Cisco
--
Questions
--
Followers
Top Experts
We are planning to deploy  Wireless Internet Access throughout campus. The campus consists of three buildings ( B1,B2 and B3). All the three buildings are networked together.
The campus cores are located in B1 Data  Center and each building has  its own Distribution Switches connected to Cores on L3 links. Access Switches are terminated to Distribution Switches
The Cores and Distribution Switches are configured with several VLANs.
We have already bought Cisco WAPs and Controller ready for deployment. Each WAP will be configured with 2 SSIDs
In this question, we are just concerned about Guest Internet Access.
We have got new Internet Connection of 50 Mbps and Cisco Router dedicated to Guests, the line is terminated in our DC and will be connected to Core Switch.
Now my concern is what is the best possible way to design secure network for Guests. The Guest traffic should not be talk to Staff and Servers networks.
Many thanks in advance.
Zero AI Policy
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
If you have any Wi-Fi on the main network, secure it very well so normal guests cannot crack it.






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
The first page shows how you can cascade routers (which entails double or triple NAT but I find no particular disadvantage to that - in contrast to opinions of some). Â When you cascade routers, the guest router should be at the "top" nearest the internet gateway. Â In some cases, the computers at the "bottom" can "see" the computers higher up but not the reverse. Â It is true that packets destined for the internet from the "private" LAN will traverse the upper LAN but without physical access I don't know how those packets could be sniffed.
The second page shows how you can run routers in parallel in which case there are no computers on common LANs. Â There is still double NAT but not triple. Â There are no computers on a LAN that shares traffic (even if on a separate subnet - as "LAN" and "subnet" aren't the same thing).
With this sort of thing in mind then, if you have VLAN-capable hardware you might effectively do the parallel method with a single router and two VLANs - a VLAN replacing a router each.
But, if you don't, then commodity routers will do just as shown.






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
If you dont have an anchor WLC you can connect the guest internet circuit directly to the corporate WLC using a dedicated port and send guest wireless traffic straight out of the internet router. That sounds like the way forward here.
If I have multiple internet connections and dedicated for each provider in the buildings, how is that possible then ?
Because we have guests and different third party contracted providets requires only Internet Access and L2L VPN between us and them.
What is the best way to design such network ?

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
Please find the attached diagram, it is just main layout without any showing any redundant links






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
These internet connections will not be limited to Wireless only, many of users will be Wired Connections also.
Thanks

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
Yes we have ACLs to prevent VLANs talking to each other.
Thanks






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
1] Does each site need to see any other's traffic?
2] Are the Internet connections specific to particular sites, or does each site use P1 and P2?
3] What control do you have over the Internet routers?
1. Sites should be able to see the traffic between each other, only Guest and Providers shouldn't be see each other and our production network.
2. Currently internet connections are dedicated for each providers and guests
3. Actually we controls to be honest, but I'm really interested to limit the traffic from bandwidth point of view.

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
Currently the SVIs for the VLANs are on distribution switches, so do I need to move all SVIs to Cores ?

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
As Craig knows he means publishing the configuration here in the Q&A forum.
int gi2/10
description < Link to gi1/1/1 to  Distribution SW1 B1
ip address 10.41.23.1 255.255.255.252
Core Switch 2
int gi2/10
description <Â Link to Gi2/1/1 Distribution SW2 B1
ip address 10.41.24.1 255.255.255.252
DSW1
int gi1/1/1
ip address 10.41.23.2 255.255.255.252
DSW1
int gi2/1/1
ip address 10.41.24.2 255.255.255.252
So you have 2 cores, not 1?
How does each core see each other? Â Do you have L2 or L3 links between?
Does the Guest internet circuit connect to both cores?






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
Yes we have 2 Cores at the Core Layer. They are connected as Layer 2. But after 2-3 months we are planning to add VSS.
Internet circuit is connected to a router and router is connected Core 1 only as of now without L2 or L3 configuration between router and core
You can do the wireless bit easily but wired guest will be a little harder as VRF will be required to securely route traffic (as you have L3 links between core and dists).
What dist switches do you have, Samir?
VSS might take some time to implement and we need to Guest and Providers Internet
We have 3750x at Dist.
I have no issue to go with VSS with your kind support

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
We have already got the internet circuit
Just need to design and implement the solution






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
I'll send a config tomorrow :-)
The config is complicated but I will try to work out
Just to clarify, why do we have loopback interfaces it is just for OSPF Router Id purposes?






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
Basically, all interfaces in the GUEST VRF are in a separate routing domain to the CORP interfaces. The GUEST interfaces are tagged in the GUEST VRF using the ip vrf forwarding GUEST command. This keeps them separate from the 'global' routing table where CORP interfaces live.
We have another site which has a separate Guest Internet Circuit. This site has collapsed core network so how the configuration will look if the Guest Internet Router was connected to Collapsed Core Switch
I'm going to office tomorrow to test all the config
Thanks
Have a look at each section of the config I gave you to see how it fits. The static default route is tagged in a VRF too.

