<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Depo, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-interface-segregation-from-one-switch-to-another/m-p/2786760#M174399</link>
    <description>&lt;P&gt;Hi Depo,&lt;/P&gt;
&lt;P&gt;When you say things not working as expected, could you please mention what communication are you trying to establish?&lt;/P&gt;
&lt;P&gt;Also from the configuration, i could see that you have two sub-interfaces with the same Security-level(.30 and .40 with sec level of 50). Please configure 'Same-security-traffic permit intra-interface' if traffic needs to be established between them.&lt;/P&gt;
&lt;P&gt;Also check if you are able to ping vlan 40 interface ip from new switch or from hosts behind it. Also check if port on switch is made as trunk and all the required vlans are allowed on that trunk.&lt;/P&gt;
&lt;P&gt;Also check the access-list on ASA vlan 40 interface if traffic is allowed(as it would go from low security to high security).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Akshay Rastogi&lt;/P&gt;</description>
    <pubDate>Wed, 02 Dec 2015 06:18:26 GMT</pubDate>
    <dc:creator>Akshay Rastogi</dc:creator>
    <dc:date>2015-12-02T06:18:26Z</dc:date>
    <item>
      <title>ASA 5510: dmz Interface segregation from one switch to another</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-interface-segregation-from-one-switch-to-another/m-p/2786759#M174398</link>
      <description>&lt;P&gt;I am using a Cisco ASA 5510 which has 4 interfaces: Inside, Outside, Failover and the DMZ. The &lt;BR /&gt;DMZ interface has two subinterfaces.&lt;BR /&gt;The Inside interface is setup as a Physical trunk with a subinterface having a Vlan (example: Vlan 10)&lt;BR /&gt;The Outside interface is setup as a stand alone interface &lt;BR /&gt;The DMZ interface is a physical trunk which has two subinterface (example: Vlan 20 &amp;amp; 30)&lt;/P&gt;
&lt;P&gt;At the Moment all these interfaces from the ASA are connected to a Pair of stacked 3750-x switch. The &lt;BR /&gt;challenge i am having is moving the DMZ physical trunk (int0/2) with the two subinterfaces to a New DMZ switch.&lt;BR /&gt;The current interfaces on the ASA are below:&lt;/P&gt;
&lt;P&gt;interface Ethernet0/0&lt;BR /&gt; speed 100&lt;BR /&gt; duplex full&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 321.456.25.253 255.255.255.0 standby 321.456.25.254&lt;/P&gt;
&lt;P&gt;interface Ethernet0/1&lt;BR /&gt; speed 100&lt;BR /&gt; duplex full&lt;BR /&gt; no nameif&lt;BR /&gt; security-level 100&lt;BR /&gt; no ip address&lt;/P&gt;
&lt;P&gt;interface Ethernet0/1.10&lt;BR /&gt; vlan 10&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 123.456.10.254 255.255.255.0 standby 123.456.10.253&lt;/P&gt;
&lt;P&gt;interface Ethernet0/2&lt;BR /&gt; speed 100&lt;BR /&gt; duplex full&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;/P&gt;
&lt;P&gt;interface Ethernet0/2.20&lt;BR /&gt; vlan 20&lt;BR /&gt; nameif section 1&lt;BR /&gt; security-level 45&lt;BR /&gt; ip address 15.150.20.1 255.255.255.0 standby 15.150.20.2&lt;/P&gt;
&lt;P&gt;interface Ethernet0/2.30&lt;BR /&gt; vlan 30&lt;BR /&gt; nameif section 2&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 123.456.30.254 255.255.255.0 standby 123.456.30.254&lt;/P&gt;
&lt;P&gt;I currently have a Vlan interface setup on the stacked switch which it's default gateway is the inside interface&lt;BR /&gt;on the ASA.&lt;/P&gt;
&lt;P&gt;interface Vlan10&lt;BR /&gt; description ASA Vlan&lt;BR /&gt; ip address 123.456.10.2 255.255.255.0&lt;BR /&gt; standby 10 ip 123.456.10.1&lt;BR /&gt; standby 10 priority 120&lt;BR /&gt; standby 10 preempt&lt;/P&gt;
&lt;P&gt;ip default-gateway 123.456.10.254&lt;BR /&gt;ip forward-protocol nd&lt;/P&gt;
&lt;P&gt;ip route 0.0.0.0 0.0.0.0 123.456.10.254&lt;/P&gt;
&lt;P&gt;At this stage i have now created another subinterface on the ASA-DMZ interface (int0/2) to manage traffic to the&lt;BR /&gt;new DMZ switch and also a Vlan interface on the New DMZ switch which is below.&lt;/P&gt;
&lt;P&gt;interface Ethernet0/2.40&lt;BR /&gt; description DMZ&lt;BR /&gt; vlan 40&lt;BR /&gt; nameif DMZ&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 123.456.40.254 255.255.255.0 standby 123.456.40.254&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;I have now configured a Vlan interface on the DMZ(New) switch to segregate the network. Which is below.&lt;/P&gt;
&lt;P&gt;interface Vlan40&lt;BR /&gt; ip address 123.456.40.6 255.255.255.0 &lt;BR /&gt; standby 40 ip 123.456.40.1&lt;BR /&gt; standby 40 priority 120&lt;BR /&gt; standby 40 preempt&lt;/P&gt;
&lt;P&gt;ip default-gateway 123.456.40.254&lt;BR /&gt;ip forward-protocol nd&lt;/P&gt;
&lt;P&gt;ip route 0.0.0.0 0.0.0.0 123.456.40.254&lt;/P&gt;
&lt;P&gt;I have tried moving the physical DMZ interface (with the two subinterfaces : (Ethernet0/2.20 &amp;amp; Ethernet0/2.30) of &lt;BR /&gt;the ASA from the stacked switch to the new DMZ switch however i was unable to get things working as expected.&lt;BR /&gt;Is there something obvious i am not doing right? Can anyone please help&lt;/P&gt;
&lt;P&gt;Many Thanks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Dapo&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:58:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-interface-segregation-from-one-switch-to-another/m-p/2786759#M174398</guid>
      <dc:creator>dapo dimeji</dc:creator>
      <dc:date>2019-03-12T06:58:28Z</dc:date>
    </item>
    <item>
      <title>Hi Depo,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-interface-segregation-from-one-switch-to-another/m-p/2786760#M174399</link>
      <description>&lt;P&gt;Hi Depo,&lt;/P&gt;
&lt;P&gt;When you say things not working as expected, could you please mention what communication are you trying to establish?&lt;/P&gt;
&lt;P&gt;Also from the configuration, i could see that you have two sub-interfaces with the same Security-level(.30 and .40 with sec level of 50). Please configure 'Same-security-traffic permit intra-interface' if traffic needs to be established between them.&lt;/P&gt;
&lt;P&gt;Also check if you are able to ping vlan 40 interface ip from new switch or from hosts behind it. Also check if port on switch is made as trunk and all the required vlans are allowed on that trunk.&lt;/P&gt;
&lt;P&gt;Also check the access-list on ASA vlan 40 interface if traffic is allowed(as it would go from low security to high security).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Akshay Rastogi&lt;/P&gt;</description>
      <pubDate>Wed, 02 Dec 2015 06:18:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-interface-segregation-from-one-switch-to-another/m-p/2786760#M174399</guid>
      <dc:creator>Akshay Rastogi</dc:creator>
      <dc:date>2015-12-02T06:18:26Z</dc:date>
    </item>
    <item>
      <title>Hi Akshay,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-interface-segregation-from-one-switch-to-another/m-p/2786761#M174400</link>
      <description>&lt;P&gt;Hi Akshay,&lt;/P&gt;
&lt;P&gt;Thank you for your response. I am trying to get devices on Vlan 20 &amp;amp; 30 (DMZ Interface) to communicate with devices&lt;BR /&gt;on Vlan 10 (Inside Interface).&lt;/P&gt;
&lt;P&gt;I have a trunk port setup on the new DMZ switch to allow vlans 20,30 &amp;amp; 40 from the DMZ interface of the ASA.&lt;BR /&gt;I dont have same-security-traffic configured on the ASA, would apply and test. I will try the below config.&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;same-security-traffic permit inter-interface&lt;/P&gt;
