6509 uplink to ASA with pair of Vlan

I have the following topology:

6509---> ASA---> Internet.

My 6509 have a JOINT.

intrusion detection module 3 management access port - vlan 2

3-port data module 1 intrusion detection allowed - vlan trunk 352,603,1352,1603

I want to put the JOINT between 6509 and ASA.

6509 have a vlan 603 where inside the ASA is connected and I have already created VLANs to briding with 603 1603, this way

I put the cable inside the ASA to vlan 1603, before was connected on vlan 603 but when I changed switchport vlan

SAA (603 to vlan 1603) my vlan 603 breaks down and I can't access the internet.

VLAN 603 down because there is that no user not connected them but I thought that briding how JOINT 603 with 1603

This vlan 603 will be again, but does not work.

How can I configure the IDM to this Vlan?

I guess the switch itself has a 603 interface vlan, and it is this 603 interface vlan that goes down.

By default the JOINT-2 data ports are configured to exclude "autostate" which means that is the JOINT-2 port and the interface vlan switches are the only things on the vlan, then the switch will lower its interface. The switch does not include the JOINT-2 interface when you are looking for other ports in the vlan.

There is a command:

3-port data module 1 intrusion detection autostate include

With this command the JOINT-2 port will now appear in the list of ports to monitor, and the switch must now implement its 603 interface vlan.

You can see the list of available commands for the JOINT-2 here:

http://www.Cisco.com/en/us/docs/security/IPS/7.0/Configuration/Guide/CLI/cli_idsm2.html#wp1032690

Tags: Cisco Security

Similar Questions

  • Addition of VLAN model vNIC gives recoverable warning on no uplink with all the VLANS

    We try to add a new VLAN to an existing model vNIC. When I select the check box for the VLAN under Edit VLAN, I get:

    Your changes:

    Create: [new VLAN]

    Will result in a warning of non-fatal configuration for:

    Service profile [ProfileName]

    Reason: Could not find any operational uplink port that carries all the VLAN of the vNIC (s). VNIC (s) will be closed down, which lead us to disruptions of traffic on all the VLANS existing on the vNIC (s).

    We have currently VLAN assigned to the model, of which some are carried by a channel of port on our switch of production, the rest are carried by an Ethernet interface for our perimeter switch.

    This error occurs because no interface/PC carries all the VLAN assigned on its own?

    Am I missing something?

    Thank you for any assistance.

    Joe

    Hello

    Even if you have a port channel and a separate uplink Ethernet carrying all them VLAN which required servers, your vnic will only be pinned to the port-channel or the uplink Ethernet never at the same time, so if your vnic is currently pinned on the port-channel and the new VLAN is assigned to the Ethernet interface you may be seeing this error message. To resolve this problem, you must ensure that the uplink your vnic is pinned puts implement all the VLANS that you want.  See doc below

    Separate layer 2

    http://www.Cisco.com/c/en/us/solutions/collateral/data-center-virtualiza...

  • ASA with different failover module IPS

    Hi all

    Is it possible to configure the failover of the ASA with different IPS module configuration because we have: ASA 5585-X with firepower PHC-10 and ASA 5585-X with IPS SSP-10

    Thank you

    N °

    Inventories of material (basic unit, memory and optional modules) must be the same in a pair of failover ASA.

  • ASA with firepower and Licensing Service

    Hello

    If I buy an ASA with the power of Fire Service (e.g. 5516-X) should which licenses I buy?

    I understand that I need to order a license for the Service of firepower. E.g. IPS, URLS, and AMP.

    Should I order a license management FireSIGHT, too? The centre of mandatory FireSIGHT management? This license is necessary?

    Concerning

    You will need the license of control (CTRL). It is free and automatically included with any package of power of fire SKU (i.e. ASA5516-FPWR-K9).

    Then you must add the IPS, URLS or AMP (or combination of both) services in term 1, 3 or 5 years.

    FireSIGHT Management Center is not required for entry-level (5506, 5508 or 5516) models. It is optional on those you can use the entry firesight level integrated in ASDM for the model.

