip address 10.20.0.2 255.255.255.0&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="font-family: inherit;"&gt;interface FastEthernet0/0.100&lt;BR /&gt;&lt;/SPAN&gt;description vrf subnet&lt;BR /&gt;encapsulation dot1Q 100&lt;BR /&gt;ip vrf forwarding stan&lt;BR /&gt;ip address 10.20.100.2 255.255.255.0&lt;BR /&gt;ip access-group 100 out&lt;BR /&gt;&lt;BR /&gt;router eigrp 10&lt;BR /&gt;network 10.10.254.2 0.0.0.0&lt;BR /&gt;network 10.20.0.2 0.0.0.0&lt;BR /&gt;no auto-summary&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;router eigrp 100&lt;BR /&gt;no auto-summary&lt;BR /&gt;address-family ipv4 vrf stan&lt;BR /&gt;network 10.10.100.2 0.0.0.0&lt;BR /&gt;network 10.10.253.5 0.0.0.0&lt;BR /&gt;no auto-summary&lt;BR /&gt;autonomous-system 100&lt;/P&gt;
&lt;P&gt;ip route 10.20.100.0 255.255.255.0 FastEthernet0/0.100 &amp;lt;---------makes global rib aware of vrf&lt;BR /&gt;&lt;BR /&gt;access-list 100 permit icmp 10.20.0.0 0.0.255.255 any echo-reply&lt;BR /&gt;access-list 100 deny icmp 10.20.0.0 0.0.255.255 any&lt;BR /&gt;access-list 100 permit udp 10.20.0.0 0.0.255.255 any range bootps bootpc&lt;BR /&gt;access-list 100 permit udp 10.20.0.0 0.0.255.255 any eq domain&lt;BR /&gt;access-list 100 deny udp 10.20.0.0 0.0.255.255 any&lt;BR /&gt;access-list 100 permit udp any any&lt;BR /&gt;access-list 100 permit tcp 10.20.0.0 0.0.255.255 any established&lt;BR /&gt;access-list 100 deny tcp 10.20.0.0 0.0.255.255 any&lt;BR /&gt;access-list 100 permit ip any any&lt;/P&gt;</description>
      <pubDate>Mon, 30 Sep 2019 22:52:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3932808#M322529</guid>
      <dc:creator>paul driver</dc:creator>
      <dc:date>2019-09-30T22:52:29Z</dc:date>
    </item>
    <item>
      <title>Re: Routing To Firewall</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3932906#M322536</link>
      <description>Quick glance, I see 10.10.253.x on SW A but where does it terminate in SW B?&lt;BR /&gt;</description>
      <pubDate>Tue, 01 Oct 2019 06:50:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3932906#M322536</guid>
      <dc:creator>NetworkGuy!</dc:creator>
      <dc:date>2019-10-01T06:50:19Z</dc:date>
    </item>
    <item>
      <title>Re: Routing To Firewall</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3932986#M322544</link>
      <description>&lt;P&gt;had a link again but cant we route the 10.20.100.x subnet along through the firewall?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;can you please tell me if this will work?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Switch B (10.10.254.2) -&amp;gt; (10.10.254.1) Switch A ( 10.10.255.1) -&amp;gt; FW (10.10.255.2) - all running eigrp&lt;/P&gt;&lt;P&gt;Switch B (10.10.253.5/30 - VRFXX) -&amp;gt; (10.10.253.6/30- VRFXX) Switch A (10.10.253.1/30-VRFXX) -&amp;gt; (10.10.253.2/30) FW&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the FW will have an ip route saying "ip route 10.20.100.0/24 go through 10.10.253.5 (switch b)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;on Switch B, I have the SVI for 10.20.100.0/24&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This means&lt;/P&gt;&lt;P&gt;- from Switch B to Internet for traffic 10.20.100.0/24 as source traffic will flow through Switch A VRFXX and then go through firewall&lt;/P&gt;&lt;P&gt;- From switch B (10.20.100.x) to other subnet traffic in Switch A will go through vrfxx and then to firewall and firewall will then pass this through 10.10.255.x subnet to switch A. since it goes through firewall, it will be ACL&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;will the above work?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Oct 2019 09:39:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3932986#M322544</guid>
      <dc:creator>NetworkGuy!</dc:creator>
      <dc:date>2019-10-01T09:39:53Z</dc:date>
    </item>
    <item>
      <title>Re: Routing To Firewall</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3933030#M322552</link>
      <description>&lt;P&gt;Hello&lt;BR /&gt;Sounds about right, any source SwB traffic from the vrf subnet (internet or otherwise) will need to go via its vrf link via FW any other source traffci from Swb will go via the normal eigrp path towards SwA.&lt;BR /&gt;&lt;BR /&gt;Thats how I had tested it anyway (minus the FW hop ) but that just another vrf interface the same logic applys&lt;/P&gt;</description>
      <pubDate>Tue, 01 Oct 2019 11:07:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3933030#M322552</guid>
      <dc:creator>paul driver</dc:creator>
      <dc:date>2019-10-01T11:07:25Z</dc:date>
    </item>
    <item>
      <title>Re: Routing To Firewall</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3933033#M322553</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just to add, as Paul says it will work, but you need to modify your next hops ie. you cannot have a static route on switch B pointing to the firewall IP, it needs to point to switch A's IP and then switch A has a route to the firewall and the same for routes from the firewall back.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Unless of course you are using EIGRP in the VRF as well in which case it will work.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Tue, 01 Oct 2019 11:06:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3933033#M322553</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2019-10-01T11:06:32Z</dc:date>
    </item>
    <item>
      <title>Re: Routing To Firewall</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3933166#M322567</link>
      <description>&lt;DIV&gt;Thanks Paul and Jon - now I have limited fibre connectivity between Switch A and Switch B&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;So can I do a L3 port-channel between two multilayer switches&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;example:&lt;/DIV&gt;&lt;DIV&gt;Switch A&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;port3.254&lt;/DIV&gt;&lt;DIV&gt;ip address 10.10.254.1 255.255.255.252&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Port 3.253&lt;/DIV&gt;&lt;DIV&gt;ip address 10.10.253.4 255.255.255.252&lt;/DIV&gt;&lt;DIV&gt;vrf Test&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Switch B&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV&gt;port3.254&lt;/DIV&gt;&lt;DIV&gt;ip address 10.10.254.2 255.255.255.252&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Port 3.253&lt;/DIV&gt;&lt;DIV&gt;ip address 10.10.253.5 255.255.255.252&lt;/DIV&gt;&lt;DIV&gt;vrf Test&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;will the above work with VRF config?&lt;/DIV&gt;</description>
      <pubDate>Tue, 01 Oct 2019 14:06:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3933166#M322567</guid>
      <dc:creator>NetworkGuy!</dc:creator>
      <dc:date>2019-10-01T14:06:14Z</dc:date>
    </item>
    <item>
      <title>Re: Routing To Firewall</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3933324#M322581</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes that should work fine.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Tue, 01 Oct 2019 19:18:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/routing-to-firewall/m-p/3933324#M322581</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2019-10-01T19:18:32Z</dc:date>
    </item>
  </channel>
</rss>