&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;
&lt;P&gt;I have this subnet connected to the stacked switch ( i.e: Vlan 50) which is on the inside interface. &lt;BR /&gt;Network address (example) 150.120.78.0 with two host address 150.120.78.26 &amp;amp; 150.120.78.27 and another &lt;BR /&gt;Network address 132.15.15.0 with a host 132.15.15.228 . See Static nat and routing on the ASA below:&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;static (inside,outside) 150.120.78.0 50.120.78.0 netmask 255.255.255.0&lt;BR /&gt;static (inside,outside) 132.15.15.0 132.15.15.0 netmask 255.255.255.0&lt;BR /&gt;static (inside,section2) 150.120.78.26 150.120.78.26 netmask 255.255.255.255&lt;BR /&gt;static (inside,section2) 150.120.78.27 150.120.78.27 netmask 255.255.255.255&lt;BR /&gt;static (inside,section1) 20.150.16.203 132.15.15.228 netmask 255.255.255.255&lt;BR /&gt;static (section2,outside) 123.456.30.33 123.456.30.33 netmask 255.255.255.255&lt;BR /&gt;access-group outside-in in interface outside&lt;BR /&gt;access-group inside-out in interface inside&lt;BR /&gt;access-group section1-in in interface section1&lt;BR /&gt;access-group section2-in in interface section2&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 10.10.10.4 1 (this is the router out of the network)&lt;BR /&gt;route section2 20.150.190.199 255.255.255.255 123.456.30.1 1&lt;BR /&gt;route inside 132.15.15.0 255.255.255.0 123.456.10.1 1&lt;BR /&gt;route inside 150.120.78.0 255.255.255.0 123.456.10.1 1&lt;/P&gt;
&lt;P&gt;route section1 183.103.131.40 255.255.255.255 20.150.16.246 1&lt;/P&gt;
&lt;P&gt;At this stage i have not added a static NAT rule or setup an access-group for the new DMZ interface on the ASA, &lt;BR /&gt;can you please advise?&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2015 21:32:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-interface-segregation-from-one-switch-to-another/m-p/2786761#M174400</guid>
      <dc:creator>dapo dimeji</dc:creator>
      <dc:date>2015-12-03T21:32:48Z</dc:date>
    </item>
    <item>
      <title>Hi Akshay,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-interface-segregation-from-one-switch-to-another/m-p/2786762#M174401</link>
      <description>&lt;P&gt;Hi Akshay,&lt;/P&gt;
&lt;P&gt;I have got things working to a good level. I applied the same traffic config below:&lt;/P&gt;
&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;
&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;
&lt;P&gt;I mainly had to create an interface for Vlan 50 with in IP Address on the DMZ switch which then got traffic moving from the INSIDE to the DMZ interface.&lt;/P&gt;
&lt;P&gt;Thanks for your support.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2015 21:43:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-interface-segregation-from-one-switch-to-another/m-p/2786762#M174401</guid>
      <dc:creator>dapo dimeji</dc:creator>
      <dc:date>2015-12-03T21:43:18Z</dc:date>
    </item>
    <item>
      <title>Hi Depo,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-interface-segregation-from-one-switch-to-another/m-p/2786763#M174402</link>
      <description>&lt;P&gt;Hi Depo,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;It is nice to hear that.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Akshay Rastogi&lt;/P&gt;
&lt;P&gt;Remember to rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Fri, 04 Dec 2015 01:48:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-interface-segregation-from-one-switch-to-another/m-p/2786763#M174402</guid>
      <dc:creator>Akshay Rastogi</dc:creator>
      <dc:date>2015-12-04T01:48:39Z</dc:date>
    </item>
  </channel>
</rss>

