cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2983
Views
0
Helpful
8
Replies

Transparent Firewall on Trunk Links

tlienskt
Level 1
Level 1

Is it possible to have a Transparent Firewall on Trunk Link.  I have 3 vlans.

Current

S1 3750 ------- S2 3750

trunk link passing 3 vlans

switchport trunk encapsulation dot1q
switchport mode trunk
 

 

S1 3750 -----  PIX515 ------   S2 3750 

 

Please provide a sample config.  Thanks!!

1 Accepted Solution

Accepted Solutions

Maximum Physical Interfaces : 3

You need to upgrade your license so you can configure more interfaces.  If you have 3 VLANs you will need 6 interfaces and 6 VLANs.  YOu need a different VLAN because you are not able to configure the same VLAN on more than 1 interface.

PIX licenses are no longer sold, so you will have to upgrade to an ASA if you need to get this working.

--

Please remember to select a correct answer and rate helpful posts

--
Please remember to select a correct answer and rate helpful posts

View solution in original post

8 Replies 8

Yes it is possible.  You will however be limited to 8 that will be able to cross the ASA though.  All you need to do is configure the trunk port on the switch, as you have provided in your configuration.  Then on the ASA configure subinterfaces and BVI interface for each VLAN.

interface gig0/1
no shut
 
interface gig0/1.10
vlan 10
nameif INSIDE_1
security-level 100
bridge-group 10
 
interface gig0/1.20
vlan 20
nameif INSIDE_2
security-level 50
brige-group 20
 
interface bvi10
ip add 10.10.10.1 255.255.255.0
 
interface bvi 20 
ip add 20.20.20.1 255.255.255.0

 

--

Please remember to select a correct answer and rate helpful post

--
Please remember to select a correct answer and rate helpful posts

When I try to assign the nameif to the 3rd sub interface.  I get the following error.

ERROR: Maximum number of interfaces already configured.

 

Cisco PIX Security Appliance Software Version 7.2(2)
Device Manager Version 5.2(2)

Compiled on Wed 22-Nov-06 14:16 by builders
System image file is "flash:/image.bin"
Config file at boot was "startup-config"

PROS-PIX up 10 mins 17 secs

Hardware:   PIX-515E, 64 MB RAM, CPU Pentium II 433 MHz
Flash E28F128J3 @ 0xfff00000, 16MB
BIOS Flash AM29F400B @ 0xfffd8000, 32KB

 0: Ext: Ethernet0           : address is 0017.5aaf.9b2e, irq 10
 1: Ext: Ethernet1           : address is 0017.5aaf.9b2f, irq 11
 2: Ext: Ethernet2           : address is 000e.0ca9.68b6, irq 11

Licensed features for this platform:
Maximum Physical Interfaces : 3
Maximum VLANs               : 10
Inside Hosts                : Unlimited
Failover                    : Disabled
VPN-DES                     : Enabled
VPN-3DES-AES                : Enabled
Cut-through Proxy           : Enabled
Guards                      : Enabled
URL Filtering               : Enabled
Security Contexts           : 0
GTP/GPRS                    : Disabled
VPN Peers                   : Unlimited

This platform has a Restricted (R) license.

 

 

 

What license do you have installed on the ASA?  

could you post your configuration please.

--

Please remember to select a correct answer and rate helpful posts

--
Please remember to select a correct answer and rate helpful posts

I posted the license above and it is a PIX not a ASA.

 

 

Maximum Physical Interfaces : 3

You need to upgrade your license so you can configure more interfaces.  If you have 3 VLANs you will need 6 interfaces and 6 VLANs.  YOu need a different VLAN because you are not able to configure the same VLAN on more than 1 interface.

PIX licenses are no longer sold, so you will have to upgrade to an ASA if you need to get this working.

--

Please remember to select a correct answer and rate helpful posts

--
Please remember to select a correct answer and rate helpful posts

OK so I got the ASA running.  Still having issues.  NO traffic is being passed.  Below is the config.


ASA Version 9.1(6)8
!
firewall transparent

names
!
interface Ethernet0/0
 no nameif
 no security-level
!
interface Ethernet0/0.1
 vlan 1
 nameif outside1
 bridge-group 1
 security-level 0
!
interface Ethernet0/0.110
 vlan 110
 nameif outside110
 bridge-group 10
 security-level 0
!
interface Ethernet0/0.192
 vlan 192
 nameif outside192
 bridge-group 92
 security-level 0
!
interface Ethernet0/1
 no nameif
 no security-level
!
interface Ethernet0/1.1
 vlan 2
 nameif inside1
 bridge-group 1
 security-level 100
!
interface Ethernet0/1.110
 vlan 112
 nameif inside110
 bridge-group 10
 security-level 100
!
interface Ethernet0/1.192
 vlan 292
 nameif inside192
 bridge-group 92
 security-level 100
!
interface Ethernet0/2
 shutdown
 no nameif
 no security-level
!
interface Ethernet0/3
 shutdown
 no nameif
 no security-level
!
interface Management0/0
 management-only
 shutdown
 no nameif
 no security-level
!
interface BVI1
 ip address 10.7.1.251 255.255.255.0
!
interface BVI10
 ip address 10.7.10.251 255.255.255.0
!
interface BVI92
 ip address 192.168.4.251 255.255.255.0
!
ftp mode passive
access-list List extended permit ip any any
pager lines 24
mtu outside1 1500
mtu outside110 1500
mtu outside192 1500
mtu inside1 1500
mtu inside110 1500
mtu inside192 1500
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
access-group Group out interface outside192
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
user-identity default-domain LOCAL
http server enable
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
crypto ipsec security-association pmtu-aging infinite
crypto ca trustpool policy
telnet timeout 5
no ssh stricthostkeycheck
ssh timeout 5
ssh key-exchange group dh-group1-sha1
console timeout 0
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum client auto
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect rsh
  inspect rtsp
  inspect esmtp
  inspect sqlnet
  inspect skinny
  inspect sunrpc
  inspect xdmcp
  inspect sip
  inspect netbios
  inspect tftp
  inspect ip-options
!
service-policy global_policy global
prompt hostname context
no call-home reporting anonymous
Cryptochecksum:b7db95aafb0e7c0e9e1f7fadb0f28215
: end

 

 

Any help on this??

sorry for the late reply.

You need to either add the command same-security-traffic permit inter-interface or add ACLs to the interfaces allowing the desired traffic.

--

Please remember to select a correct answer and rate helpful posts

--
Please remember to select a correct answer and rate helpful posts
Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card