10-03-2016 09:52 AM - edited 03-12-2019 01:21 AM
A co-worker is setting up a firewall, and he configured a firewall with a trunked port-channel and 2 sub-interfaces on the ASA. One of the sub-interfaces is "Inside" the other is "Outside".
Personally, I don't like this setup because you're using the same physical interface for secure and insecure traffic. Not to mention that you're hairpinning all of the traffic across the one physical interface (or port-channel in this case).
Is there a best practice or a general consensus as to why having the Inside and Outside on the same physical interface is a bad idea?
I'm just looking for some backup beyond my own personal experience and opinion.
Thanks.
Solved! Go to Solution.
10-04-2016 06:42 AM
Hi,
Personally I do not see this as a major issue, we see scenarios where all four interfaces of an ASA are tied in one port channel and then sub interface concept is being used. So i would say there is no major issue that you are going to face because of this setup.
In regards to best practices, Cisco only shares guidelines which are mentioned below :
EtherChannel Guidelines
•You can configure up to 48 EtherChannels.
•Each channel group can have eight active interfaces. Note that you can assign up to 16 interfaces to a channel group. While only eight interfaces can be active, the remaining interfaces can act as standby links in case of interface failure.
•All interfaces in the channel group must be the same type and speed. The first interface added to the channel group determines the correct type and speed.
•The device to which you connect the ASA EtherChannel must also support 802.3ad EtherChannels; for example, you can connect to the Catalyst 6500 switch.
•The ASA does not support LACPDUs that are VLAN-tagged. If you enable native VLAN tagging on the neighboring switch using the Cisco IOS vlan dot1Q tag nativecommand, then the ASA will drop the tagged LACPDUs. Be sure to disable native VLAN tagging on the neighboring switch. In multiple context mode, these messages are not included in a packet capture, so you cannot diagnose the issue effectively.
•The ASA does not support connecting an EtherChannel to a switch stack. If the ASA EtherChannel is connected cross stack, and if the Master switch is powered down, then the EtherChannel connected to the remaining switch will not come up.
•All ASA configuration refers to the logical EtherChannel interface instead of the member physical interfaces.
•You cannot use a redundant interface as part of an EtherChannel, nor can you use an EtherChannel as part of a redundant interface. You cannot use the same physical interfaces in a redundant interface and an EtherChannel interface. You can, however, configure both types on the ASA if they do not use the same physical interfaces.
•You cannot use interfaces on the 4GE SSM, including the integrated 4GE SSM in slot 1 on the ASA 5550, as part of an EtherChannel.
-
Pulkit
10-04-2016 06:42 AM
Hi,
Personally I do not see this as a major issue, we see scenarios where all four interfaces of an ASA are tied in one port channel and then sub interface concept is being used. So i would say there is no major issue that you are going to face because of this setup.
In regards to best practices, Cisco only shares guidelines which are mentioned below :
EtherChannel Guidelines
•You can configure up to 48 EtherChannels.
•Each channel group can have eight active interfaces. Note that you can assign up to 16 interfaces to a channel group. While only eight interfaces can be active, the remaining interfaces can act as standby links in case of interface failure.
•All interfaces in the channel group must be the same type and speed. The first interface added to the channel group determines the correct type and speed.
•The device to which you connect the ASA EtherChannel must also support 802.3ad EtherChannels; for example, you can connect to the Catalyst 6500 switch.
•The ASA does not support LACPDUs that are VLAN-tagged. If you enable native VLAN tagging on the neighboring switch using the Cisco IOS vlan dot1Q tag nativecommand, then the ASA will drop the tagged LACPDUs. Be sure to disable native VLAN tagging on the neighboring switch. In multiple context mode, these messages are not included in a packet capture, so you cannot diagnose the issue effectively.
•The ASA does not support connecting an EtherChannel to a switch stack. If the ASA EtherChannel is connected cross stack, and if the Master switch is powered down, then the EtherChannel connected to the remaining switch will not come up.
•All ASA configuration refers to the logical EtherChannel interface instead of the member physical interfaces.
•You cannot use a redundant interface as part of an EtherChannel, nor can you use an EtherChannel as part of a redundant interface. You cannot use the same physical interfaces in a redundant interface and an EtherChannel interface. You can, however, configure both types on the ASA if they do not use the same physical interfaces.
•You cannot use interfaces on the 4GE SSM, including the integrated 4GE SSM in slot 1 on the ASA 5550, as part of an EtherChannel.
-
Pulkit
10-04-2016 07:00 AM
Maybe I'm just "old school" then since I've never seen this setup done nor done it myself (with inside and outside on the same physical interface). I've always tried to keep outside and inside separate, so I wasn't sure if there were any security implications for doing something like this.
Thank you for the information.
10-05-2016 04:29 AM
In my estimation, on a technical level it comes down to do you trust the firewall to operate as designed or not. If you do then it's no problem - technically.
Operationally, it may introduce some additional complexity / risk. You are depending on logical separation in the virtual layer - subinterfaces, VLANs etc. You also have a setup that may be a bit confusing to those less well versed in the configuration options. That could be a junior admin or it could be an external auditor (if your're subject to such things).
It's usually the latter set of concerns than ends up being the deciding factor.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide