03-10-2023 03:30 AM
Hi All,
Hope you guys are doing well.
Trying to configure a new setup for a new branch office. I want Firewall to do access control and and routing to be done on Cisco L3 switch.
I m confused what will will be the best way to achieve this.
i have put the IP address more information that i can think off in the diagram and hope now you guys can understand what im trying to do
So the idea is to configure eBGP between my Cisco Switch and Velo Cloud i want routing to be on the routing and access control can be done on Fortigate firewall.
For that im using 2 vlan one for the communication between Velo and fortigate(VLan 20 1.1.1.0/29) and
other for communication between Fortigate to my Core switch(Vlan 30 IP 2.2.2.0/29).
Kindly share you valuable feedback how i can do it if possible. Please find the diagram attached
03-10-2023 03:37 AM
why you not make eBGP bypass the FW?
you can config eBGP direct between SDWAN and Core SW.
I am talking about bypass eBGP not bypass data traffic
03-10-2023 04:34 AM
@MHM Cisco WorldThanks for your prompt response
I want to config eBGP direct between SDWAN and Core SW and data traffic must come through fortigate Firewall.
Can you please provide valuable guidance to achieve it.
03-10-2023 04:38 AM
make look on this guide
https://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/6500-bgp-pix.html
note:- just to confirm you not run FW as active/standby ?
03-10-2023 12:56 PM
Hu @MHM Cisco World : Fortigate firewall will be in Active /Standby
03-12-2023 06:31 PM
I run lab for you,
between R3 and R1 and R2 I run eBGP
in ASA HA have default route toward VIP of R1&R2 HSRP group
between R3 and both FW HA we run OSPF area nssa with no-redistribute, this prevent the route advertise from BGP to redistribute into ASA HA via OSPF.
03-11-2023 01:24 AM - edited 03-11-2023 01:25 AM
Hello
If you desire EBGP peering from the Cisco core and Vcloud then the FortiGate in-between will need to be transparent L2 FWs?
Optionally you could have:
03-11-2023 01:35 PM - edited 03-11-2023 01:40 PM
Hi,
Create static route on core switch for 1.1.1.1/32 host route with next-hop of 2.2.2.1 (forti) and vice-versa, create static route on versa for 2.2.2.2/32 host route with next-hop of 1.1.1.2 (forti). By this way you will have TCP session for BGP which in underlay routing resolves to paths via forti. Whatever versa advertises in eBGP to core it will have NH of 1.1.1.1 in advertisement which is resolved to 2.2.2.1 actual next-hop in routing (recursive lookup). By this way you will have eBGP between versa and core switch.
However, one caveat - you still need to do routing (at least static summary routes) on forti so it can do L3 routing - packet switching.
HTH,
Please rate and mark as an accepted solution if you have found any of the information provided useful.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide