10-06-2017 08:11 AM - edited 02-21-2020 06:27 AM
Hello good folks,
I have not dealt with this type of Firewalls before and my Firewalling is rusty kind of. I have an small office and am installing:
1- Cisco ASA5506x
2- Cisco L3 Switch 3750 PoE
3- An Access point ( currently in use)
we have a 100 MB ETernet to the Internet.
It seems that there is no way that I can fifure out to connect a trunck from switch to the ASA? I am trying to put FW at te edge facing the provider and Cisco 3750 behind the ASA FW and connect the access pont traffic to the switch using an access-point VALAN (accesspoint)
is my thinking of a trunk between switch and ASA wrong? is teh ASA capable receiving a trunk?
Please advise,
Best REgards,
Masood
Solved! Go to Solution.
10-06-2017 08:39 AM - edited 10-06-2017 08:43 AM
Hi there,
Using a ASA 5505-X a trunk interface is acheived with a subinterface. If your trunk link from the 3750 was carrying VLANs 10,20,30 and connected to gi0/1 on the ASA you'd have this config:
! interface gigabitethernet 0/1.10 vlan 10
nameif vlan10 ip address 10.10.10.254 255.255.255.0 ! interface gigabitethernet 0/1.20 vlan 20
nameif vlan20 ip address 10.10.20.254 255.255.255.0 ! interface gigabitethernet 0/1.30 vlan 30
nameif vlan30 ip address 10.10.30.254 255.255.255.0 !
cheers,
Seb.
02-13-2018 11:52 PM
Yes, you can create a L3 link between the ASA and 3750. However unless you have an IPServices license for the 3750 you will not be able to run a dynamic IGP (EIGRP/ OSPF) between the devices. This means you will have to configure static routes. Great for the short term, but may not scale very well in the future.
cheers,
Seb.
10-06-2017 08:35 AM
10-06-2017 08:39 AM - edited 10-06-2017 08:43 AM
Hi there,
Using a ASA 5505-X a trunk interface is acheived with a subinterface. If your trunk link from the 3750 was carrying VLANs 10,20,30 and connected to gi0/1 on the ASA you'd have this config:
! interface gigabitethernet 0/1.10 vlan 10
nameif vlan10 ip address 10.10.10.254 255.255.255.0 ! interface gigabitethernet 0/1.20 vlan 20
nameif vlan20 ip address 10.10.20.254 255.255.255.0 ! interface gigabitethernet 0/1.30 vlan 30
nameif vlan30 ip address 10.10.30.254 255.255.255.0 !
cheers,
Seb.
10-06-2017 08:45 AM
10-06-2017 08:51 AM
On the ASA, what is the output of:
sh arp
On the 3750:
sh mac add dyn
sh spanning-tree vlan 48
sh spanning-tree vlan 101
10-06-2017 08:53 AM
10-06-2017 08:52 AM
Thank you,
I was going through the document you provied a link for and I see the following: what secondary means in this case? I remember back in the days we used to use " secondary" under a router's sub-interface but does it means the same here?
I have only three vlans:
access-point vlan
guest vlan
managmet and normal users vlan.
Best Regards,
Masood
no vlan 200 secondary 503 show running-config interface gigabitethernet0/6.200 ! interface GigabitEthernet0/6.200 vlan 200 secondary 500 600-700 no nameif no security-level no ip address
03-16-2018 04:38 AM - edited 03-16-2018 04:38 AM
I admit I also didn't know the meaning of secondary key word for vlans on ASA.
Here's what I found on the config guide
Specify the VLAN for the subinterface:
vlan vlan_id [secondary vlan_range]
Example:
ciscoasa(config-subif)# vlan 101 secondary 52 64,66-74
The vlan_id is an integer between 1 and 4094. Some VLAN IDs might be reserved on connected switches, so check the switch documentation for more information.
The secondary VLANs can be separated by spaces, commas, and dashes (for a contiguous range). When the ASA receives traffic on the secondary VLANs, it maps the traffic to the primary VLAN.
You cannot assign the same VLAN to multiple subinterfaces. You cannot assign a VLAN to the physical interface. Each subinterface must have a VLAN ID before it can pass traffic. To change a VLAN ID, you do not need to remove the old VLAN ID with the no option; you can enter the vlan command with a different VLAN ID, and the ASA changes the old ID. To remove some secondary VLANs from the list, you can use the no command and only list the VLANs to remove. You can only selectively remove listed VLANs; you cannot remove a single VLAN in a range, for example.
03-16-2018 07:37 AM
02-13-2018 08:23 PM
02-13-2018 11:52 PM
Yes, you can create a L3 link between the ASA and 3750. However unless you have an IPServices license for the 3750 you will not be able to run a dynamic IGP (EIGRP/ OSPF) between the devices. This means you will have to configure static routes. Great for the short term, but may not scale very well in the future.
cheers,
Seb.
02-14-2018 12:30 AM
03-15-2018 01:49 PM
Hi, I"m curious what was the last solution you got in this scenario? I meant connecting the 5506x to the 3750PoE. Do you mind to share config (of course not real IP and credential)? Thanks much
03-15-2018 02:24 PM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide