Solved

Network design questions - Layer 3 switches w/ ASAs

Posted on 2010-11-17
9
815 Views
Last Modified: 2012-05-10
Hi,

I am preparing an upgrade to our network, we have 2 x ASA 5510 Sec Plus devices, and 2 x Cisco 3560 L3 switches.

I am planning on doing Active/Passive with the ASAs at the edge, however, I'm worried about interVLAN routing on the layer 3 switches as far as ACL management. I want to use the 3560s as the default gateway (HSRP) for all the equipment behind in order to use wire speed transfers between VLANs. ACL management on the ASA is infinitely easier to manage than on the L3 switches. I'll need 2 sets of ACLs (which will be mostly the same since it is multi-tenant)... does anyone have any advice on this configuration?

Thank you!
0
Comment
Question by:dkattan
  • 2
  • 2
  • 2
  • +2
9 Comments
 
LVL 11

Expert Comment

by:diprajbasu
ID: 34161798
better you go for HA mode for the ASA.
0
 

Author Comment

by:dkattan
ID: 34161839
What do you mean? I am planning on using the 2 ASAs with Active/Standby mode would that be HA?
0
 
LVL 29

Expert Comment

by:Alan Huseyin Kayahan
ID: 34162656
0
Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

 
LVL 7

Expert Comment

by:kellemann
ID: 34163637
Just so I understand correctly: Are you worried about traffic getting routed directly between vlans on the 3560s, instead of being handled by the firewalls, or is that your intention?
0
 

Author Comment

by:dkattan
ID: 34164095
I am worried about both. Reason being, there are a dozen or so servers behind the 3560s that should not have access to each other, the sames rules on the firewall should apply to the 3650
0
 
LVL 7

Accepted Solution

by:
kellemann earned 250 total points
ID: 34164384
You don't mention how many VLANs you have, and how complex the interaction between them is, so I'm not sure what the right strategy should be. If you can keep the rules simple, I would go with a blacklist strategy. Assume the following:
Vlan 10 is not allowed to communicate with vlan 20. Create an ACL where you deny traffic from vlan 10 to 20, and permit everything else:

ip access-list extended VLAN10-in
 deny ip 10.1.10.0 0.0.0.255 10.1.20.0 0.0.0.255
 permit ip any any

interface vlan10
 ip access-group VLAN10-in in

You can't have both ways though. Either you filter the vlans at the switch level or you do it at the firewalls. No need for identical rules on the ASAs. Keep the vlan specific stuff at the switches, and filter everything else at the firewalls.
Mind you, this is only if you want the fastest possible inter-vlan communication. If you would like more control, and don't mind taking a hit on speed, simply don't give the vlans ip addresses on the swithes, and handle everything at the firewalls.
0
 
LVL 29

Assisted Solution

by:Alan Huseyin Kayahan
Alan Huseyin Kayahan earned 250 total points
ID: 34165254
Your setup is a common practise. Firewall has nothing to do with intervlan routing or intervlan filtering. It is handled (it should be) in L3 switch. Since active/standby pair replicates configurations between each other, all you have to worry about is to keep your switches with identical ACLs. If you cant afford ciscoworks, my above posted recommendation should work
0
 
LVL 69

Expert Comment

by:Qlemo
ID: 34488504
This question has been classified as abandoned and is being closed as part of the Cleanup Program.  See my comment at the end of the question for more details.
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
IPv6 question 1 31
ASA RADIUS Authetication for Management Access 13 33
parental control on huwei HG658b 1 26
How to Link NetGear wireless AC-1200 router to Sonicwall 3600 13 59
Creating an OSPF network that automatically (dynamically) reroutes network traffic over other connections to prevent network downtime.
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …
Both in life and business – not all partnerships are created equal. Spend 30 short minutes with us to learn:   • Key questions to ask when considering a partnership to accelerate your business into the cloud • Pitfalls and mistakes other partners…

790 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question