03-31-2023 11:18 AM
When I come from the VPN to the Management network I get the correct VLAN tag but when the traffic comes back I get the wrong VLAN tag. Do you know why this would be happening?
172.x.x.x Network = VPN
10.x.x.x Network = Management
On the L3 switch I am trying to SSH into I have interface vlan 124 set up with the IP of the device.
I also set the default gateway on the switch to the management network interface vlan 124.
When I take a capture it looks as if the switch tags the return packets to VLAN 1 and the traffic is then dropped.
The native VLAN is not VLAN 1.
When I am in the office I can access the management network with no issues.
Trying to think of more info that would be helpful to note down but that is all I can think of. Any info on this would be helpful.
Solved! Go to Solution.
03-31-2023 01:41 PM - edited 03-31-2023 01:52 PM
OK, the SW must use GW for return back,
it will use the last resort, and tag it with VLAN 1
so either change the GW to be management or config static route in L3SW for VPN Pool of anyconnect toward the subinterface IP of ASA of mgmt VLAN
03-31-2023 12:01 PM
Hello,
It is weird.
Can you share the configuration here? Something I can come up with is that maybe you are facing assymetric routing and the packet is crossing some device it should not cross. Some device that is not doing trunk and is delivering the frame wrongly to your switch.
03-31-2023 12:11 PM
Which config are you looking for?
03-31-2023 01:06 PM
The config from the device you saw the logs, must be the switch right?
If you can do a diagram of the network, also helps
03-31-2023 12:13 PM
It is L2VPN ? What is VPN you use
03-31-2023 12:32 PM
This is the Cisco AnyConnect VPN.
Remote worker (On Cisco Any Connect) ---> Firewall ----> L3 (This is were I am trying to get to)
Does that answer your question?
03-31-2023 12:49 PM
When I am on the switch I can ping the default gateway of the management network however when I look at the routing table the packet is routed using the gateway of last resort ... would this make the packet get tagged with vlan 1 ?
03-31-2023 01:11 PM
are you meaning that the SW is L2 ?
if Yes then there is chance that the return use different VLAN tag
solution is
make the management VLAN ip in FW is the default GW of SW.
03-31-2023 01:19 PM
make the management VLAN ip in FW is the default GW of SW.
I am not sure I am tracking what you are saying here....
03-31-2023 01:17 PM
The switch is a L3 switch but in this case the management network subnets gateway is on the firewall....
03-31-2023 01:26 PM
gateway of last resort <<- the GW of last sort is in which VLAN ?
03-31-2023 01:33 PM - edited 03-31-2023 01:37 PM
interface vlan 1 - when I look at the show run | s I interface vlan 1 the GW of last resort falls into the IP subnet
but does interface vlan ## means that it will tag with that number as well? When I ran the interface vlan ## that is that turning into a layer 3 interface...?
03-31-2023 01:41 PM - edited 03-31-2023 01:52 PM
OK, the SW must use GW for return back,
it will use the last resort, and tag it with VLAN 1
so either change the GW to be management or config static route in L3SW for VPN Pool of anyconnect toward the subinterface IP of ASA of mgmt VLAN
03-31-2023 02:27 PM
So creating the static route worked however I am not sure if I like that. Because now everyone in the VPN pool will us the management gateway for the route back to the VPN. The whole point of making the management subnet was to keep everyone off that network. Is there a way to set this up without having everyone go over the management network when on the VPN?
03-31-2023 02:31 PM
Yes
there is VPN-filter you can apply to anyconnect group-policy/tunnel-group and this will allow specific VPN access mgmt of SW
Configure VPN Filters on Cisco ASA - Cisco
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide