<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic FWSM - change which VLAN interface is inside in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fwsm-change-which-vlan-interface-is-inside/m-p/1209178#M859746</link>
    <description>&lt;P&gt;Hello all, thank you in advance for any and all suggestions&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have inherited a network with redundant 6509 "DMZ" switches with a single FWSM installed in each - routed, single context, in failover configuration.  Each FWSM has multiple VLAN interfaces, including inside, outside, and approximately 10 other DMZ interfaces with varying security levels.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is clear that the inside interface (and all related NAT, static, route, and access rules) needs to be removed from the existing VLAN 4 interface, and applied to an as yet-to-be-created VLAN 2 interface.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am in the planning stages for this migration and am researching others' experience with this or similar activities.  The configuration steps as I see them would be:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Take backups of existing active and standby FWSMs.&lt;/P&gt;&lt;P&gt;2. Create VLAN 2 in 6509 switches' IOS, share to FWSM in firewall-group&lt;/P&gt;&lt;P&gt;3. Shutdown standby FWSM (don't want it "taking over" once it determines that the primary inside interface is down)&lt;/P&gt;&lt;P&gt;4. Remove the inside ACL from the interface interface (I believe this will allow the inside_acl to remain in configuration when the inside interface is deleted)&lt;/P&gt;&lt;P&gt;5. issue "no interface Vlan 4" on primary (I believe all "inside" related NAT, static, and route rules will be deleted at this point).&lt;/P&gt;&lt;P&gt;6. create interface Vlan 2, issue "nameif inside" and assign inside IP address.&lt;/P&gt;&lt;P&gt;7. From backup, reconfigure NATs, statics, and inside routes.&lt;/P&gt;&lt;P&gt;8. Re-apply the "inside_acl" to the inside interface.&lt;/P&gt;&lt;P&gt;9. Clear conn, clear xlate, etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Next will be to bring standby FWSM back online and this is where I have some doubts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Isolate standby module (shutdown trunked interfaces between switches, perhaps also remove all VLANs from firewall-group.  I think I would want to isolate this FWSM to prevent any sync'ing issues between active and standby so that the standby won't overwrite any of the changes I made on the active FWSM - not sure if I am being paranoid here and whether I need to do this...)&lt;/P&gt;&lt;P&gt;2. Power on and session into FWSM, remove interface VLAN 4, create interface VLAN 2, nameif inside, configure IP Address, no shut.&lt;/P&gt;&lt;P&gt;3. Share all VLANs back to FWSM from IOS switch, failover and monitored interface configurations should re-establish active/standby relationship between FWSMs.&lt;/P&gt;&lt;P&gt;4. Test applications, routing, access, etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems to me that there should be an easier way to accomplish my goal of changing which interface is "inside", but I have not performed this activity before.  I think my steps above should work, although I concede I might be missing some things that will crop up when I am in the middle of the change.  I would appreciate any insight into this scenario.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Curtis.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 15:33:01 GMT</pubDate>
    <dc:creator>charrellc011699</dc:creator>
    <dc:date>2019-03-11T15:33:01Z</dc:date>
    <item>
      <title>FWSM - change which VLAN interface is inside</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-change-which-vlan-interface-is-inside/m-p/1209178#M859746</link>
      <description>&lt;P&gt;Hello all, thank you in advance for any and all suggestions&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have inherited a network with redundant 6509 "DMZ" switches with a single FWSM installed in each - routed, single context, in failover configuration.  Each FWSM has multiple VLAN interfaces, including inside, outside, and approximately 10 other DMZ interfaces with varying security levels.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is clear that the inside interface (and all related NAT, static, route, and access rules) needs to be removed from the existing VLAN 4 interface, and applied to an as yet-to-be-created VLAN 2 interface.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am in the planning stages for this migration and am researching others' experience with this or similar activities.  The configuration steps as I see them would be:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Take backups of existing active and standby FWSMs.&lt;/P&gt;&lt;P&gt;2. Create VLAN 2 in 6509 switches' IOS, share to FWSM in firewall-group&lt;/P&gt;&lt;P&gt;3. Shutdown standby FWSM (don't want it "taking over" once it determines that the primary inside interface is down)&lt;/P&gt;&lt;P&gt;4. Remove the inside ACL from the interface interface (I believe this will allow the inside_acl to remain in configuration when the inside interface is deleted)&lt;/P&gt;&lt;P&gt;5. issue "no interface Vlan 4" on primary (I believe all "inside" related NAT, static, and route rules will be deleted at this point).&lt;/P&gt;&lt;P&gt;6. create interface Vlan 2, issue "nameif inside" and assign inside IP address.&lt;/P&gt;&lt;P&gt;7. From backup, reconfigure NATs, statics, and inside routes.&lt;/P&gt;&lt;P&gt;8. Re-apply the "inside_acl" to the inside interface.&lt;/P&gt;&lt;P&gt;9. Clear conn, clear xlate, etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Next will be to bring standby FWSM back online and this is where I have some doubts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Isolate standby module (shutdown trunked interfaces between switches, perhaps also remove all VLANs from firewall-group.  I think I would want to isolate this FWSM to prevent any sync'ing issues between active and standby so that the standby won't overwrite any of the changes I made on the active FWSM - not sure if I am being paranoid here and whether I need to do this...)&lt;/P&gt;&lt;P&gt;2. Power on and session into FWSM, remove interface VLAN 4, create interface VLAN 2, nameif inside, configure IP Address, no shut.&lt;/P&gt;&lt;P&gt;3. Share all VLANs back to FWSM from IOS switch, failover and monitored interface configurations should re-establish active/standby relationship between FWSMs.&lt;/P&gt;&lt;P&gt;4. Test applications, routing, access, etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems to me that there should be an easier way to accomplish my goal of changing which interface is "inside", but I have not performed this activity before.  I think my steps above should work, although I concede I might be missing some things that will crop up when I am in the middle of the change.  I would appreciate any insight into this scenario.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Curtis.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 15:33:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-change-which-vlan-interface-is-inside/m-p/1209178#M859746</guid>
      <dc:creator>charrellc011699</dc:creator>
      <dc:date>2019-03-11T15:33:01Z</dc:date>
    </item>
  </channel>
</rss>