    For all other models, it is necessary. If you manage more than a simple ASA (even an HA pair) it is recommended even for the entry level models that you will be so power sync policies through them all.

  • PAIR OF VLAN

    Guys I have a small and stupid question.

    Is there a problem with TCP using pairs of VLAN. The IPS resets the connections? Problem is that I do for example a PAIR of vlan 50 do VLAN 51 when traffic is a native of vlan 50 he will inspect traffic and sent to VLAN 51 say that was a SYN packet

    I have my switch configured to route traffic comes from vlan 50 so the IPS can watch it. But I don't have a map of the route configured for VLAN 51 returned traffic... So the IPS will never see the SYN ACK to come.

    Is this a problem?

    For inline VLAN matching, if the sensor will not see the full TCP stream, this can be a problem for the sensor determines that he is attempting to evade the IDS and refuse to turn traffic traffic.  This can cause the sensor to deny traffic in turn.

    You can order the sensor to operate in a mode of asymmetrical treatment that relax the normalizer TCP, as shown here:

    http://www.Cisco.com/en/us/docs/security/IPS/7.0/Configuration/Guide/CLI/cli_virtual_sensors.html#wp1038004

    Scott

  • 802. 1 x with assignment of VLANs

    Hello

    I'm trying to Setup 802. 1 x with assignment of VLANS. I have been successfully obtained the authentication works, but assigning VLAN is not applied. I tried this on a CE500, and WS2950-12 once encountering the same problem.

    If I "debug dot1x all the" I get a few messages "dot1x-ev: received VLAN Id - 1", if I'm capturing packets on my radius server, I see that the correct attribute pairs are extinguished. "." Nothing in the notes say that 802. 1 x with dynamic VLAN will not work.

    Attribute value pairs

    AVP: l = t = Framed-Protocol (7) 6: PPP (1)

    AVP: l = t = Service-Type (6) 6: Framed-User (2)

    AVP: l = t = Tunnel-Medium-Type (65) 6: Unknown (16777222)

    AVP: l = 5 t = Tunnel-Private-Group-Id (81) Tag = 0 x 01:20

    AVP: l = t = Tunnel-Type (64) 6: Unknown (16777229)

    AVP: l = 6 t = EAP - Message (79) last Segment [1]

    AVP: l = 46 t = Class (25): 53F9068C00000137000102000A011E630000000000000000...

    AVP: l = 14 t = Vendor-Specific (26) v = Microsoft (311)

    AVP: l = 51 t = Vendor-Specific (26) v = Microsoft (311)

    AVP: l = 58 t = Vendor-Specific (26) v = Microsoft (311)

    AVP: l = 58 t = Vendor-Specific (26) v = Microsoft (311)

    AVP: l = 18 t = Message-Authenticator (80): 33B53112C51B15C40BFBDCE687F4C9C4

    Please check if all 3 of these attributes are set correctly on the Radius Server:

    AVP: l = t = Tunnel-Medium-Type (65) 6: Unknown (16777222)

    AVP: l = 5 t = Tunnel-Private-Group-Id (81) Tag = 0 x 01:20

    AVP: l = t = Tunnel-Type (64) 6: Unknown (16777229)

    It seems that only the Tunnel-private-Group-Id is defined, not the other two.

    CFR. http://www.Cisco.com/en/us/Tech/tk722/tk809/technologies_configuration_example09186a008076317c.shtml

  • Protect and control the license for ASA with the power of fire

    I had 1 ASA 5515 initially delivered with the software cx, then made room for the software of firepower and got the virtual firesight for 2 devices and license of TAMAS tha L-5515, but this license was told only the URLs and malware license, I thought that this license was for all that since he has no other licenses in the data sheet and it's Reference with more features.

    How can I get the license protect and control now so I can add the asa with the firepower to firesight and apply to all licenses

    Thank you

    Hello

    L ASA5515-TAMAS = SKU license plans to "MALWARE" and "URLFilter" and legally gives the user to updates of the signature "PROTECT + CONTROL". It does not license "PROTECT + CONTROL". You need to buy "ASA5515-CTRL-LIC =" to license "PROTECT + CONTROL".

    Please discuss a case with CISCO GLO, they can help provide a CTRL license

    -DD

  • Cisco ASA with the power of fire vs Cisco IPS Appliance

    Hello

    Question: is there the functional differences between an ASA with the feature of firepower enabled and power of fire IPS appliances 'pure' (e.g. 7000 and 8000 series IPS Modules)?

    Thank you very much!

    Kind regards

    David

    Hello team,

    The same features except hardware bypass and another should trhougputs. Of course the flow rate will be high for hardwrae devices and it also has the ability to bypass equipment. Apart from that URL and all other filtering the same characteristics.

    Rate of good will if this post helps you.

    Concerning
    Jetsy

  • ASA with fire 5555 x Installation/Configuration/full features enablment

    Dear,

    I had a lot of confusion about the ASA with the power of fire all the new features, upgrade, changes made me lost.

    Can someone describes the steps to install the ASA with firepower and upgrade its image & package and the license application. (configuration of the box from scratch).

    What is the best practice for the installation of ASA with firepower in a network?

    TAMÁS is our license what are the features will be important for me, if I want to do a total security. And how about internet proxy I think of ending my TMG Web proxy and use this ASA. I want to use the devices to its full occupancy and all the features that I needed to be activated if necessary.

    How to deal with WLC and the wireless network (which is the best practice for ASA with the firepower and WLC

    Yes maybe that's a lot, but I think many inspiring answers will knock at least with redirection to another topic or some brilliant ideas.

    Kind regards

    Christel

    @mishaal-thabet

    There is a Quick Start Guide to ASA with module power of fire services here:

    http://www.Cisco.com/c/en/us/TD/docs/security/ASA/Quick_Start/SFR/firepo...

    In addition, to configure your policies of Management Center of firepower to make the most effective module, I recommend the Cisco Live presentation by 2015: "BRKSEC-2018 migration ASA IPS and CX to firepower." You don't have to worry about the title, it's a good overview for most use cases.

    It can be found here:

    https://www.ciscolive.com/online/connect/sessionDetail.WW?SESSION_ID=836...

    The WLC interact with the ASA directly but the placement of your controller and you use anchor and host controllers can play in your ASA interface design (i.e. comments in an area controllers demilitarized). Other than that, Wireless subnets are just part of the variable "$HOME_NET" located on the module of firepower.

    I hope this helps.

  • Need help with configuration of VLAN SF300-24

    Hello

    Let me Preface this with the fact that networking is certainly not my point hard, so here, any help is greatly appreciated.

    I'm trying to segment on a virtual desktop on its own VIRTUAL local network infrastructure using a Cisco SF300-24 Layer 3 switch. I can get the switch to connect to the network with the assigned VLAN 1 an IP address on the subnet of the network (192.168.16.X), but I can't get anything this is set up VLAN 20 (192.168.20.X subnet) to connect past the VLAN 20 (192.168.20.254) gateway IP. The ports assigned to 20 VLAN are defined to access the mode if it matters.

    Here is a diagram to illustrate what it looks like, as there is another (L2) switch involved.

    So I'm not really sure what I am missing here since all settings seem simple enough.

    Hi Simon, I recommend you remove any server active directory and essentially remove all safety factors. This will give the idea of where to start.

    If you take a quite basic set, 2 Windows 7 workstations without a Firewall window activated, they both work as expected.

    It must be remembered that in firewalls, even if they are able to respond to ICMP if the request is from a different subnet, they will not be because he is recognized as a network abroad. You must know the network on these computers or make sure the computer does not care.

    You may be able to do this by simply adding additional subnets on the advanced configuration of the network card (if it does not take too much address space) as an example.

    Or well, as you have discovered that you can add routes, which is a bit heavy and inconvienent, but effective.

    -Tom
    Please mark replied messages useful

  • VPN IPSec ASA with two ISP active

    Hi ALL!

    I have a question.

    So I have ASA with 9.2 (1) SW connected to ISP with active SLA.

    I need to configure redundant IPSec VPN via ISP2, while all other traffic must go through isps1. In case if one of the ISP goes down all including VPN traffic must be routed via ISP alive.

    I have configured SLA and it works.

    ciscoasa # display route performance
    Route 0.0.0.0 isps1 0.0.0.0 10.175.2.5 5 track 1
    Route isp2 0.0.0.0 0.0.0.0 10.175.3.5 10 track 2
    Route isp2 172.22.10.5 255.255.255.255 10.175.3.5 1 excerpt 2

    Here we can see if isps1 and ISP2 are RISING, all traffic passes through isps1, but traffic intended for the remote peer IPSec 172.22.10.5 passes by ISP2.

    This configuration works just at the moment when isps1 or isp2 is down or if a static route for 172.22.10.5 deleted. Where two Internet service providers are increasing to ASA does not send the next remote IPSec datagrams.

    ciscoasa # display running nat
    NAT (inside, isp2) source static obj-INSIDE_LAN obj-INSIDE_LAN destination static obj-REMOTE_LAN obj-REMOTE_LAN no-proxy-arp-search to itinerary
    NAT (inside isps1) source static obj-INSIDE_LAN obj-INSIDE_LAN destination static obj-REMOTE_LAN obj-REMOTE_LAN no-proxy-arp-search to itinerary

    Crypto ipsec transform-set ikev1 ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
    Crypto ipsec pmtu aging infinite - the security association
    card crypto cm_vpnc 10 correspondence address acl_vpn
    card crypto cm_vpnc 10 set pfs
    peer set card crypto cm_vpnc 10 172.22.10.5
    card crypto cm_vpnc 10 set transform-set ESP-AES-256-SHA ikev1
    86400 seconds, duration of life card crypto cm_vpnc 10 set - the security association
    card crypto cm_vpnc interface isps1
    cm_vpnc interface isp2 crypto card
    trustpool crypto ca policy
    isps1 enable ikev1 crypto
    isp2 enable ikev1 crypto
    IKEv1 crypto policy 1
    preshared authentication
    aes-256 encryption
    sha hash
    Group 2
    life 86400

    ciscoasa # show ip
    System of IP addresses:
    Subnet mask IP address name interface method
    Vlan1 in 192.168.2.1 255.255.255.0 CONFIG
    Isps1 Vlan2 10.175.2.10 255.255.255.0 CONFIG
    Isp2 Vlan3 10.175.3.10 255.255.255.0 CONFIG

    The main question why?

    Thank you in advance,

    Anton

    Hi anton,.

    If you check the log message on your ASA R301-IS , he's trying to build the tunnel VPN with both IP and it receives packets of asymmetrically your distance ciscoasa.

    TO avoid this asymmetrical connection, point your IP from peers as primary & secondary on your R301-EAST

    set peer 10.175.3.10 10.175.2.10

    Delete the track on your routing entries

    Route isp2 172.22.10.5 255.255.255.255 10.175.3.5

    This should work for you.

    Similalry lower your ISP 2, you should see VPN tunnel is mounted with isps1 one.

    HTH

    Sandy

  • ASA with A/A and three router ISP links

    Can someone help me, I have a problem I need to connect two ASAs with active and I have three routers to three Internet service providers, how do I optimize the gateway redundancy and load balancing.

    and I can use the router to ASA's private beach.

    Another Question is, do I really need host proxy server-based internet access.

    Please help me.

    Concerning

    One solution is to use the Protocol GLBP routers (OSPF in not available in A/A...).

