Link to home
Start Free TrialLog in
Avatar of joehuang
joehuang

asked on

Vlan and Trunk

How to configure Trunk for VLAN, in order for VLAN talk to each other on Cisco Catalyst Multilayer 3550-48 switch,
The following is the vlan diagram,

Port       VLAN                    VLAN IP Address
------     -------------           -----------------
39-48      VLAN 1 -Default         NA
1-3        VLAN 2 - 172.16.2.0/28  172.16.2.1
NC*        VLAN 3 - 192.168.1.0/21 NC*
4-6        VLAN 5 - 10.10.1.0/28   10.10.1.1
7-9,25-32  VLAN 6 - 10.10.2.0/28   10.10.2.1
33-38      VLAN 7 - 10.10.3.0/28   10.10.3.1
10-12      VLAN 10- 192.168.2.0/24 192.168.2.1
13-15      VLAN 11- 192.168.3.0/24 192.168.3.1
16-18      VLAN 12- 192.168.4.0/24 192.168.4.1
19-21      VLAN 13- 192.168.5.0/24 192.168.5.1
22-24      VLAN 14- 192.168.6.0/24 192.168.6.1

This switch is uplink to Cisco Firewall 525, that have 6 port ( 2 equiped + 4 added), Firewall uplink to internet router.

---------------------------------------
Vlan 2,5,7,10 connect to firewall,4 port used.
Firewall uplink to Internet Router, 1 port used.
Now, There is only 1 port left in Firewall.
Now, Vlan 6,11,12,13,14 need connect to Firewall, but there is only 1 port left in firewall.
---------------------------------------
How to configure Vlan 6,11,12,13,14 to only one port in Firewall ? Does the Firewall port handle VTP/TRUNK ?


Please advise, if I miss somethig in diagram ?



Avatar of Les Moore
Les Moore
Flag of United States of America image

Avatar of joehuang
joehuang

ASKER

Question Modified, Please check again.
The PIX firewall does not support VLAN (ISL/.1Q) trunking, so you have to enable routing on the 3550.

1. Pick one unused port, take it out of a VLAN and assign it an IP address, and Plug in the PIX to that port, assign the PIX an address in the same range.
  interface fast 0/8
   no switchport
   ip address <address> <mask>

2. setup default gateway:
    ip default-gateway <ip-address of PIX>
3. I assume you have setup each VLAN with an IP address:
   interface VLAN 6
     ip address 10.10.2.1
4. Enable IP routing
   ip routing





As your instruction, I have some question

"take it out of a VLAN", does that mean exclude fa0/8 from VLAN 6 ? what ip address ahould I have to assign to this port and Pix port ? Can I use the same range of ip address as VLAN ?
--------------------------------------------------------

What I have done as below, but got error (between --> <--),

1. For PIX:
   config t > int ethernet5 >
   ip address intf5 10.10.2.3 255.255.255.240
-->can not remove route entry because it does not exist<--

2. For Switch : The int fa0/8 does not exclude from Vlan ( Is the correct), It is still a member og VLAN 6.
   config t > int fa0/8
   noswitchport
   ip address 10.10.2.4 255.255.255.240
-->10.10.2.0 overlaps with Vlan6<------

I guess error for PIX is fine, how about error for Switch ? Because of Int fa0/8 still a member of VLAN6 ?

Thanks

Make the ports between the PIX and the switch a different network than you have anywhere else:

PIX:
 ip address intf5 192.168.11.1 255.255.255.252

SWITCH:
 int fast 0/8
  ip address 192.168.11.2 255.255.255.252
 

On your PIX, you will have to add static routes:

route ethernet5 10.10.2.0 255.255.255.240 192.168.11.2
route ethernet5 192.168.3.0 255.255.255.0 192.168.11.2
route ethernet5 192.168.4.0 255.255.255.0 192.168.11.2
route ethernet5 192.168.5.0 255.255.255.0 192.168.11.2
route ethernet5 192.168.6.0 255.255.255.0 192.168.11.2
lrmoore,

I could ping 192.168.11.1 and 192.168.11.2 from Router and Switch now. Error "Type help or '?' for a list of available commands", after enter static route, I have check syntax, do not see anything wrong, any idea ? see the information from PIX bellow,

Please advise, if I have to add more point for my question.

------------------------------------------------------

Firewall# config t
Firewall(config)# int e5
Firewall(config)# route ethernet5 10.10.2.0 55.255.255.240 192.168.11.2
Type help or '?' for a list of available commands.

Firewall# show ip
System IP Addresses:
        ip address outside 172.16.1.5 255.255.255.240
        ip address inside 172.16.2.2 255.255.255.240
        ip address intf2 10.10.1.2 255.255.255.240
        ip address intf3 10.10.3.2 255.255.255.240
        ip address intf4 192.168.1.1 255.255.255.255
        ip address intf5 192.168.11.1 255.255.255.252
Current IP Addresses:
        ip address outside 172.16.1.5 255.255.255.240
        ip address inside 172.16.2.2 255.255.255.240
        ip address intf2 10.10.1.2 255.255.255.240
        ip address intf3 10.10.3.2 255.255.255.240
        ip address intf4 192.168.1.1 255.255.255.255
        ip address intf5 192.168.11.1 255.255.255.252

Firewall# show route
intf2 10.10.1.0 255.255.255.240 10.10.1.2 1 CONNECT static
intf2 10.10.2.0 255.255.255.240 10.10.1.1 1 OTHER static
intf3 10.10.3.0 255.255.255.240 10.10.3.2 1 CONNECT static

outside 172.16.1.0 255.255.255.240 172.16.1.5 1 CONNECT static

inside 172.16.2.0 255.255.255.240 172.16.2.2 1 CONNECT static

intf4 192.168.1.1 255.255.255.255 192.168.1.1 1 CONNECT static

inside 192.168.2.0 255.255.255.0 172.16.2.1 1 OTHER static
inside 192.168.3.0 255.255.255.0 172.16.2.1 1 OTHER static
inside 192.168.4.0 255.255.255.0 172.16.2.1 1 OTHER static
inside 192.168.5.0 255.255.255.0 172.16.2.1 1 OTHER static
inside 192.168.6.0 255.255.255.0 172.16.2.1 1 OTHER static

intf5 192.168.11.0 255.255.255.252 192.168.11.1 1 CONNECT static

These are connected to interface 5 and the route is to 192.168.11.2. You have them all pointing to the inside now where they should point to Ethernet5 with next hop 192.168.11.2.

inside 192.168.2.0 255.255.255.0 172.16.2.1 1 OTHER static
inside 192.168.3.0 255.255.255.0 172.16.2.1 1 OTHER static
inside 192.168.4.0 255.255.255.0 172.16.2.1 1 OTHER static
inside 192.168.5.0 255.255.255.0 172.16.2.1 1 OTHER static
inside 192.168.6.0 255.255.255.0 172.16.2.1 1 OTHER static

lrmoore,

I made a mistake for the question, the correct question as bellow, I have increased the point to 350 for you, appreciate your time.


How to configure Trunk for VLAN, in order for VLAN talk to each other on Cisco Catalyst Multilayer 3550-48
switch,
The following is the vlan diagram,

Port       VLAN                    VLAN IP Address
------     -------------           -----------------
39-48      VLAN 1 -Default         NA
1-3        VLAN 2 - 172.16.2.0/28  172.16.2.1
NC*        VLAN 3 - 192.168.1.0/21 NC*
4-6        VLAN 5 - 10.10.1.0/28   10.10.1.1
7-9,25-32  VLAN 6 - 10.10.2.0/28   10.10.2.1
33-38      VLAN 7 - 10.10.3.0/28   10.10.3.1
10-12      VLAN 10- 192.168.2.0/24 192.168.2.1
13-15      VLAN 11- 192.168.3.0/24 192.168.3.1
16-18      VLAN 12- 192.168.4.0/24 192.168.4.1
19-21      VLAN 13- 192.168.5.0/24 192.168.5.1
22-24      VLAN 14- 192.168.6.0/24 192.168.6.1

This switch is uplink to Cisco Firewall 525, that have 6 port ( 2 equiped + 4 added), Firewall uplink
to internet router.

---------------------------------------
Vlan 2,5,7,10 connect to firewall as DMZ Zone, 4 port used.
Firewall uplink to Internet Router, 1 port used.
Now, There is only 1 port left in Firewall.
---------------------------------------

How to configure Vlan 6,11,12,13,14 to communicate each other and not communicate with vlan 2,5,6,7, because of Vlan 2,5,6,7 are located in DMZ Zone? I try to get solution from http://www.cisco.com/univercd/cc/td/doc/product/lan/c3550/1218ea1/3550scg/swiprout.htm#xtocid2 as you suggested,

so far I guess That I need to use port-channel, but it confuse me, PLease kindly instruct me step by step.





Check out this reference. Look at creating vlan maps, access-lists, and apply the vlan maps to the appropriate vlans. What you want to do is setup access-lists that deny traffic from ip addresses in 6,11,12,13,14 to ip addresses in the other vlans, and vice-versa.

http://www.cisco.com/univercd/cc/td/doc/product/lan/c3550/1218ea1/3550scg/swacl.htm#xtocid4

I'll get more specific in my next post..

lrmoore,

For Cat2900xl, different Vlan has to connect to another Layer3 device, in order to route traffic between Valn. without Layer3 device (router/bridge) exist, No route traffic between Vlan.

For Cat3550, It confuse me, ip routing disabled,routing protocol/Rip disabled, Build 10 Vlans as described above, I found out that I can still ping device between Vlans. Is there anything I miss here ? or this is a nature design of the Cat3550 that I need to use VlanMAp/Accesslist on Vlan ?
ASKER CERTIFIED SOLUTION
Avatar of Les Moore
Les Moore
Flag of United States of America image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial