cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
427
Views
0
Helpful
6
Replies

ASA 5540 and 2960 Switch problem

gasparmenendez
Level 3
Level 3

Hi,

I have my ASA 5540 configured with IP address 10.0.0.1/29 in the INSIDE interface and a public IP in the OUTSIDE. Connected to the ASA I have a Cisco Switch 2960 (L2) with 2 vLan's: vlan 230 (no DHCP) with IP address 10.0.0.2 and vlan 4 (DHCP) and IP address 10.4.0.1. In Switch I configured ip default-gateway 10.0.0.1

When I connect my Lap to a port in the 2960 configured in mode access in vlan 230 and set a static IP, etc. I can reach internet without problem.

The problem is when I configure the port in mode access to vlan 4 the Lap gets IP address by DHCP (10.4.0.2) but don't reach the internet. In fact, don't even ping the INSIDE interface of the ASA (10.0.0.1). In the ASA I did set up a static route like this: route INSIDE 10.4.0.0 255.255.240.0 10.0.0.2

From ASA I can ping IP 10.4.0.1 (vlan in Switch) but can't ping 10.4.0.2 (Lap)

What I'm missing here?? Could be a Switch problem??? Maybe cause it is L2??

Thanks in advance.

BR

6 Replies 6

Marvin Rhoads
Hall of Fame
Hall of Fame

Your L2 switch will not have the capability of routing to/from devices on VLAN 4. It can only support that for its own interfaces which is why you can ping the switch's IP addresses  

You would need at least something like IP Base features so that you can route between connected subnets.

To do what you want using that switch you would have to make the switch to ASA link a trunk port and configure the ASA with subinterfaces for each internal subnet. 

thank you very much Marvin!! I'm going to try to make subinterfaces and see how that modify the performance of ASA

Hi Marvin,

I already configured a subinterface with DHCP and DNS's in the ASA (vlan 2) and now when I connect my Lap to fe0/2 on Switch gets IP address (10.2.0.51) but doesn't reach internet. Here's my ASA configuration:

ciscoasa# sh running-config
: Saved
:
ASA Version 8.3(2)
!
hostname ciscoasa
enable password TFyi2xrxEwxJj25Z encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
!
interface GigabitEthernet0/0
 nameif OUTSIDE
 security-level 0
 ip address 148.X.X.X 255.255.255.252
!
interface GigabitEthernet0/1
 nameif INSIDE
 security-level 100
 ip address 10.0.0.1 255.255.255.248
!
interface GigabitEthernet0/2
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet0/2.2
 vlan 2       
 nameif Comercial2Mbps
 security-level 100
 ip address 10.2.0.1 255.255.240.0
!
interface GigabitEthernet0/3
 shutdown
 no nameif
 no security-level
 no ip address
!
interface Management0/0
 nameif management
 security-level 100
 ip address 192.168.0.25 255.255.255.0
 management-only
!
ftp mode passive
object network 10.0.0.0
 subnet 10.0.0.0 255.255.255.248
object network 10.2.0.0
 subnet 10.2.0.0 255.255.240.0
access-list Comercial2Mbps_access_in extended permit ip object 10.2.0.0 any
pager lines 24
logging asdm informational
mtu management 1500
mtu OUTSIDE 1500
mtu INSIDE 1500
mtu Comercial2Mbps 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
!
object network 10.0.0.0
 nat (any,OUTSIDE) dynamic interface
object network 10.2.0.0
 nat (any,OUTSIDE) dynamic interface
access-group Comercial2Mbps_access_in in interface Comercial2Mbps
route OUTSIDE 0.0.0.0 0.0.0.0 148.X.X.X 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
dynamic-access-policy-record DfltAccessPolicy
aaa-server TACACS+ protocol tacacs+
aaa authentication ssh console LOCAL
aaa authentication enable console LOCAL
aaa authentication telnet console LOCAL
http server enable
http 192.168.0.0 255.255.255.0 management
http 10.0.0.0 255.255.255.248 INSIDE
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
telnet timeout 5
ssh 10.0.0.0 255.255.255.0 INSIDE
ssh timeout 5
console timeout 0
dhcpd address 10.2.0.50-10.2.0.254 Comercial2Mbps
dhcpd dns 207.X.X.71 207.X.X.72 interface Comercial2Mbps
dhcpd enable Comercial2Mbps
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
webvpn
username gaspar password mUqiXpNram7TU37R encrypted privilege 15
username agustin password x1nwWb2knoLXX6jO encrypted privilege 15
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum client auto
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect rsh
  inspect rtsp
  inspect esmtp
  inspect sqlnet
  inspect skinny  
  inspect sunrpc
  inspect xdmcp
  inspect sip  
  inspect netbios
  inspect tftp
  inspect ip-options
!
service-policy global_policy global
prompt hostname context
Cryptochecksum:555735f7f1603becd877c16dda7b6c8f
: end

What am I missing here?? Can you helpme please??

Thanks in advance.

BR.

That looks pretty good. I'd suggest making your nat rules using the actual interfaces vs. using the 'any' keyword.

Also, 8.3(2) code is quite old with a lot of documented caveats  It would help if you could upgrade to the latest 9.1(x) for your platform.

All that aside, please run the following command:

packet-tracer input Commercial2Mbps tcp 10.2.0.51 1025 8.8.8.8 80

...and share the result. 

I always wanted to upgrade my ASA's, so here's a question: upgrade to 9.1(x) is it for free??

Upgrades generally require a support contract. Since your 5540 is long past end of sales they aren't selling new support contracts on the anymore 

I'd check the trunk parameters I mentioned earlier first. 

Review Cisco Networking for a $25 gift card