cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1691
Views
3
Helpful
17
Replies

Internal Firewall ASA

bkyuksel
Level 1
Level 1

Hello Dear Colleagues,

 

I have 4 vlans and all of them are communicating on Cisco Core L3 switch. Right now, I want to put a firewall for VLAN 40 to prohibit some access to other vlans. I also have external firewall for internet access. What I want to do is to put an internal firewall for prohibit some clients to access some other hosts on other vlans. I know I can do this with ACL but this is how it is supposed to be. 

I deleted vlan 40 SVI on core switch and created it on ASA and created an access port on ASA to enable it to communicate with switch. All the traffic and interfaces should stay on core switch except vlan 40. I tried to route the traffic to ASA with trunk port and created vlan names on ASA but couldnt do it. Also checked all necessary things like ICMP inspection enabled. Routing is done like "vlan40 0.0.0.0 0.0.0.0 192.168.30.1 (vlan 30 SVI on the switch) 

I couldn't do it, tried everything. Also created vlan 2 to create a connection between SW and ASA but didnt work.

I really appreciate for any kind of help. (I was successfull when I moved all the vlan interfaces to ASA but this is not wanted)

I need your step by step instructions with even port types and routing commands etc. 

External firewall is OK, no need to configure it. All my problem is this internal firewall for this specific VLAN 40. IP routing is enabled on L3 core switch.

Thank you so much in advance.

 

Firewall is Cisco Firepower 1010 and switch is Cisco Layer 3 switch

vlan 10 - 192.168.10.1/24

vlan 20 - 192.168.20.1/24

vlan 30 - 192.168.30.1/24

vlan 40 - 192.168.40.1/24

 

bkyuksel_0-1682260129175.png

 

 

17 Replies 17

FW internal config 

Screenshot (662).pngScreenshot (663).pngScreenshot (664).png

result
R1 have 10.0.0.10 and R2 have 20.0.0.20
R1 connect to NSK VLAN 100 and R2 connect to NSK VLAN 200 
you can see the VLAN ID is change when the frame enter and exit the FW interface 

Screenshot (660).pngScreenshot (661).png

bkyuksel
Level 1
Level 1

@MHM Cisco World  thank you so much, yesterday night I did it with transit vlan, then also with a trunk port. everything seems fine. thank you guys for your support. I really appreciate it.

Review Cisco Networking for a $25 gift card