I guess one of the typical solutions would be to configure the server port to their own Vlan on the switch and configure a Trunk interface between the switch and the ASA. And in this case there would naturally be no L3 interface for these Vlans on the L3 switch or if there is it would not be the gateway for the actual subnets (gateway on the ASA)
As your current link between the ASA and the L3 switch is a routed link you could either configure a new physical link between the switch and the ASA or modify the current link to a Trunk. If you configured the current link as Trunk then naturally every subnets gateway should be moved to the ASA and the switch would mainly act a normal L2 switch.
Naturally if you want to keep the switch L3 for all the subnets and still route the traffic through the ASA then you could check if the switch supports VRF Lite (or whatever the official term is) and
Configure a VRF for each different network segment
Separate VRFs for the required DMZs
Single one for the LANs unless you want to separate the LAN traffic also (if you even have multiple LAN subnets)
and so on
Using the VRFs would separate the routing of the subnets configured under the Vlan interfaces and you could route all traffic through the ASA. The link between the ASA could be Trunk in this case. Naturally if there is need you could use a couple of physical interfaces on ASA/Switch and configure a Port-channel between the ASA and the L3 switch if you feel that one 1Gbps link is not enough. Though I guess the ASA models throughput was pretty close to 1Gbps anyway.
The 2020 IT Blog Awards, hosted by Cisco, is now open for submissions through October 16. Submit your blog, vlog or podcast today. For more information, including category details, the process, past winners and FAQs, check out: https:...
Do we have any document around ISE 3.0 agentless posture. Techzone type document with steps.
Besides, where can we download agentless posture module? Is it only available to download from ISE admin GUI, or is it available at CCO?
Hi, We are getting below Alarm on ISE frequently. we verified COA enabled on WLC and there is no impact on users as we didnt receive any complain from users. Dynamic Authorization Failed for Device : Server=ISE-1; Network Device Name=WLC WLC Firmware = 8....
the Cisco CPN Client for a long time to connect to a VPN Server. Now I've got a new machine with a Windows 7 64 bit. The Cisco VPN Client isn't avaiable in a 64 bit version. Cisco suggests to use Cisco AnyConnect instead because there'a 64 bit version ava...
May 2016Splunk is a powerful tool for analyzing information in your organization by collecting, storing, alerting, reporting, and analyzing machine data. With Cisco platform Exchange Grid (pxGrid) Splunk is able to proactively act on received network secu...