09-16-2017 02:42 AM - edited 02-21-2020 06:18 AM
Hello,
Please help me:
I need help to figure out how could segregate 4 different customers in a building behind Cisco ASA Firewall. I will post later on a network diagram: I got 2 access switches and a collapsed core switch then ASA firewall then Internet router (single).
I'd like to know what is the best practice to achieve this keeping in mind I'd avoid to impact on the other customers because of a single customer.
Router Internet
|
Firewall
|
Core switch
|
Access Switches
| | | |
custA custB custC custD
I have these ideas on this topic:
I'll appreciate any kind of help.
Solved! Go to Solution.
09-17-2017 05:02 AM - edited 09-17-2017 05:04 AM
I didn't forget them - I was leaving some of the work for you to figure out. :)
The basic NAT is to translate outbound traffic to the outside interface address. Whether or not you need that and any ACLs are dependent on whether or not your ASA is where NAT needs to happen - it isn't always the case - and whether or not you need to allow traffic initiated from the outside.
Basic NAT would look like this:
nat (CustomerA,outside) after-auto source dynamic any interface
nat (CustomerB,outside) after-auto source dynamic any interface
nat (CustomerC,outside) after-auto source dynamic any interface
nat (CustomerD,outside) after-auto source dynamic any interface
09-16-2017 05:37 AM
The easiest way is to use a sub-interface per customer / subnet (assuming they are all on different subnets). Do not permit same-security traffic intra-interface. Create NAT statements and access-lists for each subinterface / customer subnet separately.
ASA does not support VRFs and multiple context is more complexity than you need for this use case (in my opinion).
09-16-2017 07:05 AM
Hi Marvin,
appreciate your help. Let me think about it.
s0chia
09-16-2017 02:03 PM
09-16-2017 02:05 PM
Hi Marvin,
Could write a short config example at least for 1 customer just to have a more clear idea how it could be in the reality.
S0chia
09-16-2017 09:27 PM - edited 09-16-2017 09:31 PM
Something like the following:
interface GigabitEthernet0/1
no nameif
no security-level
no ip address
!
interface GigabitEthernet0/1.2
vlan 2
nameif CustomerA
security-level 100
ip address 10.2.2.2 255.255.255.0
!
interface GigabitEthernet0/1.3
vlan 3
nameif CustomerB
security-level 100
ip address 10.3.3.3 255.255.255.0
!
interface GigabitEthernet0/1.4
vlan 4
nameif CustomerC
security-level 100
ip address 10.4.4.4 255.255.255.0
!
interface GigabitEthernet0/1.5
vlan 5
nameif CustomerD
security-level 100
ip address 10.5.5.5 255.255.255.0
09-17-2017 03:20 AM
Hi Marvin,
great config but missing some part like NAT for each interface.
I say you wrote the same security level for each sub-interface just to segregate customers. It's good.
s0chia
09-17-2017 03:21 AM
Forgot also ACL...
09-17-2017 05:02 AM - edited 09-17-2017 05:04 AM
I didn't forget them - I was leaving some of the work for you to figure out. :)
The basic NAT is to translate outbound traffic to the outside interface address. Whether or not you need that and any ACLs are dependent on whether or not your ASA is where NAT needs to happen - it isn't always the case - and whether or not you need to allow traffic initiated from the outside.
Basic NAT would look like this:
nat (CustomerA,outside) after-auto source dynamic any interface
nat (CustomerB,outside) after-auto source dynamic any interface
nat (CustomerC,outside) after-auto source dynamic any interface
nat (CustomerD,outside) after-auto source dynamic any interface
09-17-2017 06:09 AM
Hi Marvin,
Thanks a lot. What book do you advice me to improve my Firewall/Security skill?
S0chia
09-17-2017 08:43 AM
You're welcome.
As far as books, the classic book is the Cisco Press one on ASAs:
https://www.amazon.com/Cisco-ASA-All-one-Next-Generation-ebook/dp/B00JZOP4U8
That is very comprehensive and sort of a classic - in its thrid edition. It won't cover Firepower though. For that, the follow-on book would be:
Or you could just get a Safari books subscription and add both (and several others) to your bookshelf. That's what I do.
09-17-2017 09:24 AM
Hi Marvin,
thanks!!!
I really appreciate your help.
Have a nice day and thanks for books advice as well.
s0chia
09-18-2017 06:55 AM
Hi Marvin,
in the case some customer (let's assume Customer_B) has the same network of Customer_C how could I manage it?
Using VRFs on the core switch and connected to Firewall usiing Sub-Interface?
this point is very obfuscated in my mind.
Appreciate any kind of help.
s0chia
09-18-2017 08:20 AM
If you have overlapping customer subnets and want to share a common ASA then the ASA must be multiple context mode.
If you choose that alternative then you just upped the complexity by an order of magnitude and it is not the best project to take on if you are new to ASA.
09-18-2017 10:11 AM
Hi Marvin,
Thanks for your quick reply.
I know how to implement Multiple Security Context (I made a home lab for that) but it was very hard.
Appreciate once again.
s0chia
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide