03-11-2020 08:32 AM
Hi All,
I am in the middle of moving my Default GW for office users from my ASA down to cisco (L3) switch.
I need this traffic to hit the Default GW and then need to set a default route back to the firewall
I wanted to create an SVI on the switch for the GW IP
The issue i have is that on the same switch there is already an SVI configured on vlan 1 in the same range as the Default GW so I don't know if what I amtrying to do is possible
I am unsure what other options there to help implement this solution
Solved! Go to Solution.
03-11-2020 08:48 AM - edited 03-11-2020 08:55 AM
Myself, I would create a new transit network/vlan between the ASA and the L3 Switch. I would use this network to route/forward traffic requests.
Configure the L3 Switches default gateway as the ASA. (i.e. ip route 0.0.0.0 0.0.0.0 172.16.0.1)
For the ASA, configure routes for the internal network on the L3 Switch (i.e. route inside 10.0.0.0 255.0.0.0 172.16.0.3)
Or you could use OSPF or EIGRP for Dynamic Routing, rather than configuring static routes.
For Example: ASA
!
interface GigabitEthernet0/1
nameif inside
security-level 100
ip address 172.16.0.1 255.255.255.248 standby 172.16.0.2
!
route inside 10.0.0.0 255.0.0.0 172.16.0.3 <route back to your internal network/subnet(s)>
!
For Example: SW
!
VLAN: 999
NAME TRANSIT-NETWORK
!
interface Vlan999
description Routed WIFI-AP VLAN 10.232.72.0/22
ip address 172.16.0.3 255.255.255.248
no ip redirects
no ip proxy-arp
no ip unreachable
!
ip route 0.0.0.0 0.0.0.0 172.16.0.1 <route to anything that isn't local to the L3 switch>
!
03-11-2020 08:48 AM - edited 03-11-2020 08:55 AM
Myself, I would create a new transit network/vlan between the ASA and the L3 Switch. I would use this network to route/forward traffic requests.
Configure the L3 Switches default gateway as the ASA. (i.e. ip route 0.0.0.0 0.0.0.0 172.16.0.1)
For the ASA, configure routes for the internal network on the L3 Switch (i.e. route inside 10.0.0.0 255.0.0.0 172.16.0.3)
Or you could use OSPF or EIGRP for Dynamic Routing, rather than configuring static routes.
For Example: ASA
!
interface GigabitEthernet0/1
nameif inside
security-level 100
ip address 172.16.0.1 255.255.255.248 standby 172.16.0.2
!
route inside 10.0.0.0 255.0.0.0 172.16.0.3 <route back to your internal network/subnet(s)>
!
For Example: SW
!
VLAN: 999
NAME TRANSIT-NETWORK
!
interface Vlan999
description Routed WIFI-AP VLAN 10.232.72.0/22
ip address 172.16.0.3 255.255.255.248
no ip redirects
no ip proxy-arp
no ip unreachable
!
ip route 0.0.0.0 0.0.0.0 172.16.0.1 <route to anything that isn't local to the L3 switch>
!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide