09-16-2014 10:00 AM - edited 03-11-2019 09:45 PM
Hi,
I have created multiple VLANs on Cisco 3750 switch and configured inter-VLAN routing. Cisco ASA 5515-X is internet gateway, should I also create VLANs on ASA and should I made trunk port between firewall and Cisco 3750?
Solved! Go to Solution.
09-20-2014 02:18 PM
It works only with one default route, with two default routes of same metric traffic does not find the right path and two default routes of different metrics only one default route is appeared. Its not possible to implement PBR on Cisco3750 switch.
09-21-2014 08:55 AM
and two default routes of different metrics only one default route is appeared.
This is expected, as when you set default routes with different metrics it is usually that the one with the higher metric will be the backup default route. If you have two default routes with the same metric, traffic will be loadbalanced over the two interfaces.
--
Please remember to select a correct answer and rate helpful posts
09-21-2014 09:13 AM
I think I need two Cisco 3750 switches one with each gateway. PBR will not be required in this case.
09-21-2014 10:09 AM
Do you mean to have the seperate networks connected to its own switch?
Before you do that, I would suggest looking into the price of the IP Services license and compair that with purchasing a 3750X switch...it might be more financially viable getting the license.
--
Please remember to select a correct answer and rate helpful posts
09-21-2014 11:23 AM
Yes, separate networks on its own switch and I will make trunk between both switches for Vlans communication, Inter-vlan routing will be distributed on both switches and vlans will go to internet from separate internet gateways. One default route on each switch. Is it possible? I am not implementing policy based routing therefore IP services is not required nor 3750x.
09-21-2014 12:55 PM
As long as the networks are on separate switches you will be fine with what you have described.
--
Please remember to select a correct answer and rate helpful posts
09-22-2014 02:16 AM
I want to filter inter-vlans routing between different vlans using access-lists on Cisco 3750 switch. Please let me know where to apply this access-list? in vlan interface?
09-22-2014 02:22 AM
What access-lists are you talking about?
As long as the networks are physically connected to seperate switches and each switch has its own (different) default gateway, the switch that the traffic first enters will determine the default gateway that traffic uses.
--
Please remember to select a correct answer and rate helpful posts
09-22-2014 04:49 AM
I want to filter inter-vlan routing traffic for example I have following Vlans
Vlan 3, Vlan 5, Vlan 10
Vlan 3: 172.16.5.0/24
Vlan 5: 192.168.50.0/24
Vlan 10: 192.168.100.0/24
Now I want to apply ACL to block vlan 5 and vlan 10 traffic to vlan 3
access-list 101 deny ip 192.168.50.0 0.0.0.255 172.16.5.0 0.0.0.255
access-list 101 deny ip 192.168.100.0 0.0.0.255 172.16.5.0 0.0.0.255
access-list 101 permit ip any any
interface vlan3
ip add 172.16.5.1 255.255.255.0
ip access-group 101 in
Is the above configuration correct?
09-22-2014 05:05 AM
Your configuration should work on routed packets. Keep in mind that it will only have affect on routed packets and not on bridged frames.
If your configuration does not give you the desired result try using VLAN ACLs (VACLs)
--
Please remember to select a correct answer and rate helpful posts
09-24-2014 01:58 AM
I have a question related to management VLAN, is it necessary to configure management vlan as native vlan?
09-24-2014 02:04 AM
The ASA tags VLANs individually and therefore does not use the concept of native VLANs. whichever VLAN you configure as native VLAN on the switch has no effect on how the ASA acts.
--
Please remember to select a correct answer and rate helpful posts
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide