<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Could you run a packet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/splitting-network-into-two-vlans-while-keeping-one-active/m-p/2611905#M205684</link>
    <description>&lt;P&gt;Could you run a packet tracer&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input Teacher udp 172.16.1.x 12345 10.10.1.30 53 detail&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;if that is successful / allowed, please do a packet capture on the ASA between the two IPs&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list cap extended permit ip host 172.16.1.x host 10.10.1.30&lt;BR /&gt;access-list cap extended permit ip host 172.16.1.x host 10.10.1.31&lt;BR /&gt;access-list cap extended permit ip host 10.10.1.30 host 172.16.1.x&lt;BR /&gt;access-list cap extended permit ip host 10.10.1.30 host 172.16.1.x&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;capture capTeach interface Teacher access-list cap&lt;BR /&gt;capture capPup interface Pupils access-list cap&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show capture capTeach&lt;BR /&gt;show capture capPup&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;remember to send som DNS traffic before you do the show commands.&lt;/P&gt;&lt;P&gt;Idealy you should see traffic entering and leaving both interfaces.&amp;nbsp; If you see traffic entering the Teacher interface and leaving the Pupils interface, but you do not see the return traffic entering the Puplis interface, then I would suggest taking a closer look at the DNS servers and/or the network between the ASA and the DNS servers.&lt;/P&gt;&lt;P&gt;If you see return traffic entering the Pupils interface but never leaving the Teachers interface then there is something going on with the rule base on the ASA.&lt;/P&gt;&lt;P&gt;Would help to see the running configuration of the ASA for further troubleshooting. Remember to remove any public IP addresses and passwords.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 24 Oct 2014 10:25:07 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2014-10-24T10:25:07Z</dc:date>
    <item>
      <title>Splitting network into two VLANs, while keeping one active directory</title>
      <link>https://community.cisco.com/t5/network-security/splitting-network-into-two-vlans-while-keeping-one-active/m-p/2611901#M205680</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;I'm splitting up the network on a small school, separating the teachers from the pupils. Until now, both teachers and pupils have been domainusers on the same AD server. We want to keep it that way. I have created a new VLAN for the teachers. The AD servers are in the pupils VLAN.&lt;/P&gt;&lt;P&gt;I have set the ASA as DHCP server in the teachers VLAN, but I still want to use the AD DNS server and AD login. The new DHCP settings for teachers VLAN, looks like this:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;dhcpd address 172.16.1.100-172.16.1.200 Teacher&lt;BR /&gt;dhcpd dns 10.10.1.30 10.10.1.31 interface Teacher&lt;BR /&gt;dhcpd domain [mydomain] interface Teacher&lt;BR /&gt;dhcpd auto_config Pupil interface Teacher&lt;BR /&gt;dhcpd enable Teacher&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Teacher VLAN has a higher security level than pupils. I can ping 10.10.1.30 and 10.10.1.31 in VLAN pupil from VLAN teacher, so I guess NAT and ACL's should be fine ?&lt;/P&gt;&lt;P&gt;Anyway, DNS lookup does not work.&lt;/P&gt;&lt;P&gt;I don't know if this is an ASA or a Windows server problem. We have added 172.16.1.0/24 as a new subnet in AD "Sites and services", but still no success.&lt;/P&gt;&lt;P&gt;Any suggestions ?&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;Kjetil&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:58:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/splitting-network-into-two-vlans-while-keeping-one-active/m-p/2611901#M205680</guid>
      <dc:creator>Kjetil Fleten</dc:creator>
      <dc:date>2019-03-12T04:58:39Z</dc:date>
    </item>
    <item>
      <title>Do you have a drawing of the</title>
      <link>https://community.cisco.com/t5/network-security/splitting-network-into-two-vlans-while-keeping-one-active/m-p/2611902#M205681</link>
      <description>&lt;P&gt;Do you have a drawing of the topology? Do you not have a L3 switch in place for segmentation? I would highly recommend leaving that to a L3 switch and the firewall for securing the edge.&lt;/P&gt;&lt;P&gt;As it is now, it looks like you are leveraging the ASA for DHCP and also using the ASA to do your inter-vlan routing eh?&lt;/P&gt;&lt;P&gt;Is there a reason why you have different security levels on the Pupil and Teacher interfaces? I would keep this as simple as possible is why I ask, this can get extremely convoluted quickly otherwise and hard to troubleshoot.&lt;/P&gt;&lt;P&gt;So at the least you should have say a L2 switch with ports configured on their respective access vlans.&lt;/P&gt;&lt;P&gt;Does your end client receive an IP from the ASA? If so, can it ping it's default gateway (ASA Interface)?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Oct 2014 22:59:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/splitting-network-into-two-vlans-while-keeping-one-active/m-p/2611902#M205681</guid>
