cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
736
Views
0
Helpful
2
Replies

ASA 5505 With Cisco 7940 Phone and laptop behind it

Brad Krakow
Level 1
Level 1

The one issue I am having is that when I try to use the internet port on the back of the Cisco Phone, it is handing out an IP Address for the Voice Vlan (172.30) and not the Data VLan (172.31).  Therefore a laptop that I plug into the internet port cannot get out to the internet.  I need the laptop to get an IP Address that is on the Data Vlan if possible.  Thanks in advance to any help.   Below is a copy of my config.

hostname TESTvpn
enable password FsaA76FXbsPPlRSQ encrypted
passwd FsaA76FXbsPPlRSQ encrypted
names
name 10.0.0.0 Corp_LAN
name 192.168.64.0 Corp_Voice
name 172.31.155.0 TESTvpn
!
interface Vlan1
nameif inside
security-level 100
ip address 172.31.155.1 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
ip address dhcp setroute
!
interface Vlan3
nameif Corp_Voice
security-level 100
ip address 172.30.155.1 255.255.255.0
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
switchport access vlan 3
!
ftp mode passive
object-group network SunVoyager
network-object host 64.70.8.160
network-object host 64.70.8.242
object-group network Corp_Networks
network-object Corp_LAN 255.0.0.0
network-object Corp_Voice 255.255.255.0
access-list outside_access_in extended permit icmp any any unreachable
access-list outside_access_in extended permit icmp any any echo-reply
access-list outside_access_in extended permit icmp any any time-exceeded
access-list inside_access_in extended permit ip TESTvpn 255.255.255.0 any
access-list inside_access_in extended permit icmp TESTvpn 255.255.255.0 any
access-list Corp_Voice_access_in extended permit ip 172.30.155.0 255.255.255.0 any
access-list Corp_Voice_access_in extended permit icmp 172.30.155.0 255.255.255.0 any
access-list VPN extended deny ip TESTvpn 255.255.255.0 object-group SunVoyager
access-list VPN extended permit ip TESTvpn 255.255.255.0 any
access-list VPN extended permit ip 172.30.155.0 255.255.255.0 any
access-list data-vpn extended permit ip TESTvpn 255.255.255.0 any
access-list voice-vpn extended permit ip 172.30.155.0 255.255.255.0 any
access-list all-vpn extended permit ip TESTvpn 255.255.255.0 any
access-list all-vpn extended permit ip 172.30.155.0 255.255.255.0 any
pager lines 24
logging enable
logging buffer-size 10000
logging monitor debugging
logging buffered informational
logging asdm informational
mtu inside 1500
mtu outside 1500
mtu Corp_Voice 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list data-vpn
nat (inside) 1 TESTvpn 255.255.255.0
nat (Corp_Voice) 0 access-list voice-vpn
access-group inside_access_in in interface inside
access-group outside_access_in in interface outside
access-group Corp_Voice_access_in in interface Corp_Voice
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
dynamic-access-policy-record DfltAccessPolicy
http server enable
http TESTvpn 255.255.255.0 inside
http Corp_Voice 255.255.255.0 Corp_Voice
http Corp_LAN 255.0.0.0 inside
http 65.170.136.64 255.255.255.224 outside
http 172.30.155.0 255.255.255.0 Corp_Voice
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set VPN esp-3des esp-md5-hmac
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto map outside_map 1 match address all-vpn
crypto map outside_map 1 set peer 66.170.136.65
crypto map outside_map 1 set transform-set VPN
crypto map outside_map interface outside
crypto isakmp identity address
crypto isakmp enable outside
crypto isakmp policy 1
authentication pre-share
encryption 3des
hash md5
group 2
lifetime 28800
crypto isakmp policy 65535
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
telnet timeout 5
ssh Corp_LAN 255.0.0.0 inside
ssh TESTvpn 255.255.255.0 inside
ssh 65.170.136.64 255.255.255.224 outside
ssh timeout 20
console timeout 0
management-access inside
dhcpd auto_config outside
dhcpd option 150 ip 192.168.64.4 192.168.64.3
!
dhcpd address 172.31.155.10-172.31.155.30 inside
dhcpd dns 10.10.10.7 10.10.10.44 interface inside
dhcpd domain sun.ins interface inside
dhcpd enable inside
!
dhcpd address 172.30.155.10-172.30.155.30 Corp_Voice
dhcpd dns 10.10.10.7 10.10.10.44 interface Corp_Voice
dhcpd domain sun.ins interface Corp_Voice
dhcpd enable Corp_Voice
!

threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
webvpn
username admin password pAd1USa81YUMBD/6 encrypted privilege 15
tunnel-group 66.170.136.65 type ipsec-l2l
tunnel-group 66.170.136.65 ipsec-attributes
pre-shared-key *
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
  message-length maximum 512
policy-map global_policy
class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect netbios
  inspect rsh
  inspect rtsp
  inspect skinny
  inspect esmtp
  inspect sqlnet
  inspect sunrpc
  inspect tftp
  inspect sip
  inspect xdmcp
!
service-policy global_policy global
prompt hostname context
Cryptochecksum:fd067681ebec6394372ecb1a4d61d3a5

1 Accepted Solution

Accepted Solutions

Jay Young
Cisco Employee
Cisco Employee

Peter,

So unlike switches the ASA does not support CDP.  As a result there can be no communication between the ASA and the phone to distinguish the data vlan versus the voice vlan.  As a result the phone will use the native vlan to get an ip address and register.  This is what you have already configured on eth 0/7.

When you plug a computer into the pc port of the phone it will use the native vlan and thusly be put into vlan 3 (the native vlan) on port eth 0/7.  It is expected that it will get an ip address out of that range.

So this leaves you with two options.

1)  Disable the PC port on the phone.  This will force users to plug into ports 0/1-0/6 and be put into the correct vlan.  You can disable it by going to the call manager (Got to Device > Phone, then set "PC port" to disable).

2)  Configure nat for voice vlan traffic.  Please note that the PC connected to the phone will be unable to connect to any of the other PCs or printers on the data vlan (Inside interface).

          nat (Corp_Voice) 1 172.30.155.0 255.255.255.0

I hope this helps.

-Jay

View solution in original post

2 Replies 2

Jay Young
Cisco Employee
Cisco Employee

Peter,

So unlike switches the ASA does not support CDP.  As a result there can be no communication between the ASA and the phone to distinguish the data vlan versus the voice vlan.  As a result the phone will use the native vlan to get an ip address and register.  This is what you have already configured on eth 0/7.

When you plug a computer into the pc port of the phone it will use the native vlan and thusly be put into vlan 3 (the native vlan) on port eth 0/7.  It is expected that it will get an ip address out of that range.

So this leaves you with two options.

1)  Disable the PC port on the phone.  This will force users to plug into ports 0/1-0/6 and be put into the correct vlan.  You can disable it by going to the call manager (Got to Device > Phone, then set "PC port" to disable).

2)  Configure nat for voice vlan traffic.  Please note that the PC connected to the phone will be unable to connect to any of the other PCs or printers on the data vlan (Inside interface).

          nat (Corp_Voice) 1 172.30.155.0 255.255.255.0

I hope this helps.

-Jay

Thanks for the info Jay