cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2151
Views
10
Helpful
6
Replies

ASA 5506-X Sub Interface/VLAN not giving out DHCP addresses

errMsg
Level 1
Level 1

I bought a 5506-x to learn it but the only thing I'm learning is that its becoming a pain to do the things I want to do.  I am trying to create a VLAN which is supposed to be created by making a sub-interface.  I have setup the configuration several times and have the computer plugged into the port i configured gi1/5.40 but the interface will not give it an address.  I am posting my configuration for some assistance. I have bolded the details I'm working with. Thanks

===============================================================


FW1(config-if)# sh run
: Saved

:
: Serial Number:
: Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)
:
ASA Version 9.8(2)
!
hostname FW1
domain-name
enable password
names
ip local pool VPNPool1 192.168.1.150-192.168.1.200 mask 255.255.255.0

!
interface GigabitEthernet1/1
nameif outside
security-level 0
ip address dhcp setroute
!
interface GigabitEthernet1/2
bridge-group 1
nameif inside_1
security-level 100
!
interface GigabitEthernet1/3
bridge-group 1
nameif inside_2
security-level 100
!
interface GigabitEthernet1/4
bridge-group 1
nameif inside_3
security-level 100
!
interface GigabitEthernet1/5
no nameif
no security-level
no ip address
!
interface GigabitEthernet1/5.40
vlan 40
nameif atlantis_lan
security-level 100
ip address 192.168.4.1 255.255.255.0
!
interface GigabitEthernet1/6
bridge-group 1
nameif inside_5
security-level 100
!
interface GigabitEthernet1/7
bridge-group 1
nameif inside_6
security-level 100
!
interface GigabitEthernet1/8
bridge-group 1
nameif inside_7
security-level 100
!
interface Management1/1
management-only
no nameif
no security-level
no ip address
!
interface BVI1
nameif inside
security-level 100
ip address 192.168.1.1 255.255.255.0
!
ftp mode passive
clock timezone EST -5
clock summer-time EDT recurring
dns server-group DefaultDNS
domain-name
same-security-traffic permit inter-interface
object network obj_any1
subnet 0.0.0.0 0.0.0.0
object network obj_any2
subnet 0.0.0.0 0.0.0.0
object network obj_any3
subnet 0.0.0.0 0.0.0.0
object network obj_any4
subnet 0.0.0.0 0.0.0.0
object network obj_any5
subnet 0.0.0.0 0.0.0.0
object network obj_any6
subnet 0.0.0.0 0.0.0.0
object network obj_any7
subnet 0.0.0.0 0.0.0.0
object network VPNPool1
range 192.168.1.150 192.168.1.200
description vpn pool
object network atlantis_lan
subnet 192.168.1.0 255.255.255.0
object-group network vpnclients1
description vpnpool1
network-object object VPNPool1
access-list split-tunnel standard permit 192.168.1.0 255.255.255.0
access-list OUT extended permit icmp any any
pager lines 24
logging enable
logging asdm informational
mtu outside 1500
mtu inside_1 1500
mtu inside_2 1500
mtu inside_3 1500
mtu atlantis_lan 1500
mtu inside_5 1500
mtu inside_6 1500
mtu inside_7 1500
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
arp rate-limit 16384
nat (inside_1,outside) source static obj_any1 obj_any1 destination static VPNPool1 VPNPool1
!
object network obj_any1
nat (inside_1,outside) dynamic interface
object network obj_any2
nat (inside_2,outside) dynamic interface
object network obj_any3
nat (inside_3,outside) dynamic interface
object network obj_any5
nat (inside_5,outside) dynamic interface
object network obj_any6
nat (inside_6,outside) dynamic interface
object network obj_any7
nat (inside_7,outside) dynamic interface
object network atlantis_lan
nat (atlantis_lan,outside) dynamic interface
access-group OUT in interface outside
route outside 0.0.0.0 0.0.0.0 192.168.4.0 1
route outside 0.0.0.0 0.0.0.0 192.168.1.2 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
timeout conn-holddown 0:00:15
timeout igp stale-route 0:01:10
user-identity default-domain LOCAL
aaa authentication ssh console LOCAL
aaa authentication login-history
http server enable
http 192.168.1.0 255.255.255.0 inside_1
http 192.168.1.0 255.255.255.0 inside_2
http 192.168.1.0 255.255.255.0 inside_3
http 192.168.1.0 255.255.255.0 inside_5
http 192.168.1.0 255.255.255.0 inside_6
http 192.168.1.0 255.255.255.0 inside_7
no snmp-server location
no snmp-server contact
service sw-reset-button
crypto ipsec security-association pmtu-aging infinite
crypto ca trustpoint ASDM_TrustPoint0
enrollment self
subject-name CN=FW1
proxy-ldc-issuer
crl configure
crypto ca trustpool policy
crypto ikev2 remote-access trustpoint ASDM_TrustPoint0
telnet timeout 5
ssh stricthostkeycheck
ssh 192.168.1.0 255.255.255.0 inside_1
ssh timeout 5
ssh key-exchange group dh-group1-sha1
console timeout 0

dhcpd dns 192.168.1.1
dhcpd auto_config outside
!
dhcpd address 192.168.4.5-192.168.4.220 atlantis_lan
dhcpd enable atlantis_lan
!
dhcpd address 192.168.1.5-192.168.1.254 inside
dhcpd enable inside
!

2 Accepted Solutions

Accepted Solutions

Francesco Molino
VIP Alumni
VIP Alumni
Hi

First the object group atlantis-lan has the bad subnet (192.168.1.0 instead of 192.168.4.0)

If you plug the computer directly to interface configured has sub-interface it won't work as asa will expect a traffic tagged with the vlan you setup.
You need to connect a switch with a trunk Interface facing the asa and a computer connected to a port with access port vlan 40.

Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question

View solution in original post

No i said if you want to put an ip address on every interfaces (because you asked for /24 on each port) you'll need to remove them from bridge-group.
You can have a mix without issue.

Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question

View solution in original post

6 Replies 6

Francesco Molino
VIP Alumni
VIP Alumni
Hi

First the object group atlantis-lan has the bad subnet (192.168.1.0 instead of 192.168.4.0)

If you plug the computer directly to interface configured has sub-interface it won't work as asa will expect a traffic tagged with the vlan you setup.
You need to connect a switch with a trunk Interface facing the asa and a computer connected to a port with access port vlan 40.

Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question

Thanks for that correction. Can't I just have a different /24 network configured on each port on the ASA without using VLANS?

Yes you can remove the bridge-group on all interfaces and assign a different subnet on each of them.
Just be careful about security-level and communication between interfaces using command "same-traffic inter interface" or "same-traffic intra interface" if traffic stays within the same interface (asa interface ip as default gateway).

Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question

Last question...Your're saying that I cant have ANY bridge-groups if I do it this way? I would want to have certain hosts communicate to different subnets on different interfaces, would I be doing something that is not best practice?
Thanks

No i said if you want to put an ip address on every interfaces (because you asked for /24 on each port) you'll need to remove them from bridge-group.
You can have a mix without issue.

Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question

workaround
!
interface BVI 40
nameif atlantis_lan
security-level 100
ip address 192.168.4.1 255.255.255.0
!
interface GigabitEthernet1/5.40
vlan 40
bridge-group 40
nameif atlantis_lan_2
security-level 100
!
interface GigabitEthernet1/X   (IF You plug your computer it will work on BVI 40)
bridge-group 40
nameif LAPTOP
security-level 100

please do not forget to rate.
Review Cisco Networking products for a $25 gift card