      <dc:creator>david-swope</dc:creator>
      <dc:date>2014-10-22T22:59:38Z</dc:date>
    </item>
    <item>
      <title>I have attached a drawing of</title>
      <link>https://community.cisco.com/t5/network-security/splitting-network-into-two-vlans-while-keeping-one-active/m-p/2611903#M205682</link>
      <description>&lt;P&gt;I have attached a drawing of the topology. I have no L3 switch.&lt;/P&gt;&lt;P&gt;I'm leveraging the ASA for DHCP in the new teachers network. Pupils DHCP server is the AD server. The ASA does the inter-vlan routning, yes.&lt;/P&gt;&lt;P&gt;The only reason why I have different security levels, is because I thaught that was an easy way to create ACL's. Traffic is allowed from higher security levels to lower (teacher to pupils), but not vice versa. I have created a rule that allows IP from AD servers to teacher VLAN though. If that's not the simplest way, I'll be happy to change it.&lt;/P&gt;&lt;P&gt;L2 switches are in place in separate VLAN's, see drawing.&lt;/P&gt;&lt;P&gt;Clients in Teacher VLAN receives IP from the ASA. They can ping the GW, which is the ASA interface at 172.16.1.1. They can also go on the Internet, as long as they use another DNS than 10.10.1.30 or 10.10.1.31&lt;/P&gt;</description>
      <pubDate>Thu, 23 Oct 2014 08:33:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/splitting-network-into-two-vlans-while-keeping-one-active/m-p/2611903#M205682</guid>
      <dc:creator>Kjetil Fleten</dc:creator>
      <dc:date>2014-10-23T08:33:08Z</dc:date>
    </item>
    <item>
      <title>Well I can see now why you</title>
      <link>https://community.cisco.com/t5/network-security/splitting-network-into-two-vlans-while-keeping-one-active/m-p/2611904#M205683</link>
      <description>&lt;P&gt;Well I can see now why you are leveraging the ASA in the manner you are. You only have two unmanaged switches&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you have a L3 switch we could clean this up rather simply. Just in case you have one I would recommend something like this&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hostname Core-SW1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;int vlan 4&lt;/P&gt;&lt;P&gt;description Pupils&lt;/P&gt;&lt;P&gt;ip address 10.0.0.254 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;int vlan 5&lt;/P&gt;&lt;P&gt;description Teachers&lt;/P&gt;&lt;P&gt;ip address 172.16.1.254 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;int vlan 10&lt;/P&gt;&lt;P&gt;description Management&lt;/P&gt;&lt;P&gt;ip address 10.0.1.254 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*** Of course create your L2 vlans as well to match the above L3 SVI's:&lt;/P&gt;&lt;P&gt;vlan 4&lt;/P&gt;&lt;P&gt;name Pupils&lt;/P&gt;&lt;P&gt;vlan 5&lt;/P&gt;&lt;P&gt;name Teachers&lt;/P&gt;&lt;P&gt;vlan 10&lt;/P&gt;&lt;P&gt;Management&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;***&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface G0/1&lt;/P&gt;&lt;P&gt;description To ASA Eth0/1&lt;/P&gt;&lt;P&gt;switchport mode access&lt;/P&gt;&lt;P&gt;switchport access vlan 10&lt;/P&gt;&lt;P&gt;spanning-tree portfast&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface G0/2&lt;/P&gt;&lt;P&gt;description Pupil PC1&lt;/P&gt;&lt;P&gt;switchport mode access&lt;/P&gt;&lt;P&gt;switchport access vlan 4&lt;/P&gt;&lt;P&gt;spanning-tree portfast&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface G0/3&lt;/P&gt;&lt;P&gt;description To Pupil PC2&lt;/P&gt;&lt;P&gt;switchport mode access&lt;/P&gt;&lt;P&gt;switchport access vlan 4&lt;/P&gt;&lt;P&gt;spanning-tree portfast&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface G0/4&lt;/P&gt;&lt;P&gt;description To Teacher PC1&lt;/P&gt;&lt;P&gt;switchport mode access&lt;/P&gt;&lt;P&gt;switchport access vlan 5&lt;/P&gt;&lt;P&gt;spanning-tree portfast&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface G0/5&lt;/P&gt;&lt;P&gt;description To Teacher PC2&lt;/P&gt;&lt;P&gt;switchport mode access&lt;/P&gt;&lt;P&gt;switchport access vlan 5&lt;/P&gt;&lt;P&gt;spanning-tree portfast&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 10.0.1.253 (ASA Inside Interface IP)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So as you see above we let the L3 switch handle our inter-vlan routing and forward traffic to the ASA for inspection etc. This is a typical configuration and way easier to troubleshoot and grow the network as time goes on. If you need the switch to handle DHCP we can do that as well&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip dhcp pool Pupils&lt;/P&gt;&lt;P&gt;network 10.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;default-router 10.0.0.254&lt;/P&gt;&lt;P&gt;domain-name abc.com&lt;/P&gt;&lt;P&gt;dns-server 4.2.2.2 8.8.8.8&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now any pupil patched into an access port on vlan 4 will receive an IP from our pool above. Also, any reason why you have selected an entire /16 for the Teachers segment?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Again, this is just an example, if you don't have the luxury of this option lets look more at what you have now. You can use AD for DHCP for the Teachers if you like, and if you want to do that you need to remove the dhcpd statements from the ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As it is now, can you ping the AD servers and machines on that from the Teachers/Pupils vlans and vice versa? We need to verify basic routing between these segments first.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Oct 2014 05:13:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/splitting-network-into-two-vlans-while-keeping-one-active/m-p/2611904#M205683</guid>
      <dc:creator>david-swope</dc:creator>
      <dc:date>2014-10-24T05:13:12Z</dc:date>
    </item>
    <item>
      <title>Could you run a packet</title>
      <link>https://community.cisco.com/t5/network-security/splitting-network-into-two-vlans-while-keeping-one-active/m-p/2611905#M205684</link>
      <description>&lt;P&gt;Could you run a packet tracer&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input Teacher udp 172.16.1.x 12345 10.10.1.30 53 detail&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;if that is successful / allowed, please do a packet capture on the ASA between the two IPs&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list cap extended permit ip host 172.16.1.x host 10.10.1.30&lt;BR /&gt;access-list cap extended permit ip host 172.16.1.x host 10.10.1.31&lt;BR /&gt;access-list cap extended permit ip host 10.10.1.30 host 172.16.1.x&lt;BR /&gt;access-list cap extended permit ip host 10.10.1.30 host 172.16.1.x&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;capture capTeach interface Teacher access-list cap&lt;BR /&gt;capture capPup interface Pupils access-list cap&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show capture capTeach&lt;BR /&gt;show capture capPup&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;remember to send som DNS traffic before you do the show commands.&lt;/P&gt;&lt;P&gt;Idealy you should see traffic entering and leaving both interfaces.&amp;nbsp; If you see traffic entering the Teacher interface and leaving the Pupils interface, but you do not see the return traffic entering the Puplis interface, then I would suggest taking a closer look at the DNS servers and/or the network between the ASA and the DNS servers.&lt;/P&gt;&lt;P&gt;If you see return traffic entering the Pupils interface but never leaving the Teachers interface then there is something going on with the rule base on the ASA.&lt;/P&gt;&lt;P&gt;Would help to see the running configuration of the ASA for further troubleshooting. Remember to remove any public IP addresses and passwords.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Oct 2014 10:25:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/splitting-network-into-two-vlans-while-keeping-one-active/m-p/2611905#M205684</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-10-24T10:25:07Z</dc:date>
    </item>
    <item>
      <title>Thanks Marius. The packet</title>
      <link>https://community.cisco.com/t5/network-security/splitting-network-into-two-vlans-while-keeping-one-active/m-p/2611906#M205685</link>
      <description>&lt;P&gt;Thanks Marius. The packet tracer showed that I missed one outgoing rule on the pupils network. Now the packet tracer is successfull, and I guess the DNS will work as well. I'll let you know in a few days when we have tested...&lt;/P&gt;</description>
      <pubDate>Sat, 25 Oct 2014 22:05:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/splitting-network-into-two-vlans-while-keeping-one-active/m-p/2611906#M205685</guid>
      <dc:creator>Kjetil Fleten</dc:creator>
      <dc:date>2014-10-25T22:05:29Z</dc:date>
    </item>
    <item>
      <title>Test ok :-)</title>
      <link>https://community.cisco.com/t5/network-security/splitting-network-into-two-vlans-while-keeping-one-active/m-p/2611907#M205686</link>
      <description>&lt;P&gt;Test ok &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Nov 2014 09:34:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/splitting-network-into-two-vlans-while-keeping-one-active/m-p/2611907#M205686</guid>
      <dc:creator>Kjetil Fleten</dc:creator>
      <dc:date>2014-11-05T09:34:27Z</dc:date>
    </item>
  </channel>
</rss>