    "GLBP offer deals on several routers (gateways) load balancing using a virtual IP address single and multiple virtual MAC. Each host is configured with the same virtual IP address, and all of the routers in the virtual routing group are involved in the transmission of packets. »

    GLBP group-load balancing [dependent on host: alternating | weighted]

    (see feature cisco IOS to IOS and hardware available browser.) .

    http://www.Cisco.com/en/us/products/ps6550/products_white_paper09186a00801541c8.shtml

    HTH.

    Roberto

  • ASA with two internet connections

    Hello

    I want to connect an ASA with two ISPS for internet traffic, one for the VPN S2S, there is a router VPN dedicatet on the second link.

    In case of failure of the first link, the second must be enabled.

    route outside 0.0.0.0 0.0.0.0 10.20.20.1 1 track 1route backup 0.0.0.0 0.0.0.0 10.20.30.1 254
    route backup 192.168.0.0 255.255.0.0 10.20.30.1

    Is this configuration working??

    Hello

    You need to configure the 'als' monitor configuration to monitor some destination on the main IP address ISP for the ASA whether the connection works. Probably an IP address on the public network.

    SLA 1 monitor

    type echo protocol ipIcmpEcho outside interface

    NUM-packages

    timeout

    frequency

    SLA monitor Appendix 1 point of life to always start-time now

    You will also need a configuration related to 'track' of the order

    track 1 rtr 1 accessibility

    Route outside 0.0.0.0 0.0.0.0 10.20.20.1 track 1

    Backup route 0.0.0.0 0.0.0.0 10.20.30.1 254

    The above combined with the routes you mention should be enough about the delivery. Naturally for each remote VPN L2L network you will always need a specific static route on the SAA to the backup ISP device.

    Also you must naturally maintain the translations on the SAA. Seems that your ISP links have in mind a separate device that contains public IP addresses. So am I right in assuming you pass all traffic from the LAN links for links to PSI via the ASA without any type of NAT, and leave these routers from the private to the public NAT?

    -Jouni

  • Failover of ASA with VLAN

    Hey all, I'm sure one of you ran into this. Basically, we double asa5520 with LANs on a dedicated, g0/3 port-based failover configuration. There is a direct connection between the two cable.





    We need to move from the asa to another location, but at the same time, minimize downtime. one of the options is to move one of them (secondary/standby) to the new location and connect the failover interface dedicated to an access road to a VLAN dedicated. This vlan will be used temporarily for failover. in the meantime, he must cross a few switches where 802. 1 q tags are in place. Once the secondary/Eve is in place, we will then turn off primary/active. and directly connect the failover interface.





    We can't move the two as there is some time of transport between the location of the old and the new.





    Thank you very much!



    -robert

    Hi Robert,.

    This is the right way to do. Failover - VLANs on switches may extend.

    I got the following: asa5520 - cat6509 - fiber - cat6509 - asa5520

    It works very well!

    Best regards, Celio

  • The strength of uplinks not tag with VLAN

    I have a very strange config due to the servers being located in the same place. I have 2 of my server (s) uplinks an uplink is connected to a switch under my control. the first uplink is connected to my stwichand that the port is crimped tagging vlan. The second uplink is connected to the network from my ISP to a port without a label.

    I want my switch activates the NIC conencted and the card network connected to the ISP to be on standby. The problem is that I have to tag the traffic from my VM so when it switches to my ISP network port without tag removes all traffic. Conencted to my ISP port is for failover only.

    one solution is to create a second group of ports on a dedicated vswitch which has no tagging vlan and manually connect the VM to present portgroup failure.

    Ideally, I would like to make it automatic, is it possible to automate the above solution? or to force all traffic through a specific untagg traffic vmnic?

    Then, I enclose a diagram of what I understand from your network environment.  Please check if it is correct or not.  If this is the case, then you have an interesting situation that I think could be solved with comments e1000 NIC; shift of grouping; and perhaps of multiple itineraries, weighted by default.  All in the comments.

    The changes would have to occur in the comments, if the network it will access your ISP (0.0.z.0/24) is a different subnet subnets on your switch.

    Virtualization of happy!

    JP

    Please consider awarding points for correct or helpful answers.

Maybe you are looking for