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
Sorry for the delay in reply.
This is topology I have setup in GNS3 but not configured anything yet.
How I can inject VRF route into global routing table and vice versa
As I have monitoring station and I need to monitor the router placed in Guest and Providers VRFs

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
Thanks for the link
Just confused with some above configuration, why have you created two separate VLANs i.e Corp Transit and Guest Transit
Is it not possible with just 1 transit VLAN
Thanks
They're two separate routing domains, so if you pushed all traffic over one single L3 interface how would the next hop know which VRF to put the traffic on?
It may sound a similar question Is this scenario not possible using L3 links ?






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
interface GigabitEthernet1/1/1
description CORP TRANSIT
no switchport
ip address 10.0.0.1 255.255.255.252
!
interface GigabitEthernet1/1/2
description GUEST TRANSIT
no switchport
ip vrf forwarding GUEST
ip address 192.168.0.1 255.255.255.252
!
I see you have different configuration for HSRP on Core 1 and Core 2. The default route for GUEST VRF is pointing to Standby  IP, however the route should point to GUEST internet Router interface
I am a bit puzzled.
Another thing, the Guest Subnet is /29, here what will be the subnet for Guest Users. I want to make the routers as a DHCP server for clients also,
Thanks
The guest subnet is a /29 for the guest internet router VLAN at the core but guest users will be at DSWs so you can make them as big as you need. I used VLAN 666 with a /24 in my example.

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
Just another points
- Why you have added network statement for loopback interfaces
- Why default route is pointing to loopback ( 10.0.0.1) on Core Switche
- Also I noted you have not advertised VLAN 215,216 and 217 from Cores to DSW ?






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
The switch port on Core Switch connecting guest and providers routers should not have "ip vrf forewarding" command? Right Sir
Howevever SVIs are part of there own VRFs
The switch port on Core Switch connecting guest and providers routers should not have "ip vrf forewarding" command? Right Sir
The Guest router should be in its own VRF. Â It needs the ip vrf forwarding command. Â If you don't use that command, the GUEST VRF can't use the router to route traffic. Â Similarly, the corporate side of the network should't be able to get to the guest router. Â Only GUEST traffic should be able to get to the router.
interface Vlan215
 description Link to GUEST Internet
 ip address 192.168.0.2 255.255.255.248
 standby 255 ip 192.168.0.1
 standby 255 priority 110
 standby 255 preempt
int gi0/2
switchport access vlan 215
switchport mode access
GUEST Router
int gi0/0
ip address 192.168.0.3 255.255.255.248
with the above configuration I was  able to ping SVI IP  from Router but not vice versa Actually I was puzzled how the traffic was returned from Core to Router if I didn't put the router into GUEST VRF

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
When I am trying to add "no interface-default for Vlan2002" under VRF OSPF Process but I recieved the error  "Interface %Interface specified does not belong to this process"
Any idea what could be the issue ?
interface Vlan2002
ip vrf forwarding GUEST
Everything is configured however the VRF Guest default is not advertised to DSW1
Below is the configured and routing table
Core 1
vlan 215
!
interface Vlan215
description Link to GUEST Internet
ip vrf forwarding GUEST
ip address 192.168.0.2 255.255.255.248
standby 255 ip 192.168.0.1
standby 255 priority 110
standby 255 preempt
vlan 2002
!
interface Vlan2002
ip vrf forwarding GUEST
ip address 172.17.1.1 255.255.255.252
router ospf 2 vrf GUEST
passive-interface default
no passive-interface Vlan2002
network 172.17.1.0 0.0.0.3 area 0
default-information originate always
interface Ethernet0/1
description **Link to DSW1**
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 2001,2002
switchport mode trunk
DSW1
vlan 666
interface Vlan666
description GUEST VLAN
ip vrf forwarding GUEST
ip address 192.168.101.1 255.255.255.0
vlan 2002
interface Vlan2002
ip vrf forwarding GUEST
ip address 172.17.1.2 255.255.255.252
router ospf 2 vrf GUEST
passive-interface default
no passive-interface Vlan2002
network 172.17.1.0 0.0.0.3 area 0
network 192.168.101.1 0.0.0.0 area 0
interface Ethernet0/0
description **Link to Core*
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 2001,2002
switchport mode trunk
duplex auto
Routing Tables
Core 1
CSW1#sh ip route
Gateway of last resort is not set
1.0.0.0/32 is subnetted, 1 subnets
C 1.1.1.1 is directly connected, Loopback0
10.0.0.0/8 is variably subnetted, 4 subnets, 2 masks
C 10.0.1.0/29 is directly connected, Vlan216
L 10.0.1.2/32 is directly connected, Vlan216
C 10.0.2.0/29 is directly connected, Vlan217
L 10.0.2.2/32 is directly connected, Vlan217
172.16.0.0/16 is variably subnetted, 2 subnets, 2 masks
C 172.16.1.0/30 is directly connected, Vlan2001
L 172.16.1.1/32 is directly connected, Vlan2001
CSW1#sh ip route vrf GUEST
Routing Table: GUEST
Gateway of last resort is 192.168.0.3 to network 0.0.0.0
S* 0.0.0.0/0 [1/0] via 192.168.0.3
172.17.0.0/16 is variably subnetted, 2 subnets, 2 masks
C 172.17.1.0/30 is directly connected, Vlan2002
L 172.17.1.1/32 is directly connected, Vlan2002
192.168.0.0/24 is variably subnetted, 2 subnets, 2 masks
C 192.168.0.0/29 is directly connected, Vlan215
L 192.168.0.2/32 is directly connected, Vlan215
O 192.168.101.0/24 [110/2] via 172.17.1.2, 00:08:42, Vlan2002
CSW1#sh ip route vrf GUEST ospf
Routing Table: GUEST
Gateway of last resort is 192.168.0.3 to network 0.0.0.0
O 192.168.101.0/24 [110/2] via 172.17.1.2, 00:09:13, Vlan2002
DSW1
DSW1#sh ip route
Gateway of last resort is not set
10.0.0.0/8 is variably subnetted, 4 subnets, 2 masks
C 10.1.1.0/24 is directly connected, Vlan100
L 10.1.1.1/32 is directly connected, Vlan100
C 10.1.2.0/24 is directly connected, Vlan110
L 10.1.2.1/32 is directly connected, Vlan110
172.16.0.0/16 is variably subnetted, 4 subnets, 2 masks
C 172.16.1.0/30 is directly connected, Vlan2001
L 172.16.1.2/32 is directly connected, Vlan2001
C 172.16.2.0/30 is directly connected, Vlan2003
L 172.16.2.2/32 is directly connected, Vlan2003
172.17.0.0/16 is variably subnetted, 2 subnets, 2 masks
C 172.17.2.0/30 is directly connected, Vlan2004
L 172.17.2.2/32 is directly connected, Vlan2004
DSW1#sh ip route vrf GUEST
Routing Table: GUEST
Gateway of last resort is not set
172.17.0.0/16 is variably subnetted, 2 subnets, 2 masks
C 172.17.1.0/30 is directly connected, Vlan2002
L 172.17.1.2/32 is directly connected, Vlan2002
192.168.101.0/24 is variably subnetted, 2 subnets, 2 masks
C 192.168.101.0/24 is directly connected, Vlan666
L 192.168.101.1/32 is directly connected, Vlan666






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
But the problem is DSW is not receiving the default VRF route from but the Core received the VRF subnet
I tried the above the command but still I don't see any route on DSW1 for Guest VRF
DSW1
DSW1#show ip route vrf GUEST ospf
Routing Table: GUEST
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
+ - replicated route, % - next hop override
Gateway of last resort is not set
CSW- Core
CSW1#sh ip route vrf GUEST ospf
Routing Table: GUEST
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
+ - replicated route, % - next hop override
Gateway of last resort is 192.168.0.3 to network 0.0.0.0
O E2 192.168.101.0/24 [110/20] via 172.17.1.2, 00:00:17, Vlan2002

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
router ospf 2 vrf GUEST
router-id 192.168.0.3
passive-interface default
no passive-interface Vlan2002
network 172.17.1.0 0.0.0.3 area 0
default-information originate
I removed default-information originate from DSW1 Switch but no clue why it was causing this issue
router ospf 2 vrf GUEST
 redistribute connected subnets
 passive-interface default
 no passive-interface Vlan2002
 network 172.17.1.0 0.0.0.3 area 0
no default-information originate






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
You can configure OSPF on the guest router to learn routes from the core and put default-information originate always there then the core will use the guest router as its default route.
router ospf 1
network 192.168.0.3 0.0.0.0 area 0

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
Core
router ospf 2 vrf GUEST
 router-id 192.168.0.3
 passive-interface default
 no passive-interface Vlan2002
 no passive-interface Vlan215
 network 172.17.1.0 0.0.0.3 area 0
 default-information originate
Router
router ospf 2
network 192.168.0.3 0.0.0.0 area0
network 192.168.0.0 0.0.0.3 area 0






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
Everything is working fine as desired
Thanks a lot for your usual excellent support and precious time
Cisco
--
Questions
--
Followers
Top Experts
Cisco PIX is a dedicated hardware firewall appliance; the Cisco Adaptive Security Appliance (ASA) is a firewall and anti-malware security appliance that provides unified threat management and protection the PIX does not. Other Cisco devices and systems include routers, switches, storage networking, wireless and the software and hardware for PIX Firewall Manager (PFM), PIX Device Manager (PDM) and Adaptive Security Device Manager (ASDM).