Solved

ASA 5505 Routing InterVLANS  with Linksys SRW248G4

Posted on 2011-09-30
3
542 Views
Last Modified: 2012-06-21
Hello I have the following scenario: In the office I have an ASA 5505 Security Plus license with a switch cisco lynksys SRW248G4, I want to segment my network into 8 subnets 192.168.10.x 255.255.255.240, in my switch I have  8 vlan, one for each department and need everyone to communicate with each other, my goal is to divide my broadcast domain, each vlan I assign IP address through DHCP from my ASA 5505 that has a trunk port  which connects to a trunk port on my switch and trunk communication works well when I connect a computer to a vlan it gets its ip address from dhcp server on the asa 5505, my problem is that I can not make my vlans to communicate with each other, and I need internet access through the outside interface too, when I connect a computer to a VLAN, this computer is not able to communicate with another computer in other VLAN, which settings I have to do to allow this communication? this is my  running-config:

Result of the command: "show running-config"

: Saved
:
ASA Version 8.2(1)
!
hostname ASA5505
enable password .bh8cq0o encrypted
passwd 2KFQnbNIdI.YOU encrypted
names
!
interface Vlan1
 nameif Server
 security-level 100
 ip address 192.168.10.1 255.255.255.240
!
interface Vlan2
 nameif outside
 security-level 0
 ip address dhcp setroute
!
interface Vlan20
 nameif Depto1
 security-level 100
 ip address 192.168.10.17 255.255.255.240
!
interface Vlan30
 nameif Depto2
 security-level 100
 ip address 192.168.10.33 255.255.255.240
!
interface Vlan40
 nameif Depto3
 security-level 100
 ip address 192.168.10.49 255.255.255.240
!
interface Vlan50
 nameif Depto4
 security-level 100
 ip address 192.168.10.65 255.255.255.240
!
interface Vlan60
 nameif Depto5
 security-level 100
 ip address 192.168.10.81 255.255.255.240
!
interface Vlan70
 nameif Depto6
 security-level 100
 ip address 192.168.10.97 255.255.255.240
!
interface Vlan80
 nameif Depto7
 security-level 100
 ip address 192.168.10.113 255.255.255.240
!
interface Ethernet0/0
 switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
 switchport trunk allowed vlan 1,10,20,30,40,50,60,70,80
 switchport trunk native vlan 1
 switchport mode trunk
 speed 100
 duplex full
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
banner motd Hi
ftp mode passive
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
access-list Depto1_access_in extended permit icmp any any
access-list Server_access_in extended permit icmp any any
access-list Server_access_in extended permit ip any any
access-list Depto2_access_in extended permit icmp any any
access-list Depto4_access_in extended permit icmp any any
access-list Depto3_access_in extended permit icmp any any
access-list Depto5_access_in extended permit icmp any any
access-list Depto6_access_in extended permit icmp any any
access-list Depto7_access_in extended permit icmp any any
access-list acl_in extended permit tcp any any
access-list acl_in extended permit icmp any any
pager lines 24
logging enable
logging asdm informational
mtu Server 1500
mtu outside 1500
mtu Depto1 1500
mtu Depto2 1500
mtu Depto3 1500
mtu Depto4 1500
mtu Depto5 1500
mtu Depto6 1500
mtu Depto7 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
icmp permit any Server
icmp permit any Depto1
no asdm history enable
arp timeout 14400
global (outside) 1 interface
access-group acl_in in interface Server
access-group Depto1_access_in in interface Depto1
access-group Depto3_access_in in interface Depto2
access-group Depto5_access_in in interface Depto3
access-group Depto6_access_in in interface Depto4
access-group Depto2_access_in in interface Depto5
access-group Depto7_access_in in interface Depto6
access-group Depto4_access_in in interface Depto7
route outside 0.0.0.0 0.0.0.0 192.168.1.1 1
route Depto1 192.168.10.16 255.255.255.240 192.168.10.1 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
dynamic-access-policy-record DfltAccessPolicy
http server enable
http 192.168.10.0 255.255.255.240 Server
http 192.168.10.16 255.255.255.240 Depto1
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
telnet timeout 5
ssh timeout 5
console timeout 0
management-access Server
dhcpd auto_config outside
!
dhcpd address 192.168.10.3-192.168.10.14 Server
dhcpd enable Server
!
dhcpd address 192.168.10.18-192.168.10.30 Depto1
dhcpd enable Depto1
!
dhcpd address 192.168.10.34-192.168.10.46 Depto2
dhcpd enable Depto2
!
dhcpd address 192.168.10.50-192.168.10.62 Depto3
dhcpd enable Depto3
!
dhcpd address 192.168.10.66-192.168.10.78 Depto4
dhcpd enable Depto4
!
dhcpd address 192.168.10.82-192.168.10.94 Depto5
dhcpd enable Depto5
!
dhcpd address 192.168.10.98-192.168.10.110 Depto6
dhcpd enable Depto6
!
dhcpd address 192.168.10.114-192.168.10.126 Depto7
dhcpd enable Depto7
!

threat-detection basic-threat
threat-detection statistics
threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200
webvpn
username Admin password dgL/aM5ybE2cn encrypted
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect rsh
  inspect rtsp
  inspect esmtp
  inspect sqlnet
  inspect skinny  
  inspect sunrpc
  inspect xdmcp
  inspect sip  
  inspect netbios
  inspect tftp
!
service-policy global_policy global
prompt hostname context
Cryptochecksum:86c0ab4f41ad946466450c623928
: end

thank you very much
0
Comment
Question by:fernoz
3 Comments
 
LVL 10

Accepted Solution

by:
SuperTaco earned 500 total points
Comment Utility
You need to create access lists that allow the VLANs to talk to eachother.  this is very simple to do with ASDM.  this is another EE post that might help out.

http://www.experts-exchange.com/Security/Software_Firewalls/Enterprise_Firewalls/Cisco_PIX_Firewall/Q_24418723.html
0
 
LVL 12

Expert Comment

by:Fidelius
Comment Utility
Remove this route:
route Depto1 192.168.10.16 255.255.255.240 192.168.10.1 1
This doesn't make any sense as Depto1 interface is in that network.

And issue:
no nat-control

It should fix your problem.

Regards!
0
 

Author Closing Comment

by:fernoz
Comment Utility
I finally complete my implementation, for asa 5505 I use access lists, NAT rules and NAT exception rules for the access to internet, and this work fine, I was experimenting some lag in ftp, but I don´t  know what is.
0

Featured Post

Highfive + Dolby Voice = No More Audio Complaints!

Poor audio quality is one of the top reasons people don’t use video conferencing. Get the crispest, clearest audio powered by Dolby Voice in every meeting. Highfive and Dolby Voice deliver the best video conferencing and audio experience for every meeting and every room.

Join & Write a Comment

There are times where you would like to have access to information that is only available from a different network. This network could be down the hall, or across country. If each of the network sites have access to the internet, you can create a ne…
In the world of WAN, QoS is a pretty important topic for most, if not all, networks. Some WAN technologies have QoS mechanisms built in, but others, such as some L2 WAN's, don't have QoS control in the provider cloud.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now