01-08-2020 08:53 AM
Hello everyone,
I need expert help to connect the ASA inside and outside interfaces to the core switch and route internet traffic through the ASA.
There are several reasons why we need this setup. some of them are: Cisco ASA configured in transparent mode cannot see traffic between our router and the ISP router when we are using PPPoE; We don't have two public IP address to use on routed mode; we have GRE/IPSec tunnels ending on the dialer PPPoE interface; etc.
So the big question is. Can we have the ASA inside and outside interfaces connected to the core switch using VSI´s and route internet traffic only through the ASA that way?
Enclosed a diagram for a better understanding.
Thank you.
Solved! Go to Solution.
01-08-2020 11:29 PM
Hi there,
Do you mean SVIs as in logical Layer3 interfaces?
If so, then what you are describing is a firewall on a stick and would be considered a normal method of deployment.
cheers,
Seb.
01-10-2020 02:48 AM
You will need to create a new VRF on the router to provide seprate routing tables for VLAN900 and VLAN901. Something like:
! ip vrf OUTSIDE ! int dialer0 ip vrf forwarding OUTSIDE ... ! int vlan900 ip vrf forwarding OUTSIDE ... ! ip route vrf OUTSIDE <internal_subnet_summary> <netmask> <firewall_VLAN900_IP> ip route 0.0.0.0 0.0.0.0 <firewall_VLAN9001_IP> !
You will need to adjust your existing default route on the router to ensure it applies to the OUTSIDE VRF.
Now when internet traffic arrives on the dialer0 interface it will be presented with two routes: either the default back out to the internet, or towards your internal network via VLAN900 . In this design traffic moving between VLAN900 and 901 has to go via the firewall.
cheers,
Seb.
01-10-2020 01:25 PM
My fault reading your diagram. try:
ip route vrf OUTSIDE <internal_subnet_summary> <netmask> 10.0.0.6
cheers,
Seb.
01-16-2020 02:21 PM
Hello again,
Yes the route directing traffic from the OUTSIDE VRF into the default 'inside' VRF via the firewall should use a summary address which covers your entire 'inside' range. If you only have that one subnet, then yes, the route you have specified is correct.
cheers,
Seb.
01-08-2020 11:29 PM
Hi there,
Do you mean SVIs as in logical Layer3 interfaces?
If so, then what you are describing is a firewall on a stick and would be considered a normal method of deployment.
cheers,
Seb.
01-10-2020 01:26 AM
Hello Seb. Thank you for replying.
Yes, I mean logical Layer3 vlan interfaces.
But in this particular case I don't believe the firewall can be deployed "on a stick" method because we have the router on a stick already.
Did you had the chance to look at the diagram I attached to the post?
I don't have interfaces available on the router to connect the firewall, I need the router as it is because it is using GRE/IPSec.
So how can I configure the router to forward internet traffic to the firewall and them to go out its internet PPPoE dialer interface?
My big problem is the return traffic from the firewall. How do I avoid a loop and how to I make sure return traffic from the internet is forward back to the firewall and them to the end point?
Thank you.
01-10-2020 02:48 AM
You will need to create a new VRF on the router to provide seprate routing tables for VLAN900 and VLAN901. Something like:
! ip vrf OUTSIDE ! int dialer0 ip vrf forwarding OUTSIDE ... ! int vlan900 ip vrf forwarding OUTSIDE ... ! ip route vrf OUTSIDE <internal_subnet_summary> <netmask> <firewall_VLAN900_IP> ip route 0.0.0.0 0.0.0.0 <firewall_VLAN9001_IP> !
You will need to adjust your existing default route on the router to ensure it applies to the OUTSIDE VRF.
Now when internet traffic arrives on the dialer0 interface it will be presented with two routes: either the default back out to the internet, or towards your internal network via VLAN900 . In this design traffic moving between VLAN900 and 901 has to go via the firewall.
cheers,
Seb.
01-10-2020 08:16 AM
I'm still a little bit lost with the config.
Imagine we have the INSIDE firewall interface on switch VLAN900 terminating on the VSI gi0/0.900 with 10.0.0.0/30.
And the OUTSIDE firewall interface on switch VLAN901 terminating on the VSI gi0/0.901 with 10.0.0.4/30.
What is missing in this config?
!
ip vrf OUTSIDE
!
int dialer0
description INTERNET
ip vrf forwarding OUTSIDE
...
!
int gi0/0.900
description FIREWALL INSIDE INTERFACE 10.0.0.2
ip address 10.0.0.1 255.255.255.252
!
int gi0/0.901
description FIREWALL OUTSIDE INTERFACE 10.0.0.6
ip vrf forwarding OUTSIDE
ip address 10.0.0.5 255.255.255.252
!
ip route vrf OUTSIDE <internal_subnet_summary> <netmask> 10.0.0.2
ip route 0.0.0.0 0.0.0.0 10.0.0.2
!
01-10-2020 01:25 PM
My fault reading your diagram. try:
ip route vrf OUTSIDE <internal_subnet_summary> <netmask> 10.0.0.6
cheers,
Seb.
01-14-2020 04:35 AM
What exactly I need to add on "<internal_subnet_summary> <netmask>"?
Is it the internal workstations source network?
Is this config ok them?
!
ip vrf OUTSIDE
!
int dialer0
description INTERNET
ip vrf forwarding OUTSIDE
ip nat outside
...
!
int gi0/0.100
description WORKSTATIONS SUBNET
ip address 172.1.0.1 255.255.255.0
ip nat inside
!
int gi0/0.900
description FIREWALL INSIDE INTERFACE 10.0.0.2
ip address 10.0.0.1 255.255.255.252
!
int gi0/0.901
description FIREWALL OUTSIDE INTERFACE 10.0.0.6
ip vrf forwarding OUTSIDE
ip address 10.0.0.5 255.255.255.252
!
ip route vrf OUTSIDE 172.1.0.0 255.255.255.0 10.0.0.6
ip route 0.0.0.0 0.0.0.0 10.0.0.2
!
01-16-2020 02:21 PM
Hello again,
Yes the route directing traffic from the OUTSIDE VRF into the default 'inside' VRF via the firewall should use a summary address which covers your entire 'inside' range. If you only have that one subnet, then yes, the route you have specified is correct.
cheers,
Seb.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide