<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Revisiting basics in interface configuration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/revisiting-basics-in-interface-configuration/m-p/1804900#M533624</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; My head scratching on this begins with the fact that I have aleady configured the subinterface on the firewall. The configs I added above are actually from the ASA. I received no messages that I could not add a subinterface under the condition that I already had IP configured on Gi0/1, AND it didn't break the segment already live (96.x.x.1). Plus, when I ping from a laptop connected to VLAN 60 (192.168.1.x), I don't get a reply, but I see the translation in the Xlate table. &lt;/P&gt;&lt;P&gt;The reason I mention this is a buddy said that despite clinical thought that adding a subinterface to a physical interface "won't work", he has seen it work before. I can't say it's actually working, but how am I seeing my laptop's IP in the xlate table?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 15 Aug 2011 08:13:18 GMT</pubDate>
    <dc:creator>gregdzurinda</dc:creator>
    <dc:date>2011-08-15T08:13:18Z</dc:date>
    <item>
      <title>Revisiting basics in interface configuration</title>
      <link>https://community.cisco.com/t5/network-security/revisiting-basics-in-interface-configuration/m-p/1804898#M533621</link>
      <description>&lt;P&gt;I have an ASA5520 (8.2 version of firmware) whose physical ports are all taken. I want to add a subinterface, but I believe I have set it up incorrectly:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;description Ethernet to 2800 router (internet gateway)&lt;/P&gt;&lt;P&gt;speed 1000&lt;/P&gt;&lt;P&gt;duplex full&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 106.x.x.50 255.255.255.248 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;description Ethernet to 3750 switch for admin 207&lt;/P&gt;&lt;P&gt;speed 1000&lt;/P&gt;&lt;P&gt;duplex full&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;nameif admin&lt;/P&gt;&lt;P&gt;security-level 96&lt;/P&gt;&lt;P&gt;ip address 96.x.x.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.60&lt;/P&gt;&lt;P&gt;vlan 60&lt;/P&gt;&lt;P&gt;nameif vlan60&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.1.10 255.255.0.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt;description Ethernet to 3750 switch for student 10&lt;/P&gt;&lt;P&gt;speed 1000&lt;/P&gt;&lt;P&gt;duplex full&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 75&lt;/P&gt;&lt;P&gt;ip address 10.0.0.10 255.0.0.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt;description Ethernet to 3750 switch for admin 63&lt;/P&gt;&lt;P&gt;speed 1000&lt;/P&gt;&lt;P&gt;duplex full&lt;/P&gt;&lt;P&gt;nameif Admin2&lt;/P&gt;&lt;P&gt;security-level 98&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;ip address 109.x.x.1 255.255.255.0&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;description Ethernet to 2800 router (internet gateway)&lt;/P&gt;&lt;P&gt;speed 1000&lt;/P&gt;&lt;P&gt;duplex full&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 106.x.x.50 255.255.255.248 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;description Ethernet to 3750 switch for admin 207&lt;/P&gt;&lt;P&gt;speed 1000&lt;/P&gt;&lt;P&gt;duplex full&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;nameif admin&lt;/P&gt;&lt;P&gt;security-level 96&lt;/P&gt;&lt;P&gt;ip address 96.x.x.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface GigabitEthernet0/1.60&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;vlan 60&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;nameif vlan60&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;security-level 100&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ip address 192.168.1.10 255.255.0.0&lt;/EM&gt; &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt;description Ethernet to 3750 switch for student 10&lt;/P&gt;&lt;P&gt;speed 1000&lt;/P&gt;&lt;P&gt;duplex full&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 75&lt;/P&gt;&lt;P&gt;ip address 10.0.0.10 255.0.0.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt;description Ethernet to 3750 switch for admin 63&lt;/P&gt;&lt;P&gt;speed 1000&lt;/P&gt;&lt;P&gt;duplex full&lt;/P&gt;&lt;P&gt;nameif Admin2&lt;/P&gt;&lt;P&gt;security-level 98&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;ip address 109.x.x.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;Gi0/1.60 is the int I added. I believe that I have to remove the IP address from the physical interface (gi0/1) before I assign IP addresses to subinterfaces- can anyone confirm this? I suppose if I have to do that, I will have to add a separate subinterface to accomodate the already existing 96.x.x.1 net. If that notion is correct, and I do that, I should be able to ping from any device assigned to VLAN 60 to any device belonging to a VLAN in a lower security-level interface, correct?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:11:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/revisiting-basics-in-interface-configuration/m-p/1804898#M533621</guid>
      <dc:creator>gregdzurinda</dc:creator>
      <dc:date>2019-03-11T21:11:13Z</dc:date>
    </item>
    <item>
      <title>Revisiting basics in interface configuration</title>
      <link>https://community.cisco.com/t5/network-security/revisiting-basics-in-interface-configuration/m-p/1804899#M533622</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Greg,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes you would need to remove the ip address from the physical interface gig0/1 and create two sub-interfaces. The best practic that I follow is, first copy the config related to interface admin by :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run interface | in admin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;copy the config, then create sub-interface, because when you create the sub-interface, the physical interface configuration would be wiped out. Modify the config and apply it to the new interface, and then create as many new logical interfaces you want.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The two interfaces won't ping each other just because of higher to lower traffic flow, you would need to do nat translation for the traffic (if nat-control enabled) and allow the return ping packets. Lets say you have nat-conttrol enabled and you ping from vlan60 to admin, you would need:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (vlan60) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;global (admin) 1 interface&lt;/P&gt;&lt;P&gt;access-list test permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-group test in interface admin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and this would allow your ping traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Aug 2011 03:38:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/revisiting-basics-in-interface-configuration/m-p/1804899#M533622</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-13T03:38:43Z</dc:date>
    </item>
    <item>
      <title>Revisiting basics in interface configuration</title>
      <link>https://community.cisco.com/t5/network-security/revisiting-basics-in-interface-configuration/m-p/1804900#M533624</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; My head scratching on this begins with the fact that I have aleady configured the subinterface on the firewall. The configs I added above are actually from the ASA. I received no messages that I could not add a subinterface under the condition that I already had IP configured on Gi0/1, AND it didn't break the segment already live (96.x.x.1). Plus, when I ping from a laptop connected to VLAN 60 (192.168.1.x), I don't get a reply, but I see the translation in the Xlate table. &lt;/P&gt;&lt;P&gt;The reason I mention this is a buddy said that despite clinical thought that adding a subinterface to a physical interface "won't work", he has seen it work before. I can't say it's actually working, but how am I seeing my laptop's IP in the xlate table?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Aug 2011 08:13:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/revisiting-basics-in-interface-configuration/m-p/1804900#M533624</guid>
      <dc:creator>gregdzurinda</dc:creator>
      <dc:date>2011-08-15T08:13:18Z</dc:date>
    </item>
    <item>
      <title>Re: Revisiting basics in interface configuration</title>
      <link>https://community.cisco.com/t5/network-security/revisiting-basics-in-interface-configuration/m-p/1804901#M533626</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Gregory &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the ASA works in the same way as IOS then you should indeed be able to assign an ip to the physical interface and then use subinterfaces for other vlans. It is not the standard way of doing it but it doesn't mean it wouldn't work. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason you can do this is because if you have the physical interface with an IP and then subinterfaces the physical interface is assumed to be in the native vlan ie. the packets will not be tagged. So any packets coming from the native vlan on the switch will go to the physical interface and any tagged packets will be matched to the corresponding subinterface, assuming you have a subinterface for the tagged vlan.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Aug 2011 11:34:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/revisiting-basics-in-interface-configuration/m-p/1804901#M533626</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2011-08-15T11:34:11Z</dc:date>
    </item>
    <item>
      <title>Revisiting basics in interface configuration</title>
      <link>https://community.cisco.com/t5/network-security/revisiting-basics-in-interface-configuration/m-p/1804902#M533628</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What Jon, said about physical interface being assumed as a native vlan and packets hitting the interface untagged is absolutely spot on. You would be able to assign the ip address to both the sub-interface and physiocal interface, but you shoudl never do that, because of the same reason. Always create, different logical interfaces and then do your routing on ASA. This is never recommended by us.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Aug 2011 17:50:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/revisiting-basics-in-interface-configuration/m-p/1804902#M533628</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-15T17:50:54Z</dc:date>
    </item>
  </channel>
</rss>

