How would you create a vlan on a cisco catalyst 3500 connect to Cisco asa 5500.

Posted on 2009-04-17
Last Modified: 2012-06-27
How would you create a vlan on a cisco catalyst 3550 switch connect to Cisco asa 5500 firewall.
Question by:henjohn1520
    LVL 4

    Accepted Solution

    here is how to do it. It is a step by step walk through if you get stuck just add a comment and I will do my best. The second link is for vtp.

    Author Comment

    What changes would need to be done on the asa 5500 firewall? Would I have to create a vlan to match the new vlan on the switch? Let me explain how the Cisco 3550 switch is connected to the Cisco ASA 5500 firewall.

    Port 0/23 on the Cisco 3550 switch is connected to port 0/1 on the Cisco ASA 5500 firewall. Port 0/23 is in the Cisco 3550s default vlan 1 and its set to switchport mode dynamic desirable. Port 0/1 is in the Cisco ASA 5500s vlan1. What would be the first step?
    LVL 79

    Expert Comment

    You would create a trunk port between the switch and the ASA
    On the switch:
     interface fast 0/23
      switch trunk encap dot1q
      switch mode trunk

    Then, define a VLAN on the switch:
     vlan 123
    Then, assign an interface to this vlan
     interface fast 0/xx
      switch access vlan123

    On the ASA, create a sub-interface for the new vlan, with vlan ID
    interface Ethernet 0/0.123
     vlan 123
     nameif vlan123
     security-level 100
     ip address

    Author Comment

    Would anything need to be done to allow computers on the new vlan to access the internet.

    Author Comment

    I am unble to create a sub-interface with my cisco asa 5505.  I followed the commands that you provided, but I was unable to.
    LVL 79

    Expert Comment

    Ah.. 5505 is a little different
    Here's a good piece from our friend batry_boy

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Suggested Solutions

    I see many questions here on Experts Exchange regarding switch port configurations and trunks. This article is meant for beginners in the subject to help to get basic knowledge about Virtual Local Area Network (VLAN (…
    I eventually solved a perplexing problem setting up telnet for a new switch.  I installed a new Cisco WS-03560X-24P switch connected to an existing Cisco 4506 running a WS-X4013-10GE Sup II-Plus. After configuring vlans and trunking,  I could no…
    Need more eyes on your posted question? Go ahead and follow the quick steps in this video to learn how to Request Attention to your question. *Log into your Experts Exchange account *Find the question you want to Request Attention for *Go to the e…
    Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…

    737 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    18 Experts available now in Live!

    Get 1:1 Help Now