<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic management on asa in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/management-on-asa/m-p/2274287#M346519</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks.&lt;/P&gt;&lt;P&gt;so assume i build an interface on the asa as below;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int gig0/0&lt;/P&gt;&lt;P&gt;nameif MGT&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;ip address 192.168.100.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now the edge &amp;amp; core switches will be assigned an ip from this range, eg, 192.168.100.5 for core switch.&lt;/P&gt;&lt;P&gt;the link between firewall and core switch will be a layer 3 port channel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if i have to define the mgmt ip on the core and edge switches, what vlan should i be using for them on the switches.&lt;/P&gt;&lt;P&gt;can i use following configs on the core &amp;amp; edge switch for mgmt interface;&lt;/P&gt;&lt;P&gt;( using vlan 100 for mgmt interface on the switches)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int vlan 100&lt;/P&gt;&lt;P&gt;ip addr 192.168.100.5 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is this correct. appreciate all help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 12 Jul 2013 15:29:00 GMT</pubDate>
    <dc:creator>suthomas1</dc:creator>
    <dc:date>2013-07-12T15:29:00Z</dc:date>
    <item>
      <title>management on asa</title>
      <link>https://community.cisco.com/t5/network-security/management-on-asa/m-p/2274285#M346517</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the management vlan on a network needs to be created on the asa. is this feasible?&lt;/P&gt;&lt;P&gt;how easy would it be to do this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the network topology is as;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WAN &amp;gt;&amp;gt; ASA &amp;gt;&amp;gt; Core Switch &amp;gt;&amp;gt; Edge Switches&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; V&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; V&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the DMZ is attached to ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;how should we go about creating our network management vlan on the firewall.&lt;/P&gt;&lt;P&gt;Appreciate all help. thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:11:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/management-on-asa/m-p/2274285#M346517</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2019-03-12T02:11:25Z</dc:date>
    </item>
    <item>
      <title>management on asa</title>
      <link>https://community.cisco.com/t5/network-security/management-on-asa/m-p/2274286#M346518</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just build a new zone off of its own interface. Assign it a security level and access-lists consistent with what you want it to be able to reach.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Jul 2013 13:25:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/management-on-asa/m-p/2274286#M346518</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2013-07-12T13:25:54Z</dc:date>
    </item>
    <item>
      <title>management on asa</title>
      <link>https://community.cisco.com/t5/network-security/management-on-asa/m-p/2274287#M346519</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks.&lt;/P&gt;&lt;P&gt;so assume i build an interface on the asa as below;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int gig0/0&lt;/P&gt;&lt;P&gt;nameif MGT&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;ip address 192.168.100.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now the edge &amp;amp; core switches will be assigned an ip from this range, eg, 192.168.100.5 for core switch.&lt;/P&gt;&lt;P&gt;the link between firewall and core switch will be a layer 3 port channel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if i have to define the mgmt ip on the core and edge switches, what vlan should i be using for them on the switches.&lt;/P&gt;&lt;P&gt;can i use following configs on the core &amp;amp; edge switch for mgmt interface;&lt;/P&gt;&lt;P&gt;( using vlan 100 for mgmt interface on the switches)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int vlan 100&lt;/P&gt;&lt;P&gt;ip addr 192.168.100.5 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is this correct. appreciate all help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Jul 2013 15:29:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/management-on-asa/m-p/2274287#M346519</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2013-07-12T15:29:00Z</dc:date>
    </item>
    <item>
      <title>management on asa</title>
      <link>https://community.cisco.com/t5/network-security/management-on-asa/m-p/2274288#M346521</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Suthomas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All that matters is that the Vlan you will set on this devices is a dedicated vlan for managment purposes where if a user on a different user wants to reach that vlan it must be routed through a L3 device where you can filter the traffic,etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use vlan 100 or whatever vlan you want &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt; That will not affect anything, just remember to use a dedicated vlan just for the managment traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For Networking Posts check my blog at &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com/"&gt;http://laguiadelnetworking.com/&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Jul 2013 17:56:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/management-on-asa/m-p/2274288#M346521</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-07-12T17:56:17Z</dc:date>
    </item>
    <item>
      <title>management on asa</title>
      <link>https://community.cisco.com/t5/network-security/management-on-asa/m-p/2274289#M346523</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you give the management VLAN its own physical interface, then the ASA is the gateway for that VLAN and it must have a connected Layer 2 spanning tree to all the other hosts (or SVIs) on that same VLAN. If you are using a layer 3 portchannel from your switches to the ASA, that is not a setup in which you would use a dedicated interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You didn't mention - is your ASA a 5505 with built-in switch or higher model without that feature?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Jul 2013 21:41:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/management-on-asa/m-p/2274289#M346523</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2013-07-12T21:41:47Z</dc:date>
    </item>
    <item>
      <title>management on asa</title>
      <link>https://community.cisco.com/t5/network-security/management-on-asa/m-p/2274290#M346526</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks, the ASA is a 5585X with about 8 gig ports &amp;amp; 4 10gig ports.&lt;/P&gt;&lt;P&gt;So,can i please request how to actually configure this in my network with a small sample configuration for my understanding.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Jul 2013 10:43:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/management-on-asa/m-p/2274290#M346526</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2013-07-13T10:43:23Z</dc:date>
    </item>
    <item>
      <title>Re: management on asa</title>
      <link>https://community.cisco.com/t5/network-security/management-on-asa/m-p/2274291#M346528</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Assuming you want your ASA to be the gateway for your management VLAN and assuming you want the same management network for your managed devices and management systems, you would most likely use a subinterface on the ASA-core switch. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Working from those assumptions, currently &lt;SPAN style="font-size: 10pt;"&gt;ASA - inside interface - core switch is a plain routed interface on the ASA. It would change to:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;int gi0/0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; description Trunk interface for Inside and management&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&lt;SPAN style="font-size: 12px;"&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;no nameif&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; no ip address&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; no security-level&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier;"&gt; int gi0/0.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier;"&gt;&amp;nbsp; nameif inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier;"&gt;&amp;nbsp; description Inside VLAN subinterface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier;"&gt;&amp;nbsp; vlan &lt;MATCH vlan="" id="" on="" core="" switch="" for="" production="" traffic="" to="" asa=""&gt;&lt;/MATCH&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier;"&gt;&amp;nbsp; ip address &lt;SAME as="" former="" int="" gi0=""&gt;&lt;/SAME&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier;"&gt;&amp;nbsp; security level 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier;"&gt;&amp;nbsp; no shut&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier;"&gt; int gi0/0.2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier;"&gt;&amp;nbsp; nameif management&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier;"&gt;&amp;nbsp; description Management VLAN subinterface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier;"&gt;&amp;nbsp; vlan 100&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier;"&gt;&amp;nbsp; ip address 192.168.100.1 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier;"&gt;&amp;nbsp; security level 10&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier;"&gt;&amp;nbsp; no shut&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: arial;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial, helvetica, sans-serif;"&gt;Your core switch would change it's interface facing the ASA from an access port to a trunk. You would ensure that VLANs for production (VLAN of current traffic) and management traffic (VLAN 100) were allowed on the trunk.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: arial;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial, helvetica, sans-serif;"&gt;If you want non-management network devices and systems to talk to the management network, you'll need to add routing and potentially access-list bits to accomodate that.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Jul 2013 13:34:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/management-on-asa/m-p/2274291#M346528</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2013-07-13T13:34:26Z</dc:date>
    </item>
    <item>
      <title>management on asa</title>
      <link>https://community.cisco.com/t5/network-security/management-on-asa/m-p/2274292#M346532</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Marvin.&lt;/P&gt;&lt;P&gt;How should i configure the core switch interface with ASA. will a Portchannel be ok between them ? i was thinking of using&amp;nbsp; a Layer3 Portchannel for routing purpose.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if i use trunk , how would the configuration look like, as we intend to use two ports on either side of ASA &amp;amp; Core switch to interface this link.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Appreciate all help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Jul 2013 03:10:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/management-on-asa/m-p/2274292#M346532</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2013-07-15T03:10:59Z</dc:date>
    </item>
    <item>
      <title>Re: management on asa</title>
      <link>https://community.cisco.com/t5/network-security/management-on-asa/m-p/2274293#M346535</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your switch can use a simple Layer 2 trunk. If you want to add multiple links and use an Etherchannel, I'd still stick with Layer 2. If you go Etherchannel (Layer 2 or layer 3), your ASA configuration will have to take that into account.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA configuration guide steps you through all of the various steps and considerations in setting up an Etherchannel &lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/interface_start.html#wp1329030" rel="nofollow"&gt;here&lt;/A&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Jul 2013 13:40:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/management-on-asa/m-p/2274293#M346535</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2013-07-15T13:40:31Z</dc:date>
    </item>
  </channel>
</rss>

