Cisco Switching/Routing :: How To Configure Routing On ASA 5505
Dec 5, 2011
how do i configure the new asa 5505 to be as a router as shown in the diagram note: the isps' routers placed in head office. but i cannot change the configurations of the isp's routers.
i have 2960 l2 switch connected to the ASA 5505. for some or the other reason i am not able to do intervlan communication. have done trunk mode on both ends on the switch as well as on the ASA and native vlan 1 allowed. the trunk is up up i am able to ping only the vlan 1 ip from the switch to the ASA for the vlan 2 i am not and similar for vlan 3.
config on the ASA ASA Version 8.2(1) ! hostname ciscoasa
upgrading our small office network. We currently have about 75 employees with probably 125 devices on the network. I'd like to create about 10 vlans for the different departments and then configure intervlan routing as needed. Currently we have all unmanaged switches and it's just a huge broadcast storm on the network. We are upgrading our Cisco 800 router to an ASA5505 sec. Plus license. I need some recommendations on switches. Of course, this needs to be done as cheap as possible.... Is there a way to use the ASA to configure all the vlans and intervlan routing and access lists and use a cheaper switch to provide the access layer to hosts?
In our datacenter we have a 3750 stack with IP base image. I have enabled PBR and reloaded the switch. Show sdm prefer says i am using default template. The reason i want to use PBR is that we have 2 firewalls on the same work and want to be able to have granular control over which gateway out of the network they use but still be able to access all internal resouces accross wan and locally.
Created access list to identify traffic:
access-list 10 permit 10.2.3.59 (test workstation on vlan 3)
Created policy:
route-map TestASA permit 10 match ip address 10 set ip next-hop 10.2.0.3
Assigned policy to the user vlan3:
ip policy route-map TestASA
Results:It changed the default gateway to the above gateway but i could not access any resources on any other vlan, could not access resouces accross wan.
The layer 2 switches are connected to layer 3 Switch via trunks, and routing between layer 2 switch ports with configured SVI's on 3550. All working fine. Now I'm trying to configure routing between 2800 and 3550, I tried connecting both Straight Throught and Crossover cables to the 2800 Fa0/0 and Fa0/1 ports as well as the switchports on 3550
No switchport commands are configured however, the lights do not go on for both straight through or crossover cables. I tried connecting 1750 routers but same result. My goal is to have all the VLANS routed to the internet with configuring NAT translation the router.
We have two Cisco 5505 firewalls connecting to two ISP's . The two internal LAN's on the firewalls are 192.168.184.0/24 & 192.168.186.0/24. We also have a Cisco C3560x layer3 switch with vlan interfaces 184.3 & 186.3. We have two DGS-3100 Dlink layer 2 switches connecting our users to the Layer 3. Ip routing is enabled for intervlan communication & I can reach the Switch interfaces & firewall gateways from machines on both on the vlans.We have pbr enabled on the 3560 & users only on the .186 network can get to the internet. The switch is running the ipservices license & the sdm template is "desktop routing" .
Users on the .184 cannot access the internet but we can ping the layer3 interface & the firewall gateway. [code]
i try to configure DNS on cisco 800 , it's worked , but after 24 hours the command ip domain-lookup change to disable, and it stop work i'm not understanding why it's happen ,
that's the configuration
ip domain name XXXXXX.CC.CC ip host XXX-RR-FF.com 2.2.2.2 ip name-server 1.1.1.1 [Code]....
We are setting up a test lab in our DMZ. The path to the internet is basically like this. Anything past the firewall is irrelevant. For this lab lets assume it is vlan 300.
LAB SW ---> DMZ-SW ---> ASA FW ---> INTERNET LAB IP Range = 172.16.300.0 /24 GW = 172.16.300.1 (On FW int) Trunked all the way through.
I have an int vlan set up on the LAB SW. It is being trunked to DMZ SW. DMZ trunks it to ASA FW where there is a failover with a redundant switch.On the ASA the interface 0/2 is a subinterface 0/2.300 being used as the default gateway.
I have DHCP running in a specific range on the LAB SW and do get an ip address when plugged in. I cannot ping the default gateway on the ASA FW.The GW is defined using default-router command for 172.16.300.1 i.e. default-router 172.16.300.1?
We are running ospf on the firewall. There appears to be a pattern with ospf and a similar subnet setup elsewhere. I was wondering based off of this info would configuring ospf for 172.16.300.0/24 allow me to ping the GW from a client on the LAB SW.Secondly. I trunked 300 on the DMZ SW but I didnt add the vlan to the configuration. i.e. conf t <enter> vlan 300 <enter> Does this really matter? Or is having the vlan in the configuration only pertain to access mode on interfaces?
If I have an ASA 5520 with an INSIDE interface, a DMZ interface and a WAN interface what would be the best way to configure NAT? If I configure nat-control and a nat (inside) 1 0.0.0.0 0.0.0.0 this will configure everything to be NAT'd when passing from the INSIDE interface out.My question is what about the devices I want to access in the DMZ from the inside for management etc? I'm guessing the ASA isn't smart enough to realise you're accessing hosts in it's DMZ interface so do you have to configure a nat 0 rule for every subnet within the DMZ you want to access or is there an easier way to do it? It's worth noting that the same devices will be accessing the OUTSIDE network and the DMZ network from the INSIDE network.
I notice that NAT is not possible Cisco Catalyst 4500e series. Is there any other ways to configure NAT? Currently we have 2x Catalyst 6509 and we're migrating to the 4510e and there's NAT in the 6509s. I was thinking of re-using the 6509s and connect to the 2 new 4510e in a meshed trunking layout with MST (Layer 2) and OSPF/EIGRP (Layer 3) protocols turned on.
I am attempting to configure a Cisco 2901 router using IOS 15 to properly perform NAT/PAT translation between LAN and the internet connection.
My Configuration:
interface GigabitEthernet0/0 ip address dhcp ip nat outside ip virtual-reassembly no ip route-cache duplex auto speed auto no cdp enable no mop enabled(code)
I've been trying to configure a connection which requires NAT translation but my devices are too old and seems that the configurations I tried doesn't work or I don't know how to implement it properly.Firstly, I will introduce my router to you, it is a Cisco C3640-JS-M Version 12.2(1), so I found many ways to solve my problem, but none of them are supported by it.
To continue,the connection I am trying to configure is the following one:
So one host from 172.22.1.0/24 needs to connect to a server in my LAN (10.1.1.20) but they can´t use the real IP and we need to configure a NAT rule to translate traffic from them to 192.168.6.10 to 10.1.1.20, but only for this connection (there are other "WAN" interfaces.
These are my failed attempts:
interface FastEthernet0/0.302 ip nat outside ip nat inside source static 10.1.1.20 192.168.9.10
PROBLEM: Works for this connection, but other connections are affected and no one can reach 10.1.1.20 apart from LAN and incoming traffic to F0/0.302
[code]....
But as I said before, some configurations are not supported by my device.
I believe I have the steps done at the IOS to config the WAN port for SSH, but I still can't connect to it. I have "logging console 7" on so I am able to see that the router is dropping my TCP session requests. I figure this is just the built-in zone-based firewall at work.
Is there a very straightforward process, via the IOS, to allow SSH inbound on the WAN port? I'm not very familiar with the IOS other than basics so while I know how to do things like "transport input ssh" and "login local" and such on the vty 0 4 line, I have no idea whatsoever on what I should do with the firewall stuff. I believce the WAN interface is already a member of the outside zone though so I imagine one just has to somehow include ssh (preferably on a non-standard port) in the exceptions on the firewall somehow.
I have been poking around for a step-by-step IOS guide for this but only find info on configuring SSH itself but not how to open the firewall to allow the connection for it through.
I have a Cisco 881 VPN Router (TX) which connects to the Concentrator at our corporate office (NY). The TX subnet is 10.16.x.x. The corporate subnet is 10.1.x.x, 10.2.x.x, 10.9.x.x.Right now, the 881 router is only used for VPN to corporate, but, I would like to use it our primary router. We have to ISP's, and I would like to allow traffic to come in on either interface to our internal LAN to a few servers.
I got one SF 300-48 layer 3 switch I tried to configure to use it in the office network.Unfortunately I'm unable to configure the VLAN settings.I need port one for input(VLAN2),port 7-15 for another vlan(vlan3) also need to connect with the vlan 4.port 15 is another vlan(vlan4) this is for wireless.Other ports are static.It doesn't get any connections with other vlans.I wish to know how to configure vlans in GUI mode.I tried , But I can't get the Vlan setting correctly.Also,I need to know how to communicate both vlans in GUI mode.
When I try to add an IP address to a port-channel interface on a 3845 ISR I am getting an error that seems to imply that only L2 etherchanneling is possible. Am I missing something?Cisco IOS Software, 3800 Software (C3845-ADVIPSERVICESK9-M), Version 12.4(24)T8,
sfo-c3845-1#sho run int port-channel 1 Building configuration... Current configuration : 31 bytes ! interface Port-channel1 end
how to configure an IPaddress for a PWR-RPS 2300?.I tried finding info on the website but no luck as yet. RPS 2300 will be used on stack of 3750E series switches.
configure qos in Cisco 3750 switch.I have configured below template and applied on the vlan interface.But i am getting the hit on the access list but I am not able to get hit on the class map.
How i can configure the SFP Ports on my 4500 SERIES CHASSIS with other SFP ports on the connecting switch. I want to connect 15 switches via GLC=SX=MM to my 4506E sfp card.
I need to configure the port forwarding on Cisco 887 to forward port 22 on Public IP to a LAN IP port 2200. I don't know anything on Cisco router at all, beside telnet to the cisco and quit . Any step by step command.
where 192.168.1.150 is my server (that hosts SQL server and that I want to be able to connect to remotely using VNC) and GigabitEthernet0 is my configured WAN interface.
When I try to connect from an external client I get the error: "Failed to connect to server..." Is this a firewall issue? How do I get round it? The 819 is the only router/firewall in my network.
Can i configure proxy on ASA 5510? i.e for internet use my user should be authenticate by ASA5510 and after successful authentication user should be allowed to access internet and futher is it possible to do bandwidth managment with ASA5510?
I purchased an old cisco 831 for practical studies for a cisco certification. I purchased the console cable (serial/rj45) and a usb->serial converter cable. However when I open my terminal application (tera term) After I select the right com port (3) and make sure the connection settings are right. It will just sit idle and not show any data from the device. Was I sold a faulty device? It lights up and has three lights on.
Everytime I look at a manual or cisco video I am given the impression the terminal application will just automatically connect. But whenever I try I get nothing.
how do we configure sub interface for nexus 7k?do we have to issue ma-address command under physical interface and than configure subinterface? if yes than what do we have to type the mac address for "mac-address" command?I can doing and than configure subinterface but the interface/subinterface didn't come up. do we have to bounce it couple times to bringe it up?
I am trying to configure a new 2960 POE switch, but seem to me the int fa0 is layer 3 interface. Is any way we can convert it to a switchport, so we can connect it to other switch in trunk mode?