<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic OSPF Setup on L3 switches and firewall? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933866#M1104783</link>
    <description>&lt;P&gt;Hello, So i'm doing an assignment and i'm interested in doing a routing setup with OSPF on my Layer 3 switches.&lt;/P&gt;&lt;P&gt;I would want to have my layer 3 switches route all the traffic that's supposed to go outside to the closest firewall interface.&lt;/P&gt;&lt;P&gt;However i am not entirely certain on how i should start this setup.&lt;/P&gt;&lt;P&gt;my topology is the following&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="thom784e_0-1696402483134.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/198748i664DC9E4884C2991/image-size/medium?v=v2&amp;amp;px=400" role="button" title="thom784e_0-1696402483134.png" alt="thom784e_0-1696402483134.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;any help and feedback is very appriciated. if anything further is needed i will add that if requested&lt;BR /&gt;Also is it nessecary to setup OSPF on the firewalls too&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 04 Oct 2023 06:57:28 GMT</pubDate>
    <dc:creator>thom784e</dc:creator>
    <dc:date>2023-10-04T06:57:28Z</dc:date>
    <item>
      <title>OSPF Setup on L3 switches and firewall?</title>
      <link>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933866#M1104783</link>
      <description>&lt;P&gt;Hello, So i'm doing an assignment and i'm interested in doing a routing setup with OSPF on my Layer 3 switches.&lt;/P&gt;&lt;P&gt;I would want to have my layer 3 switches route all the traffic that's supposed to go outside to the closest firewall interface.&lt;/P&gt;&lt;P&gt;However i am not entirely certain on how i should start this setup.&lt;/P&gt;&lt;P&gt;my topology is the following&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="thom784e_0-1696402483134.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/198748i664DC9E4884C2991/image-size/medium?v=v2&amp;amp;px=400" role="button" title="thom784e_0-1696402483134.png" alt="thom784e_0-1696402483134.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;any help and feedback is very appriciated. if anything further is needed i will add that if requested&lt;BR /&gt;Also is it nessecary to setup OSPF on the firewalls too&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Oct 2023 06:57:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933866#M1104783</guid>
      <dc:creator>thom784e</dc:creator>
      <dc:date>2023-10-04T06:57:28Z</dc:date>
    </item>
    <item>
      <title>Re: OSPF Setup on L3 switches and firewall?</title>
      <link>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933877#M1104784</link>
      <description>&lt;P&gt;You can not have the traffic to go nearest FW , rather you can use Active /Standby - So the decision made easy to active unit only.&lt;/P&gt;
&lt;P&gt;the OSPF only peer with active, standby way for active to fail over.&lt;/P&gt;
&lt;P&gt;or is this ASA working standalone then you can make decision to based on the traffic or cost.&lt;/P&gt;
&lt;P&gt;(not reviewed your files, just my views)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Oct 2023 07:15:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933877#M1104784</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2023-10-04T07:15:22Z</dc:date>
    </item>
    <item>
      <title>Re: OSPF Setup on L3 switches and firewall?</title>
      <link>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933892#M1104785</link>
      <description>&lt;P&gt;we were told elsewhere that we should setup the firewalls as failover with one primary and one secondary, this means we just config 1 firewall and if that goes down the other one takes over, (maybe this is the active/standby you mentioned)&lt;BR /&gt;we want to route ospf to belive that the lowest cost is the one that goes towards FW01 by default, and then if FW01 is inactive or down, it will then go to FW02 that by that point should have taken over as the active one&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Oct 2023 07:43:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933892#M1104785</guid>
      <dc:creator>thom784e</dc:creator>
      <dc:date>2023-10-04T07:43:48Z</dc:date>
    </item>
    <item>
      <title>Re: OSPF Setup on L3 switches and firewall?</title>
      <link>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933902#M1104786</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1601960"&gt;@thom784e&lt;/a&gt; active/standby is failover. Only one unit is active and passing traffic (you don't need a cost in this scenario, there would only be one default route via the active firewall), the active unit will have an OSPF adjacency to the local switch. If the active unit fails, the standby unit will become active with all traffic now routed through that unit.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Oct 2023 08:04:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933902#M1104786</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-10-04T08:04:37Z</dc:date>
    </item>
    <item>
      <title>Re: OSPF Setup on L3 switches and firewall?</title>
      <link>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933919#M1104788</link>
      <description>&lt;P&gt;in this case, how should we do it with our public IP's&lt;/P&gt;&lt;P&gt;if we have 2, and we set one static on FW-01&lt;/P&gt;&lt;P&gt;when FW-01 does fail during stuff such as an accept test, how do we ensure that FW-02 uses the other public IP (such as if the fw-01 pub ip is the point of failure)&lt;/P&gt;</description>
      <pubDate>Wed, 04 Oct 2023 08:34:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933919#M1104788</guid>
      <dc:creator>thom784e</dc:creator>
      <dc:date>2023-10-04T08:34:39Z</dc:date>
    </item>
    <item>
      <title>Re: OSPF Setup on L3 switches and firewall?</title>
      <link>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933932#M1104789</link>
      <description>&lt;P&gt;What is the purpose of the firewalls?&amp;nbsp; Do you want to filter traffic between the VLANs or just towards the internet?&lt;/P&gt;
&lt;P&gt;Without any explanation of what your objective is it will be difficult to come with suggestions.&amp;nbsp; For example, if server / PC group 1 has one subnet and server / PC group 2 has another, you could setup the ASAs in an Active/Active failover setup.&amp;nbsp; This will allow you to send traffic to the closest firewall, but then failover if that ASA fails.&lt;/P&gt;
&lt;P&gt;You could also have 2 standalone ASAs and then manipulate traffic using OSPF cost.&lt;/P&gt;
&lt;P&gt;If you want to separate the subnets you have configured, you will either need to remove the IPs on the L3 devices and move them to the ASA, or configure VRFs on the L3 devices.&lt;/P&gt;
&lt;P&gt;As you can see, there are many possible solutions but it all depends on your requirements.&amp;nbsp; As mentioned by others, Active / Standby is a very common setup and easy to do, but then you will not be sending traffic to the closest ASA.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Oct 2023 08:47:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933932#M1104789</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-10-04T08:47:46Z</dc:date>
    </item>
    <item>
      <title>Re: OSPF Setup on L3 switches and firewall?</title>
      <link>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933933#M1104790</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1601960"&gt;@thom784e&lt;/a&gt; when you configure ASA failover you define the primary/active IP address and a standby IP address on all interfaces. &lt;/P&gt;
&lt;P&gt;Example:-&lt;/P&gt;
&lt;PRE class="wp-block-preformatted"&gt;&lt;SPAN&gt;&lt;EM&gt;interface GigabitEthernet0/0&lt;BR /&gt; nameif INSIDE&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.250.1 255.255.255.0 standby 192.168.250.2&lt;BR /&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;EM&gt;interface GigabitEthernet0/1&lt;BR /&gt; nameif OUTSIDE&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 1.1.1.1 255.255.255.0 standby 1.1.1.2&lt;/EM&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;You then define one ASA as primary and the other as secondary. The primary unit will process all traffic and have the active/primary IP address and the secondary unit will have the standby IP address.&lt;/P&gt;
&lt;P&gt;When the primary ASA fails over to the secondary (standby) unit, this unit takes over the primary IP address and re-uses it. So the active IP address (outside, inside etc) will always be the same regardless of what unit is active.&lt;/P&gt;
&lt;P&gt;Example to configure ASA failover:- &lt;A href="https://integratingit.wordpress.com/2016/08/12/configuring-cisco-asa-activestandby-failover/" target="_blank"&gt;https://integratingit.wordpress.com/2016/08/12/configuring-cisco-asa-activestandby-failover/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Oct 2023 08:48:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933933#M1104790</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-10-04T08:48:06Z</dc:date>
    </item>
    <item>
      <title>Re: OSPF Setup on L3 switches and firewall?</title>
      <link>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933942#M1104793</link>
      <description>&lt;P&gt;right now we are trying to get our L3-01 and L3-02 to route all internet traffic to FW-01, and if FW-01 isn't available we want to send it to FW-02.&lt;/P&gt;&lt;P&gt;most VLAN stuff is being done on the L3 switch and the firewalls currently only act as a layer between the L3 and the internet and for the firewall to block the default stuff, so basically just send our internet traffic from the server and pc's to the firewall and then have the firewall send it through.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Oct 2023 09:01:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933942#M1104793</guid>
      <dc:creator>thom784e</dc:creator>
      <dc:date>2023-10-04T09:01:31Z</dc:date>
    </item>
    <item>
      <title>Re: OSPF Setup on L3 switches and firewall?</title>
      <link>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933946#M1104794</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1601960"&gt;@thom784e&lt;/a&gt; then ASA active/standby failover will achieve this. &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config/ha-failover.html#ID-2107-00000429" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config/ha-failover.html#ID-2107-00000429&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Oct 2023 09:09:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933946#M1104794</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-10-04T09:09:03Z</dc:date>
    </item>
    <item>
      <title>Re: OSPF Setup on L3 switches and firewall?</title>
      <link>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933949#M1104795</link>
      <description>&lt;P&gt;alright thank you, i will look into this.&lt;/P&gt;&lt;P&gt;now it's just about how i can tell the L3 switches to route all traffic to the firewall.&lt;/P&gt;&lt;P&gt;for some reason it doesn't want to accept a normal&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 192.168.10.10 (ip on FW-01 interface facing towards L3-01)&lt;/P&gt;</description>
      <pubDate>Wed, 04 Oct 2023 09:13:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933949#M1104795</guid>
      <dc:creator>thom784e</dc:creator>
      <dc:date>2023-10-04T09:13:13Z</dc:date>
    </item>
    <item>
      <title>Re: OSPF Setup on L3 switches and firewall?</title>
      <link>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933955#M1104796</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1601960"&gt;@thom784e&lt;/a&gt; You will need to provide more information on the problem. What error do you get on the L3 switch? Can you ping the ASA from the switch?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;CODE&gt;&amp;nbsp;&lt;/CODE&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Oct 2023 09:26:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933955#M1104796</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-10-04T09:26:10Z</dc:date>
    </item>
    <item>
      <title>Re: OSPF Setup on L3 switches and firewall?</title>
      <link>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933957#M1104797</link>
      <description>&lt;P&gt;no, there appears to be some issues between the asa and the L3.&lt;/P&gt;&lt;P&gt;the ASA can ping 8.8.8.8&lt;/P&gt;&lt;P&gt;but the IP we set on the ASA interface that faces the L3 does not respond when pinging 192.168.10.10 from the L3&lt;/P&gt;&lt;P&gt;if you need more details please tell the details needed and i'll do my best to provide them asap&lt;/P&gt;</description>
      <pubDate>Wed, 04 Oct 2023 09:38:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933957#M1104797</guid>
      <dc:creator>thom784e</dc:creator>
      <dc:date>2023-10-04T09:38:59Z</dc:date>
    </item>
    <item>
      <title>Re: OSPF Setup on L3 switches and firewall?</title>
      <link>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933962#M1104798</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1601960"&gt;@thom784e&lt;/a&gt; well it looks like you are trunking multiple VLANs on the L3 switch to the ASA, but you've not defined the VLANs on the ASA. If you don't need to trunk multiple VLANs to the ASA, change it to an access port in VLAN 10. &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config/interface-vlan.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config/interface-vlan.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Also your interfaces on the ASA don't appear to be accurate in relation to the diagram and you'd need to connect the ASA's to VSS/VPC/VSW switches, so the two switches act as a single switch, rather than two independant switches &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config/interface-echannel.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config/interface-echannel.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Oct 2023 09:49:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933962#M1104798</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-10-04T09:49:43Z</dc:date>
    </item>
    <item>
      <title>Re: OSPF Setup on L3 switches and firewall?</title>
      <link>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933965#M1104799</link>
      <description>&lt;P&gt;yes we have had some issues with the etherchannels, they caused some MAC flapping so we have decided to just directly plug them in to try and get internet access so we can start doing our ESXI and then re-visit the etherchannels at a later point.&lt;/P&gt;&lt;P&gt;currently the L3 G0/1 is directly connected to the ASA G0/4 (or G1/4).&lt;BR /&gt;wouldn't setting the asa as an access port on vlan 10 make our vlan 2,3,4 have issues when trying to travel through the firewall?&lt;/P&gt;</description>
      <pubDate>Wed, 04 Oct 2023 09:53:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933965#M1104799</guid>
      <dc:creator>thom784e</dc:creator>
      <dc:date>2023-10-04T09:53:58Z</dc:date>
    </item>
    <item>
      <title>Re: OSPF Setup on L3 switches and firewall?</title>
      <link>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933968#M1104800</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1601960"&gt;@thom784e&lt;/a&gt;&amp;nbsp;not if the L3 switch is doing the routing, then you just need a route to the ASA from the L3 switch.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Oct 2023 10:00:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933968#M1104800</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-10-04T10:00:32Z</dc:date>
    </item>
    <item>
      <title>Re: OSPF Setup on L3 switches and firewall?</title>
      <link>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933971#M1104801</link>
      <description>&lt;P&gt;could you potentially help point me in the right direction as to how i'm supposed to do that.&lt;/P&gt;&lt;P&gt;currently we have this&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 192.168.10.10, the 192.168.10.10 is the ip on the interface facing the asa.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Oct 2023 10:11:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933971#M1104801</guid>
      <dc:creator>thom784e</dc:creator>
      <dc:date>2023-10-04T10:11:12Z</dc:date>
    </item>
    <item>
      <title>Re: OSPF Setup on L3 switches and firewall?</title>
      <link>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933978#M1104802</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1601960"&gt;@thom784e&lt;/a&gt; change the switch interface &lt;U&gt;that connects to the ASA&lt;/U&gt; to an access port. You should then be able to ping between the ASA and the switch.&lt;/P&gt;
&lt;P&gt;interface GigabitEthernetX/X&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;switchport access vlan 10&lt;/P&gt;
&lt;P&gt;I see no NAT configuration on your ASA, you will need to configure this if you want the VLANs to communicate to the internet. There seems to be a considerable amount of configuration this is required to get an overall working solution (as per the topology diagram).&lt;/P&gt;</description>
      <pubDate>Wed, 04 Oct 2023 10:28:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4933978#M1104802</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-10-04T10:28:36Z</dc:date>
    </item>
    <item>
      <title>Re: OSPF Setup on L3 switches and firewall?</title>
      <link>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4934019#M1104803</link>
      <description>&lt;P&gt;yes i am sadly aware of the amount of work that needs to be done.&lt;/P&gt;&lt;P&gt;if i change the port to access and tell it to access vlan 10 i am able to ping between them. but wouldn't that create issues if the vlan2 gateway of 192.168.2.1 tries to send data out FW-01?&lt;/P&gt;&lt;P&gt;i tried editing the port to be a trunk in a couple of different ways since that would allow all vlans over it, but maybe that is barking up the wrong tree and mostly the nat that needs missing for internet access to go out.&lt;/P&gt;&lt;P&gt;Or did you spot any errors in the L3 switches config aswell?&lt;/P&gt;&lt;P&gt;Appriciate the help you've been giving.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Oct 2023 10:42:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4934019#M1104803</guid>
      <dc:creator>thom784e</dc:creator>
      <dc:date>2023-10-04T10:42:41Z</dc:date>
    </item>
    <item>
      <title>Re: OSPF Setup on L3 switches and firewall?</title>
      <link>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4934021#M1104804</link>
      <description>&lt;P&gt;This really boils down to where you want to do the inter VLAN routing (on the ASA or on the switches).&amp;nbsp; If you are only doing interVLAN routing on the switches then all you need is a default route pointing to the ASA IP.&amp;nbsp; And as Rob has mentioned the switch interface needs to be an access port and NOT a trunk port.&amp;nbsp; When routing on the switch if you are sending traffic from VLAN 2 to the internet, then the switch routes traffic from VLAN2 to VLAN1 and then forwards the traffic using the default gateway.&amp;nbsp; So you you will not have any issues with routing so long as you have the VLAN interfaces configured correctly.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Oct 2023 10:46:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4934021#M1104804</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-10-04T10:46:28Z</dc:date>
    </item>
    <item>
      <title>Re: OSPF Setup on L3 switches and firewall?</title>
      <link>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4934022#M1104805</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1601960"&gt;@thom784e&lt;/a&gt; You need a default route to the ASA from the L3 switch and the ASA will need to know the internal routes (via OSPF or statics). The ASA will need NAT rules for VLAN 2 and the rest to communicate with the internet. The switch will need to be configured for IP routing to perform intervlan routing.&lt;/P&gt;
&lt;P&gt;If you can now ping between the ASA and the switch you should now also be able to setup OSPF between those devices.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Oct 2023 10:50:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ospf-setup-on-l3-switches-and-firewall/m-p/4934022#M1104805</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-10-04T10:50:18Z</dc:date>
    </item>
  </channel>
</rss>

