04-19-2023 11:23 PM
Hi, Can we configure the trunk port on Cisco FPR-2110 to communicate with Cisco 9300 series switches? I want to use Cisco FPR-2110 to allow routing between vlans after trunk port configuration.
Solved! Go to Solution.
04-21-2023 03:33 AM
I prefer this Desing, the FW HA with transparent mode only do inspection of traffic and Core (agg) do routing. (Solution1)
since there is no meaning of Core SW (with L3 capability) in your network and with additional FW for internet.
then connect the both Core SW to FW (internet)
04-21-2023 03:53 AM
Thanks for your recommendations. But as per the client requirement, network should work this way:
1) Routing between internal Vlan's (with few restriction on routing between vlans) should happen via dedicated Internal Firewall. Internal Firewall will be in HA mode and will be connected to core switch.
2) ISP firewall with HA should connect directly to core switch for internet access. Can you please suggest, what configuration I should do to have internet on devices via core switch?
04-21-2023 04:03 AM - edited 04-21-2023 04:03 AM
in Core you config new VLANx, this VLANx have subinterface (or connect to interface) in internal FW and interface in FW(internet)
NOW traffic
Client->Access SW->Core->internal FW HA -VLANx->Core->FW(internet)
in FW HA internal there is default route toward the FW (internet)
04-21-2023 05:22 AM - edited 04-21-2023 05:23 AM
Keep in mind please that connecting the external edge firewalls to the core switch is not recommended even if those connections will be placed into a separate VLAN, but still. I would personally try to convence the customer not to do so.
If there is no other option, then as @MHM Cisco World explained you would need to create a new VLAN and connect the ISP firewall to that VLAN, however, you also need to create a subinterface on the internal firewalls in that same VLAN and then allow it on the trunk ports between the internal firewalls and the core switches, then finally you configure the default route to the internet on the internal firewalls pointing to the external ones.
04-21-2023 06:54 AM
Thanks for the architecture diagram. It is not clear to me. Just have a quick question here that we dont have stacking between the core switch 1 and 2. We only have fiber connection between them. I think this will not make any problem nor will create any loop in the network. Redundancy in the network to access switches will be taken via firewall HA. Do you have any other opinion on this?
04-21-2023 07:00 AM
Thanks for the architecture diagram. It is now clear to me. Just have a quick question here that we dont have stacking between the core switch 1 and 2. We only have fiber connection between them (no VSS nor HSRP, just as trunk between them via fibre). I think this will not make any problem nor will create any loop in the network. Redundancy in the network to access switches will be taken via firewall HA. Do you have any other opinion on this?
04-21-2023 07:33 AM
Yes that won't be a problem. The design can be different without affecting the connectivity between the switches and the firewalls. A simplified design would look like this and you can still achieve same result:
04-21-2023 07:49 AM
this topology not correct
1- FW internet must connect to one Core SW not to both since the Core SW not run VSS nor vPC
2- Core SW must interconnect to provide redundancy and provide L2 for FW HA, otherwise the traffic must pass to access SW.
04-21-2023 08:07 AM
for first point since Core is no stack then you can use redundant interface and connect to both SW.
04-21-2023 08:07 AM
Hi, Can u please suggest as per reply from @MHM Cisco World? what will be the design. we are using C9300X-24Y-A switch as core switch which dosnt support VSS or vPC.
04-21-2023 08:14 AM
@inhamit or another option. Use traffic zones on the inside interfaces on the single internet firewall, this will ECMP over the two links (one to each 9300) - https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/configuration/general/asa-98-general-config/interface-zones.html
04-21-2023 08:24 AM
Mmm, can't those interfaces on the ISP firewall be grouped? Regarding the HA, I don't think the firewalls HA would be affected by the interconnect link of the core switches. If you connect the firewalls HA link(s) directly you don't need any interconnection between the core switches.
04-21-2023 08:29 AM
This design we have it from customer. Can @MHM Cisco World @Aref Alsouqi @Rob Ingram please suggest? Lot of confusion for me as of now.
04-21-2023 08:43 AM - edited 04-21-2023 08:45 AM
this design is perfect, which point confuse you ?
just make sure that both STP Core SW elect as root primary and root secondary
04-21-2023 09:01 AM
Hi, I got confused with this point "FW internet must connect to one Core SW not to both since the Core SW not run VSS nor vPC". Core switches will be inter connected via fibre only for trunk port connection between them. Since we have Internet firewall in HA mode, we will have single link from each ISP firewall to core switch to achieve the redundancy from ISP network.
Yes, we will configure core switch 1 as root primary for all vlan and core switch 2 as root secondary.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide