<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic FIREWALL VLANS-HOW DOES IT WORK in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firewall-vlans-how-does-it-work/m-p/1270371#M819988</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have ASA 5540 whose Gig2 interface is subinterfaced into 3-vlans 40,50,60.Do I need to trunk the port(cable is coming from ASA Gig2 interface) on the switch and create VLANS 40,50 and 60 on the switch in order to get the hosts in these vlans working ? Do I have to do anything to Gig2 interface ?Please see config below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;______________________________________&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2.40&lt;/P&gt;&lt;P&gt; vlan 40&lt;/P&gt;&lt;P&gt; nameif DMZ-Public&lt;/P&gt;&lt;P&gt; security-level 40&lt;/P&gt;&lt;P&gt; ip address 10.32.240.1 255.255.255.0 standby 10.32.240.2 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2.50&lt;/P&gt;&lt;P&gt; vlan 50&lt;/P&gt;&lt;P&gt; nameif DMZ-2&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.32.241.1 255.255.255.0 standby 10.32.241.2 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2.60&lt;/P&gt;&lt;P&gt; vlan 60&lt;/P&gt;&lt;P&gt; nameif DMZ-3&lt;/P&gt;&lt;P&gt; security-level 60&lt;/P&gt;&lt;P&gt; ip address 10.32.242.1 255.255.255.0 standby 10.32.242.2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 16:03:55 GMT</pubDate>
    <dc:creator>CCDECCDE9</dc:creator>
    <dc:date>2019-03-11T16:03:55Z</dc:date>
    <item>
      <title>FIREWALL VLANS-HOW DOES IT WORK</title>
      <link>https://community.cisco.com/t5/network-security/firewall-vlans-how-does-it-work/m-p/1270371#M819988</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have ASA 5540 whose Gig2 interface is subinterfaced into 3-vlans 40,50,60.Do I need to trunk the port(cable is coming from ASA Gig2 interface) on the switch and create VLANS 40,50 and 60 on the switch in order to get the hosts in these vlans working ? Do I have to do anything to Gig2 interface ?Please see config below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;______________________________________&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2.40&lt;/P&gt;&lt;P&gt; vlan 40&lt;/P&gt;&lt;P&gt; nameif DMZ-Public&lt;/P&gt;&lt;P&gt; security-level 40&lt;/P&gt;&lt;P&gt; ip address 10.32.240.1 255.255.255.0 standby 10.32.240.2 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2.50&lt;/P&gt;&lt;P&gt; vlan 50&lt;/P&gt;&lt;P&gt; nameif DMZ-2&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.32.241.1 255.255.255.0 standby 10.32.241.2 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2.60&lt;/P&gt;&lt;P&gt; vlan 60&lt;/P&gt;&lt;P&gt; nameif DMZ-3&lt;/P&gt;&lt;P&gt; security-level 60&lt;/P&gt;&lt;P&gt; ip address 10.32.242.1 255.255.255.0 standby 10.32.242.2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:03:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-vlans-how-does-it-work/m-p/1270371#M819988</guid>
      <dc:creator>CCDECCDE9</dc:creator>
      <dc:date>2019-03-11T16:03:55Z</dc:date>
    </item>
    <item>
      <title>Re: FIREWALL VLANS-HOW DOES IT WORK</title>
      <link>https://community.cisco.com/t5/network-security/firewall-vlans-how-does-it-work/m-p/1270372#M819989</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;your config on the ASA looks fine..on the switch, you will need to trunk the port using dot1q, and you will need to create those vlans - 40,50,60 - and allow them on the trunk port of the switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Aug 2009 14:27:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-vlans-how-does-it-work/m-p/1270372#M819989</guid>
      <dc:creator>srue</dc:creator>
      <dc:date>2009-08-07T14:27:00Z</dc:date>
    </item>
    <item>
      <title>Re: FIREWALL VLANS-HOW DOES IT WORK</title>
      <link>https://community.cisco.com/t5/network-security/firewall-vlans-how-does-it-work/m-p/1270373#M819991</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;these VLANS on the swith need to have same subnet as firewall VLAN interfaces ?&lt;/P&gt;&lt;P&gt;in this case&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on switch :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interface VLAN 40&lt;/P&gt;&lt;P&gt;ip address 10.32.240.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interface VLAN 50&lt;/P&gt;&lt;P&gt;ip address 10.32.241.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interface VLAN 60&lt;/P&gt;&lt;P&gt;ip address 10.32.242.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Aug 2009 15:04:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-vlans-how-does-it-work/m-p/1270373#M819991</guid>
      <dc:creator>CCDECCDE9</dc:creator>
      <dc:date>2009-08-10T15:04:44Z</dc:date>
    </item>
    <item>
      <title>Re: FIREWALL VLANS-HOW DOES IT WORK</title>
      <link>https://community.cisco.com/t5/network-security/firewall-vlans-how-does-it-work/m-p/1270374#M819992</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You don't need to create L3 vlans in the switch as you already have the firewall as a layer 3 device for those network. You just simply need to do what Steven indicated in his post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Create the vlans in the switch &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;exmaple:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;switch&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WS1(config)vlan database&lt;/P&gt;&lt;P&gt;WS1(vlan)#vlan 40 name 10.32.240.0/24_net&lt;/P&gt;&lt;P&gt;WS1(vlan)#vlan 50 name 10.32.241.0/24_net&lt;/P&gt;&lt;P&gt;WS1(vlan)# vlan 60 name 10.32.242.0/24_net&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then create dot1q trunk on the physical port in the switch that connects to the forewall..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SW1(config)#interface fe0/xx&lt;/P&gt;&lt;P&gt;SW1(config)#Description Connection to ASA&lt;/P&gt;&lt;P&gt;SW1(config)#switchport mode trunk&lt;/P&gt;&lt;P&gt;SW1(config)#switchport trunk encapsulation dot1q&lt;/P&gt;&lt;P&gt;SW1(config)#switchport trunk allowed vlan 40,50,60 etc..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then assign ports to respective vlans for hosts in the switch..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Aug 2009 15:38:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-vlans-how-does-it-work/m-p/1270374#M819992</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2009-08-11T15:38:03Z</dc:date>
    </item>
  </channel>
</rss>

