08-24-2017 02:26 AM - edited 02-21-2020 06:14 AM
I'm having a hard time "tracing" how ACL's on subinterfaces on a Cisco ASA work.
Let's create a simple scenario:
- ASA Gi0/0: trunk to SW01 Gi0/0
- ASA Gi0/0.10: VLAN10 subinterface
- ASA Gi0/0.20: VLAN20 subinterface
- SW01 has both VLAN's and Gi0/0 configured as trunk without any pruning/acl's or whatsoever
- PC1 in VLAN10 connected to SW01
- PC2 in VLAN20 connected to SW01
Now the question: how should i interpret this ACL-wise when i ping from PC1 to PC2. If you look at the ASA, is it only incomming in VLAN10? Or is it also incomming in VLAN20 since the ping needs to go back also...
Solved! Go to Solution.
08-24-2017 03:29 AM - edited 08-24-2017 04:50 AM
Hi Eric,
If you think of sub-interfaces the same way you would if they were seperate physical interfaces, it should help visualise the traffic flows.
1 - PC1 will send data 'inbound' to Gi0/0.10.
2 - ASA will send data 'outbound' via Gi0/0.20 (where PC2 is located)
You could permit or deny ICMP traffic for your example using the direction listed above. When PC2 does an ICMP reply to PC1, the opposite flow comes in to effect.
1 - PC2 sends traffic 'inbound' to Gi0/0.20
2 - ASA sends traffic 'outbound' via Gi0/0.10 (where PC1 is located)
So if you ICMP traffic was being denied from PC1 to PC2, you would have to check both the INBOUND and OUTBOUND ACLs on both interfaces.
Check out the image below. Uses a router and it's SVIs as an example but the concept is the same.
Also remember there is an order of operations, so if you have NAT, application inspection etc, you will have to take this in to consideration too.
Hope this helps
-Brett
08-24-2017 03:29 AM - edited 08-24-2017 04:50 AM
Hi Eric,
If you think of sub-interfaces the same way you would if they were seperate physical interfaces, it should help visualise the traffic flows.
1 - PC1 will send data 'inbound' to Gi0/0.10.
2 - ASA will send data 'outbound' via Gi0/0.20 (where PC2 is located)
You could permit or deny ICMP traffic for your example using the direction listed above. When PC2 does an ICMP reply to PC1, the opposite flow comes in to effect.
1 - PC2 sends traffic 'inbound' to Gi0/0.20
2 - ASA sends traffic 'outbound' via Gi0/0.10 (where PC1 is located)
So if you ICMP traffic was being denied from PC1 to PC2, you would have to check both the INBOUND and OUTBOUND ACLs on both interfaces.
Check out the image below. Uses a router and it's SVIs as an example but the concept is the same.
Also remember there is an order of operations, so if you have NAT, application inspection etc, you will have to take this in to consideration too.
Hope this helps
-Brett
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide