03-06-2016 10:11 AM - edited 03-08-2019 04:51 AM
I am very new to configuring firewalls. I will be adding virtual servers to our network that attach to a Layer 3 HP 2920 switch. There are also subnets configured on the switch (for the virtual cluster). I need to know how to configure my ASA 5505 firewall to allow these subnets to talk to the domain and be protected. I have attached a network diagram of sorts. I would prefer to perform the configuration via the ASDM, if possible, as I have never been good at CLI.
I have had some answers to previous posts, but still am having no communication through the firewall.
Any help would be greatly appreciated. I inherited this task and have never configured a firewall before. Can this be done with a basic license?
I have attacheda diagram of what I am trying to accomplish.
Solved! Go to Solution.
03-18-2016 06:57 AM
Add a static NAT as follow:
static (inside,inside) 10.0.0.0 10.0.0.0 netmask 255.0.0.0
Let me know how it works out!
03-06-2016 11:53 AM
There any many many changes needed. It will be easier to post your config.
The first need needed will be routes for the layer 3 subnets. What is the name of the interface heading towards the layer 3 switch?
03-13-2016 10:04 AM
03-06-2016 12:51 PM
Hello Ken,
Since you have an inside and outside Interface only, and on the PDF file you defined that your inside network is the 10.10.0.0/24 range, I supposed the Switch is located in the outside interface, if we base it this way, you will need to add the following:
- Add an access-list on the outside interface to allow the 3 subnets to access the Inside network range, such as:
object-group network SWITCH_VLANS
network-object 10.10.30.0 255.255.255.0
network-object 10.10.40.0 255.255.255.0
network-object 10.10.50.0 255.255.255.0
object-group network INSIDE_IPs
network-object 10.10.0.0 255.255.255.0
access-list Inbound-ACL permit ip object-group SWITCH_VLANS object-group INSIDE_IPs
access-group Inbound-ACL in interface Outside
- Add the pertinent routes for the Switch Vlans in the ASA, such as:
route outside 10.10.30.0 255.255.255.0 <Next_HOP-IP-ADDRESS>
route outside 10.10.40.0 255.255.255.0 <Next_HOP-IP-ADDRESS>
route outside 10.10.50.0 255.255.255.0 <Next_HOP-IP-ADDRESS>
- Now for the Switch Vlans to access the internet through the Firewall, you will need to add U-turn and a NAT statement in the outside interface, such as:
U-turn command:
same security traffic permit intra-interface
NAT statement which will translate the Switch Vlans to the Outside interface:
Pre-8.3:
nat (outside) 1 10.10.30.0 255.255.255.0
nat (outside) 1 10.10.40.0 255.255.255.0
nat (outside) 1 10.10.50.0 255.255.255.0
global (outside) 1 interface
This way, you will achieve the Switch Vlans to access the internet and also access the internal network, if you have this set up another way, let me know!
Please proceed to rate and mark as correct this post if it helped you, keep me posted!
David Castro,
03-06-2016 01:44 PM
David,
The switch has a current IP address of 10.10.0.1 and is on the inside network. The Vlans are configured in the switch as follows:
# | Name | Network | Subnet Mask | Gateway |
1 | Default_vLAN | 10.10.0.0 | /24 | 10.10.0.3 |
10 | Oasis360 | 10.10.10.0 | /24 | 10.10.10.1 |
20 | Poller1 | 10.10.20.0 | /22 | 10.10.20.1 |
30 | iLO | 10.10.30.0 | /24 | 10.10.30.1 |
40 | Switch_Management | 10.10.40.0 | /24 | 10.10.40.1 |
50 | VMware | 10.10.50.0 | /24 | 10.10.50.1 |
60 | vMotion | 10.10.60.0 | /24 | 10.10.60.1 |
70 | Management | 10.10.70.0 | /24 | 10.10.70.1 |
80 | Workstations | 10.10.80.0 | /24 | 10.10.80.1 |
100 | FW_Transport | 10.0.100.0 | /24 | 10.10.100.1 |
That would change how the routing would work would it not? I could send you the current configuration of the ASA, but how do I get that from the ASA to be able to attach it here?
03-06-2016 02:05 PM
I think I get it - everything in the diagram is on the inside interface of the firewall (looks like it is on two interfaces in the diagram). I think I would just add a super route for the entire 10.x/8 network to the layer 3 switch in that case.
route inside 10.0.0.0 255.0.0.0 10.10.0.1
03-06-2016 02:34 PM
OK, I just tried this one and I still cannot ping or connect to the iLO (for example) on one of the servers. I have not set up any virtual environments yet, but I figure if I can't ping or reach the iLO for the server, I won't be able to reach anything else.
I can ping the iLO from the ASA firewall, but not from my office computer.
03-06-2016 04:07 PM
Hello Ken,
Could you please get the "Show tech" copy to a notepad and attach it in here? below you may see a section called "Attachment", if this is a Switch that you are talking about, all of those subnets should be registered in the ARP table "Show arp", and the IPs should be able to communicate to each other based on L2 "routing", if it is a L3 switch yes, you will need to add routes to your inside, you may do it specifically or use a super route(route inside 10.0.0.0 255.0.0.0 10.10.0.1), which I dont really recommend if you want to add more interfaces in the future and use a 10.x.x.x range in another interface, so you may add those individually. either ways for the moment adding the super route should be fine.
That way a NAT for internet is easier:
- nat (inside) 1 10.0.0.0 255.255.255.0
- global (outside) 1 interface
Please dont for get to rate the helpful posts!
Thanks,
David Castro,
03-07-2016 06:52 AM
How do I get the "show tech" and "show arp" results into a file? I tried using ASDM interface and it won't let me copy and paste.
03-07-2016 12:47 PM
Hello Ken,
On the tools section of the ASDM you can use the "Command line" and do the sh arp and "sho tech" and have those copied and paste in a notepad with right click.
Thanks.
David Castro
03-07-2016 01:30 PM
I managed to get the "show tech" to save the file on the flash and put it in a text file. When I tried the same technique with the show arp it would not save it to the flash. It also would not let me copy and paste into notepad.
I have attached the text file for the show tech command as requested.
03-07-2016 06:55 PM
Hello Ken,
Great!, well I think that I have a better idea now, we have basically a Layer 3 device behind the fw, since among the Switch and the ASA have IP addresses assigned in the interfaces, the Switch 10.10.0.1 and the ASA 10.10.0.3, so in the ARP table of the ASA we wont be able to see anything further that interface, so the communication among the VLANs should be all configured in the Switch (InterVLAN routing basically) since it is clearly acting as a L3 device, now the 10.10.0.0/24 Addresses(Internal servers) those are in a segment of the L3 Switch or how did you get those connected to the ASA??
To sum up:
1. Access to internet from the VLANs:
You have to create a route on the L3 Switch (a Default route) pointing to the ASA(10.10.0.3), so the ASA will be able to PAT the Addresses and reach out internet, The ASA already has the routes for those 10.10.X.X Subnets.
2. Communication among VLANS and the internal network (10.10.0.0/24)
We have to define how do you have the internal network plugged to the Switch or to the ASA, because otherwise if it is a simple communication, the L3 Switch should just use InterVLAN routing in order to make all of the VLANs to communicate to each other and dont escalate the communication to the ASA, which it will be all unnecessary, plz take a look to this link:
- https://www.reddit.com/r/networking/comments/2yol9s/inter_vlan_routing_on_hp_procurve_2920/
It seems that disabling and re-enabling (IP-routing) in the switch could do the trick, if it is not so much trouble post the switch config.
Please proceed to rate and mark as correct this post if it helped you, keep me posted!
David Castro,
03-08-2016 07:44 AM
03-08-2016 11:59 AM
Hello Ken,
could you plz add this route, just in case since it is acting as a L3 switch:
- ip route 0.0.0.0 0.0.0.0 10.10.0.3
I know you have the default gateway, but just add the route, so we can see if it does any difference, since it is a Layer 3 switch:
ip default-gateway 10.10.0.3
Also set up a capture in the ASA to make sure those packets are reaching the ASA:
access-list CAP permit ip 10.10.X0.0 255.255.255.0 10.10.0.0 255.255.255.0
access-list CAP permit ip 10.10.0.0 255.255.255.0 10.10.X0.0 255.255.255.0
Define the VLAN; from where you are sending the traffic:
capture CAP interface Inside access-list CAP
Please proceed to rate and mark as correct this post if it helped you, keep me posted!
David Castro,
03-08-2016 12:12 PM
Am I adding the route to the switch or the ASA? I tried entering the ip route in CLI on the switch and it gave me an invalid entry message.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide