03-24-2015 11:15 AM - edited 03-07-2019 11:14 PM
so.... I have a computer connected to a 2960 on F0/7 - IP 10.70.64.151 - VLAN 1. The 2960 is connected to a 3750 on ports g1/0/11-12. The 3750 is connected to another computer on G1/0/7 - IP 10.30.0.2 - VLAN2. I have two vlans on each. I can ping from switch to switch on both vlans. I have a trunk setup between the two switches. I can ping both computers from the switches. I can't ping the computers from each other. ip routing is enabled on the 3750. I'm not sure what I'm missing but I could sure use some help. Please see below configs. I snipped a little bit but most ports are configured identically so I removed a bunch to save space. Thanks!
3750x
hostname 3750-sw01 ! boot-start-marker boot-end-marker ! enable password 7 1234567890 ! aaa new-model ! ! aaa authentication login default enable ! ! ! aaa session-id common clock timezone PST -8 0 clock summer-time PDT recurring system mtu routing 1500 ip routing ! ! no ip domain-lookup ip domain-name test.net ip multicast-routing distributed ip igmp snooping querier ! ! spanning-tree mode pvst spanning-tree extend system-id ! ! vlan internal allocation policy ascending ! lldp timer 5 lldp run ! ! ! ! ! interface Port-channel1 description 2960-sw01 switchport trunk encapsulation dot1q switchport mode trunk ! ! interface FastEthernet0 no ip address no ip route-cache cef no ip route-cache shutdown ! ! interface GigabitEthernet1/0/6 switchport mode access ! interface GigabitEthernet1/0/7 description ucrypt management switchport access vlan 2 switchport mode access ! interface GigabitEthernet1/0/8 switchport mode access ! interface GigabitEthernet1/0/9 switchport mode access ! interface GigabitEthernet1/0/10 switchport mode access ! interface GigabitEthernet1/0/11 switchport mode access ! interface GigabitEthernet1/0/12 switchport trunk encapsulation dot1q switchport mode trunk ! interface GigabitEthernet1/0/13 description port-channel1 switchport trunk encapsulation dot1q switchport mode trunk channel-group 1 mode on ! interface GigabitEthernet1/0/14 description port-channel1 switchport trunk encapsulation dot1q switchport mode trunk channel-group 1 mode on ! ! interface Vlan1 ip address 10.70.64.31 255.255.255.0 ip helper-address 10.70.64.11 ! interface Vlan2 ip address 10.30.0.1 255.255.255.0 ! no ip http server ip http secure-server ! ip route 0.0.0.0 0.0.0.0 10.70.64.1 ! logging esm config ! ! ! alias exec sib show ip int brief alias exec sal sh access-list alias exec sir sh ip route ! line con 0 privilege level 15 line vty 0 4 privilege level 15 password 7 12345467890 length 0 line vty 5 15 privilege level 15 password 7 12345467890 ! ntp server 129.6.15.28 end
2960
hostname 2960-sw01 ! boot-start-marker boot-end-marker ! enable password 7 1234567890 ! aaa new-model ! ! aaa authentication login default enable ! ! ! aaa session-id common clock timezone CST -6 0 clock summer-time CDT recurring system mtu routing 1500 ! ! no ip domain-lookup ip domain-name test.net ! ! ! spanning-tree mode pvst spanning-tree extend system-id ! vlan internal allocation policy ascending lldp timer 5 lldp run ! ! ! interface Port-channel1 description uplink to MDF switchport mode trunk ! interface FastEthernet0/1 switchport mode access spanning-tree portfast ip igmp max-groups 2 ip igmp max-groups action replace ! interface FastEthernet0/2 switchport mode access spanning-tree portfast ip igmp max-groups 2 ip igmp max-groups action replace ! interface FastEthernet0/3 switchport mode access spanning-tree portfast ip igmp max-groups 2 ip igmp max-groups action replace ! interface FastEthernet0/4 switchport mode access spanning-tree portfast ip igmp max-groups 2 ip igmp max-groups action replace ! interface FastEthernet0/5 switchport mode access spanning-tree portfast ip igmp max-groups 2 ip igmp max-groups action replace ! interface FastEthernet0/6 switchport mode access spanning-tree portfast ip igmp max-groups 2 ip igmp max-groups action replace ! interface FastEthernet0/7 switchport mode access spanning-tree portfast ip igmp max-groups 2 ip igmp max-groups action replace ! ! interface GigabitEthernet0/1 description port-channel1 uplink switchport mode trunk channel-group 1 mode on ! interface GigabitEthernet0/2 description port-channel1 uplink switchport mode trunk channel-group 1 mode on ! interface Vlan1 ip address 10.70.64.48 255.255.252.0 ! interface Vlan2 ip address 10.30.0.6 255.255.255.0 ! ip default-gateway 10.70.64.1 no ip http server ip http secure-server ! ! ! ! line con 0 line vty 0 4 privilege level 15 password 7 1234567890 line vty 5 15 privilege level 15 password 7 1234567890 ! ntp server 129.6.15.28 end
03-24-2015 11:22 AM
If the routing is done on the 3750 you don't need both vlan interfaces on the 2960, you just need one of them for management.
Do the PCs have their default gateways set to the vlan interfaces on the 3750 ?
Jon
03-24-2015 11:31 AM
sigh. It appears, the default gateway is the ASA 5505 connected to the 3750 I neglected to mention.... I ran a show route and this is what I got.
C 10.70.64.0 255.255.252.0 is directly connected, inside
S 10.30.0.0 255.255.255.0 [1/0] via 10.70.64.31, inside
03-24-2015 11:32 AM
The default gateway of what, one of the PCs ?
Jon
03-24-2015 11:34 AM
Correct. one of the PCs.
route -n Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 0.0.0.0 10.70.64.1 0.0.0.0 UG 202 0 0 eth0 10.70.64.0 0.0.0.0 255.255.252.0 U 202 0 0 eth0
03-24-2015 11:36 AM
Well that would explain it.
You either need to configure the ASA to allow traffic back from the inside interface because it wont do it by default or change the default gateway on the PC.
Which one to do depends on why it is currently pointing to the ASA ie. is it for security reasons.
Jon
03-24-2015 11:44 AM
I have to look further but I don't know. I'm not sure why everything points to the firewall. I can't find any legitimate reason it would do so. So... allowing traffic back, would that be hairpinning? Also... it amazes me how fast you answer these questions. Thanks just doesn't seem to be enough. :)
03-24-2015 11:53 AM
So... allowing traffic back, would that be hairpinning?
Yes it would.
By default the ASA will not send traffic back out of the same interface it was received on to get to the destination IP but you can configure it to do so.
If there is no reason to have the firewall as the default gateway other than that was the way it was setup then I would recommend using your 3750 for routing between vlans and only sending traffic to the ASA for internet.
It makes everything simpler.
However one thing is that your ASA is in the same vlan as some of your clients and this isn't ideal because what happens is a client in the vlan sends traffic to the 3750 because that is its default gateway.
If the traffic is for the internet the 3750 sends it to the ASA. But return traffic goes direct to the client ie not via the 3750 because the ASA inside interface is in the same vlan.
It will work but I wouldn't set it up like that.
Ideally you want a dedicated vlan or routed connection (if there is only firewall) for the 3750 to ASA connection with no clients in it and then all traffic to and from the ASA has to go via the 3750.
Obviously then you would need routes on the ASA for all internal subnets.
You don't have to do this, just a suggestion.
But first you need to find out if the default gateway needs to be the ASA.
Jon
03-24-2015 01:09 PM
To be honest, I'm not sure. I'm still trying to learn more about how ASAs work. There is a l2l ipsec tunnel but if there's routing on the 3750, I don't see any reason why the core switch can't be the gateway
03-24-2015 01:18 PM
A L2L tunnel doesn't require the networks at either end to be directly connected so it would work fine via the 3750 as long as the routing was correct.
It could just be that it was setup that way and there is no real reason.
If the two vlans are meant to be able to communicate with each other then you would expect the ASA to have the extra configuration but it hasn't.
If there are certain machines that should use the ASA as their default gateway because you want to firewall between these internally then all machines in that vlan should use the ASA ie.
you don't have some machines using the ASA and some the 3750 within the same vlan because there is no real logic to that.
Like i say, I can't tell you but sometimes there really is no reason as to why it has been setup that way other than it was the only way a previous person knew how to make it work.
Jon
03-24-2015 01:24 PM
I added the second vlan to try to correct a mistake I made. I C&P'd an incorrect IP configuration into a server. This is my attempt to be able to access the server and change it back. :D (Yes, I feel really stupid)
03-24-2015 01:36 PM
We've all done something similar, or at least I have :-)
Can't you just access the server from a client in the same vlan then default gateways don't come into it.
Jon
03-24-2015 01:39 PM
I'm not on location so if I change the client vlan, I can no longer access it remotely due to the routing in the two asa's between my office/colo and the office where I'm having the problem. unfortunately, I don't have anyone who can help at the site either...
03-24-2015 01:42 PM
Okay can you describe exactly what the issue is in terms of IP addressing etc.
So your IP address, the server IP address etc.
Do you have access to the ASA and if so do you know what version of code it is running ?
How do you access the server, is it RDP ?
Jon
03-24-2015 02:11 PM
ok. Thanks for the help. It's a little complicated though. :)
NETWORK: ASA 10.70.64.1 => 3750 10.70.64.31 => 2960 10.70.64.48
unfortunately, the server only has https access. I changed its IP to 10.30.0.2 255.255.255.252. realizing my oops, I added vlan 2 on the 3750 with an IP of 10.30.0.1 255.255.255.0. I then tried to browse to it. The computer I RDP'd into to try and get to it is 10.70.64.155. I do have access to the ASA. I can't do any port forwarding because... well, nutshell is my outside interface on the ASA is a private IP and the site has port forwarding on their ASA for IKE so that I could establish the ipsec l2l tunnel. Our ASA is behind their ASA because their building splits out the internet between offices and we needed this office network isolated. I attached a crude gliffy pic to help.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide