03-07-2018 12:04 PM - edited 03-08-2019 02:10 PM
So I have to configure interfaces to use for network device management.
Not doing true OOBM but I created a dedicated managements subnet:
10.10.10.X / SVI 10/ g0/1.10 on Router
Ok for one since I have to use a different subnet to connect my router to my FW, I am using a mgmt. subnet of 10.10.20.X since I get overlap if I use 10.10.10 for interfaces connecting to FW.
Is there a way around to use same subnet for all mgmt. address on all devices? I would like to configure loopbacks for mgmt.
See diagram.
Solved! Go to Solution.
03-09-2018 07:06 AM
Yes. I am saying that if you want the firewall management address to be in the 10.10.10 subnet then you would connect a cable to the firewall management interface (assuming that it has a physical interface designated for management) and that cable to a switch port that is assigned to the vlan for management.
HTH
Rick
03-07-2018 01:54 PM
I think I understand the part of your diagram showing devices and interfaces with IP addressing. I hope that the address on the firewall has a typo since its address seems to have 5 octets. I do not understand the numbers below the devices. It would seem perhaps to reflect default routes. It makes sense that the default route for the switch should be 10.10.10.1 (address of the router) but I am puzzled about the default on the router. where is 10.1.10.10? And I am a bit unclear about the default on the firewall which does not show a next hop.
I am a bit surprised that the diagram shows the connection from switch to router being on a physical interface. I would have expected that the connection would be a trunk for multiple vlans and that the router would have a subinterface. But perhaps that is a detail not important in the diagram.
What is not clear in the diagram is what you intend to do about management address of the firewall. Do you want an interface for management separate from the interface for data? If so how will that be connected? Or for the firewall will you use the address for the data connection to also provide management access?
If management access for the firewall will share the address of the data interface then it simplifies things. And it makes clear that the subnet for management access to the firewall must be separate from the router management address for the switches.
If you want the management address for the firewall to be separate from the data interface then perhaps the management interface for the firewall can be connected to one of your switches and assigned to the vlan for management - thus allowing the firewall management to be in the same subnet as switch management.
So the key question here is whether management access for the firewall will be on its own separate interface or will it be combined with data?
HTH
Rick
03-08-2018 01:59 PM
03-09-2018 07:06 AM
Yes. I am saying that if you want the firewall management address to be in the 10.10.10 subnet then you would connect a cable to the firewall management interface (assuming that it has a physical interface designated for management) and that cable to a switch port that is assigned to the vlan for management.
HTH
Rick
03-09-2018 07:51 AM
03-09-2018 07:53 AM
03-09-2018 07:57 AM
03-09-2018 09:21 AM
Thanks for posting back to the forum to confirm that you have solved the problem and that it is now working as you want. I am glad that my suggestions pointed you in the right direction. Thank you for marking this question as solved. This will help other readers in the forum to identify discussions which have helpful information.
HTH
Rick
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide