<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Configure the switch layer 3 port connected to a firewall in Switching</title>
    <link>https://community.cisco.com/t5/switching/configure-the-switch-layer-3-port-connected-to-a-firewall/m-p/1907579#M211094</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alexander&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Difficult to say without seeing config. Here are your 2 options in more detail - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) use a L2 port. So lets say the L2 port is in vlan 10 and the subnet is 192.168.5.0/24 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6500 end &lt;/P&gt;&lt;P&gt;======&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int vlan 10 &lt;/P&gt;&lt;P&gt;ip address 192.168.5.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 192.168.5.2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall interface connecting to 6500 would be given an IP of 192.168.5.1 (the 6500 vlan 10 ip). Then on the firewall for each other vlan subnet on the 6500 you would need to add routes for those subnets eg. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 192.168.6.0 255.255.255.0 192.168.5.1&amp;nbsp; &amp;lt;-- where 192.168.6.0/24 is a different vlan/subnet on the 6500. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) If you use a L3 port then &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6500 end &lt;/P&gt;&lt;P&gt;=======&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int gi0/1&amp;nbsp; &amp;lt;-- connects to firewall&lt;/P&gt;&lt;P&gt;no switchport&lt;/P&gt;&lt;P&gt;ip address 192.168.5.1 255.255.255.252&amp;nbsp; &amp;lt;-- note you only need a /30 subnet for a P2P routed link&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 192.168.5.2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again, the firewall interface connecting to the 6500 is given 192.168.5.2 255.255.255.252. You then need to add routes to the firewall as in previous example except this time you also need to add a route for the server vlan as well. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One last point. I have used the example of adding static routes to the firewall but you could, if supported, use a dynamic routing protocol on your firewall and 6500 to exchange the 6500 subnets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 27 Feb 2012 18:31:13 GMT</pubDate>
    <dc:creator>Jon Marshall</dc:creator>
    <dc:date>2012-02-27T18:31:13Z</dc:date>
    <item>
      <title>Configure the switch layer 3 port connected to a firewall</title>
      <link>https://community.cisco.com/t5/switching/configure-the-switch-layer-3-port-connected-to-a-firewall/m-p/1907576#M211091</link>
      <description>&lt;DIV&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I&amp;nbsp; would like a help about a configuration, so I have a switch layer 6500&amp;nbsp; series connected to a firewall, the port configuration between them is&amp;nbsp; layer 2, in another words I do not configure an IP address in the Cisco&amp;nbsp; switch port to conected it in the firewall, but when a apply a policy on&amp;nbsp; firewall it lose communication with others vlans, just the vlan that is&amp;nbsp; connected between the switch and firewall works, attachment the design.&amp;nbsp; I think that is necessary to configure the connection between the&amp;nbsp; firewall and switch as layer 3 ( a port with IP address in the switch),&amp;nbsp; but I would like to know why? The switch is configured with about 10&amp;nbsp; vlan and it is a inter vlan routing, a default route is configured in&amp;nbsp; the switch where the gateway is the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: The comments in the picture attachment is in portugues, but nothing important.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 07 Mar 2019 13:13:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/configure-the-switch-layer-3-port-connected-to-a-firewall/m-p/1907576#M211091</guid>
      <dc:creator>alex.barchini</dc:creator>
      <dc:date>2019-03-07T13:13:01Z</dc:date>
    </item>
    <item>
      <title>Configure the switch layer 3 port connected to a firewall</title>
      <link>https://community.cisco.com/t5/switching/configure-the-switch-layer-3-port-connected-to-a-firewall/m-p/1907577#M211092</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alexander &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Shouldn't matter whether you use L2 port or L3 port, both should work. But if you use L2 port obviously you&amp;nbsp; need a L3 valn interface for that vlan on the 6500 for the firewall to communicate with the other vlans. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Perhaps it is your firewall policy that is the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Feb 2012 17:24:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/configure-the-switch-layer-3-port-connected-to-a-firewall/m-p/1907577#M211092</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2012-02-27T17:24:46Z</dc:date>
    </item>
    <item>
      <title>Configure the switch layer 3 port connected to a firewall</title>
      <link>https://community.cisco.com/t5/switching/configure-the-switch-layer-3-port-connected-to-a-firewall/m-p/1907578#M211093</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but when a apply a policy on firewall all the other vlans stops to works properly, it did not connect to Internet, just the vlan where the servers stay works and the connection between the firewall and 6500 switch is in this default vlan(server vlan), with the SVI configurated. So I think if I configure a L3 route port in the Cisco switch where the firewall connect should works, because all vlan will be routed, but I would like to make sure about that.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Feb 2012 18:04:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/configure-the-switch-layer-3-port-connected-to-a-firewall/m-p/1907578#M211093</guid>
      <dc:creator>alex.barchini</dc:creator>
      <dc:date>2012-02-27T18:04:40Z</dc:date>
    </item>
    <item>
      <title>Re: Configure the switch layer 3 port connected to a firewall</title>
      <link>https://community.cisco.com/t5/switching/configure-the-switch-layer-3-port-connected-to-a-firewall/m-p/1907579#M211094</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alexander&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Difficult to say without seeing config. Here are your 2 options in more detail - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) use a L2 port. So lets say the L2 port is in vlan 10 and the subnet is 192.168.5.0/24 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6500 end &lt;/P&gt;&lt;P&gt;======&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int vlan 10 &lt;/P&gt;&lt;P&gt;ip address 192.168.5.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 192.168.5.2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall interface connecting to 6500 would be given an IP of 192.168.5.1 (the 6500 vlan 10 ip). Then on the firewall for each other vlan subnet on the 6500 you would need to add routes for those subnets eg. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 192.168.6.0 255.255.255.0 192.168.5.1&amp;nbsp; &amp;lt;-- where 192.168.6.0/24 is a different vlan/subnet on the 6500. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) If you use a L3 port then &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6500 end &lt;/P&gt;&lt;P&gt;=======&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int gi0/1&amp;nbsp; &amp;lt;-- connects to firewall&lt;/P&gt;&lt;P&gt;no switchport&lt;/P&gt;&lt;P&gt;ip address 192.168.5.1 255.255.255.252&amp;nbsp; &amp;lt;-- note you only need a /30 subnet for a P2P routed link&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 192.168.5.2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again, the firewall interface connecting to the 6500 is given 192.168.5.2 255.255.255.252. You then need to add routes to the firewall as in previous example except this time you also need to add a route for the server vlan as well. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One last point. I have used the example of adding static routes to the firewall but you could, if supported, use a dynamic routing protocol on your firewall and 6500 to exchange the 6500 subnets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Feb 2012 18:31:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/configure-the-switch-layer-3-port-connected-to-a-firewall/m-p/1907579#M211094</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2012-02-27T18:31:13Z</dc:date>
    </item>
    <item>
      <title>Configure the switch layer 3 port connected to a firewall</title>
      <link>https://community.cisco.com/t5/switching/configure-the-switch-layer-3-port-connected-to-a-firewall/m-p/1907580#M211095</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First of all thank you for your help. But...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) use a L2 port. So lets say the L2 port is in vlan 10 and the subnet is 192.168.5.0/24 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6500 end &lt;/P&gt;&lt;P&gt;======&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int vlan 10 &lt;/P&gt;&lt;P&gt;ip address 192.168.5.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 192.168.5.2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall&amp;nbsp; interface connecting to 6500 would be given an IP of 192.168.5.1 (the&amp;nbsp; 6500 vlan 10 ip). Then on the firewall for each other vlan subnet on the&amp;nbsp; 6500 you would need to add routes for those subnets eg. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 192.168.6.0 255.255.255.0 192.168.5.1&amp;nbsp; &amp;lt;-- where 192.168.6.0/24 is a different vlan/subnet on the 6500. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Where you said &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;"Firewall&amp;nbsp; interface connecting to 6500 would be given an IP of 192.168.5.1 (the&amp;nbsp; 6500 vlan 10 ip)"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;And&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;int vlan 10 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip address 192.168.5.1 255.255.255.0 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; "&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;So... Do you need to put the same ip address on firewall interface and in the switch vlan(192.168.5.1)"?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;And the route &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip route 0.0.0.0 0.0.0.0 192.168.5.2 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Who is 192.168.5.2?&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Feb 2012 18:50:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/configure-the-switch-layer-3-port-connected-to-a-firewall/m-p/1907580#M211095</guid>
      <dc:creator>alex.barchini</dc:creator>
      <dc:date>2012-02-27T18:50:13Z</dc:date>
    </item>
    <item>
      <title>Configure the switch layer 3 port connected to a firewall</title>
      <link>https://community.cisco.com/t5/switching/configure-the-switch-layer-3-port-connected-to-a-firewall/m-p/1907581#M211096</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alexander &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No, the 6500 would use 192.168.5.1 on the vlan 10 interface. The firewall interface connected to the 6500 would use 192.168.5.2. They can't use the same IP. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so "ip route 0.0.0.0 0.0.0.0 192.168.5.2" on the 6500 says sends all traffic for unknown destinations (usually internet traffic) to the firewall interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Feb 2012 18:57:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/configure-the-switch-layer-3-port-connected-to-a-firewall/m-p/1907581#M211096</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2012-02-27T18:57:00Z</dc:date>
    </item>
    <item>
      <title>Re: Configure the switch layer 3 port connected to a firewall</title>
      <link>https://community.cisco.com/t5/switching/configure-the-switch-layer-3-port-connected-to-a-firewall/m-p/3186595#M391761</link>
      <description>Hi Jon Marshall,&lt;BR /&gt;I do not understand the below sentence:&lt;BR /&gt;"except this time you also need to add a route for the server vlan as well."&lt;BR /&gt;which does the server vlan in this case?&lt;BR /&gt;Thanks a lot.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 20 Sep 2017 09:25:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/switching/configure-the-switch-layer-3-port-connected-to-a-firewall/m-p/3186595#M391761</guid>
      <dc:creator>dotuongvu</dc:creator>
      <dc:date>2017-09-20T09:25:16Z</dc:date>
    </item>
  </channel>
</rss>

