<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Terminating VRF on the firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/terminating-vrf-on-the-firewall/m-p/3871383#M28205</link>
    <description>&lt;P&gt;For VLANs in a given VRF, the firewall is not involved. Only between VRFs. Typically we add a "Transit" VLAN to each VRF to connect to the firewall and it is via that subnet that inter-VRF traffic flows.&lt;/P&gt;
&lt;P&gt;Either a trunk or separate physical interfaces is fine. Most people choose a trunk (may or may not be part of an Etherchannel to increase throughput and availability) with subinterfaces.&lt;/P&gt;
&lt;P&gt;On the firewall subinterfaces are configured one per VLAN (e.g., the transit VLAN for each VRF).&lt;/P&gt;
&lt;P&gt;The next hop in each VRF's routing table is the firewall subinterface address for the transit VLAN associated with that VRF.&lt;/P&gt;</description>
    <pubDate>Wed, 12 Jun 2019 02:14:39 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2019-06-12T02:14:39Z</dc:date>
    <item>
      <title>Terminating VRF on the firewall</title>
      <link>https://community.cisco.com/t5/network-security/terminating-vrf-on-the-firewall/m-p/3869715#M28198</link>
      <description>&lt;P&gt;What is the best practice of having VRF configured on nexus 7k, with several subnets(VLAN interfaces) but termination on the firewall? At least how to have those configured from the firewall perspective?&lt;/P&gt;&lt;P&gt;I have different security zones to be configured with different subnets and vlans.&lt;/P&gt;&lt;P&gt;Actually the firewall has sub-interfaces and the default gateway is on the firewall. What I want to do is to have the default gateway moved to the nexus, under a VRF and be sent to the firewall for inter-vrf policy processing.&lt;/P&gt;&lt;P&gt;Shall the firewall have the same sub-interfaces? Any insight would be much appreciated.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Jones&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jun 2019 20:49:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/terminating-vrf-on-the-firewall/m-p/3869715#M28198</guid>
      <dc:creator>BirkJones7747</dc:creator>
      <dc:date>2019-06-07T20:49:26Z</dc:date>
    </item>
    <item>
      <title>Re: Terminating VRF on the firewall</title>
      <link>https://community.cisco.com/t5/network-security/terminating-vrf-on-the-firewall/m-p/3869931#M28200</link>
      <description>&lt;P&gt;Yes - the firewall can keep a subinterface per VRF. You just need to update the routing in the Nexus VRFs to make the ASA the next hop for inter-VRF communications. You can do it with either static or dynamic (e.g., OSPF, EIGRP) routing.&lt;/P&gt;</description>
      <pubDate>Sun, 09 Jun 2019 02:38:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/terminating-vrf-on-the-firewall/m-p/3869931#M28200</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-06-09T02:38:39Z</dc:date>
    </item>
    <item>
      <title>Re: Terminating VRF on the firewall</title>
      <link>https://community.cisco.com/t5/network-security/terminating-vrf-on-the-firewall/m-p/3871309#M28201</link>
      <description>&lt;P&gt;Under one VRF I have multiple subnets. Like vlan 200, 210 and 300&lt;/P&gt;&lt;P&gt;So here are my questions:&lt;/P&gt;&lt;P&gt;on the nexus:&lt;/P&gt;&lt;P&gt;1. I would have these three interface vlans under the VRF.&lt;/P&gt;&lt;P&gt;2. Should the link connected to the firewall be a trunk port, trunking those vlans?&amp;lt;--- What is the best practice?&lt;/P&gt;&lt;P&gt;3. on the firewall there is no VRF configured. only sub-interfaces for each vlan, how should those be configured?&lt;/P&gt;&lt;P&gt;4. under that VRF then what is the next hop for inter-vrf communications?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2019 21:57:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/terminating-vrf-on-the-firewall/m-p/3871309#M28201</guid>
      <dc:creator>BirkJones7747</dc:creator>
      <dc:date>2019-06-11T21:57:15Z</dc:date>
    </item>
    <item>
      <title>Re: Terminating VRF on the firewall</title>
      <link>https://community.cisco.com/t5/network-security/terminating-vrf-on-the-firewall/m-p/3871383#M28205</link>
      <description>&lt;P&gt;For VLANs in a given VRF, the firewall is not involved. Only between VRFs. Typically we add a "Transit" VLAN to each VRF to connect to the firewall and it is via that subnet that inter-VRF traffic flows.&lt;/P&gt;
&lt;P&gt;Either a trunk or separate physical interfaces is fine. Most people choose a trunk (may or may not be part of an Etherchannel to increase throughput and availability) with subinterfaces.&lt;/P&gt;
&lt;P&gt;On the firewall subinterfaces are configured one per VLAN (e.g., the transit VLAN for each VRF).&lt;/P&gt;
&lt;P&gt;The next hop in each VRF's routing table is the firewall subinterface address for the transit VLAN associated with that VRF.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jun 2019 02:14:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/terminating-vrf-on-the-firewall/m-p/3871383#M28205</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-06-12T02:14:39Z</dc:date>
    </item>
    <item>
      <title>Re: Terminating VRF on the firewall</title>
      <link>https://community.cisco.com/t5/network-security/terminating-vrf-on-the-firewall/m-p/3871874#M28208</link>
      <description>&lt;P&gt;Hello Marvin&lt;/P&gt;&lt;P&gt;I have those three vlans under a VRF:&lt;/P&gt;&lt;P&gt;200,210,300&lt;/P&gt;&lt;P&gt;as per your recommendations, I should have vlan 555 for example as a transit vlan which is a subnet shared between the nexus interface and the firewall. So on the firewall there would a sub-interface like ethernet0/1.555, am I correct?&lt;/P&gt;&lt;P&gt;So VRF-A has those interface vlans 200,210,300, while VRF-B has 100,200, and 300&lt;/P&gt;&lt;P&gt;so for VRF-B I will again have a transit vlan 666 and have the sub-interface on the firewall? right?&lt;/P&gt;&lt;P&gt;on the nexus I have a 10G port eth1/15, so I will trunk all the required vlans or only the transit vlans?, should the port eth1/15 have sub-interface as well? like eth1/15.555 and eth1/15.666 for the respective transit vlans and trunk on those respective vlans 555 and 666?&lt;/P&gt;&lt;P&gt;Thanks&lt;BR /&gt;Jones&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jun 2019 15:55:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/terminating-vrf-on-the-firewall/m-p/3871874#M28208</guid>
      <dc:creator>BirkJones7747</dc:creator>
      <dc:date>2019-06-12T15:55:51Z</dc:date>
    </item>
  </channel>
</rss>

