<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Adding addition IP Block to PIX 520 in Routing and SD-WAN</title>
    <link>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736253#M169466</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;John&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It depends. If the traffic is always from the internal server to outside the pix then you don't need top update the acl on the pix (that is assuming you don't have an acl on the inside pix interface). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If traffic is initiated from the outside of the pix to the internal server then yes you would need to update the outside acl of the pix (assuming you have one). Obviously in the acl you would use the 73.x.x.x address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One final point. If you use ping from the internal server to test connectivity then you would temporarily need to add a line to your outside acl on the pix. This is because ping is not stateful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 08 Aug 2011 18:51:41 GMT</pubDate>
    <dc:creator>Jon Marshall</dc:creator>
    <dc:date>2011-08-08T18:51:41Z</dc:date>
    <item>
      <title>Adding addition IP Block to PIX 520</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736210#M169423</link>
      <description>&lt;P&gt;Hello Community,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am having a hard time adding a new IP block to my PIX 520.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are my specs:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="1" cellpadding="2"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD align="right"&gt;&lt;SPAN style="font-family: Arial,Helvetica;"&gt;Hostname&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD align="left"&gt;&lt;SPAN style="font-family: Arial,Helvetica;"&gt;AGNIPIX520 &lt;/SPAN&gt;&lt;/TD&gt;&lt;TD align="right"&gt;&lt;SPAN style="font-family: Arial,Helvetica;"&gt;Device&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD align="left"&gt;&lt;SPAN style="font-family: Arial,Helvetica;"&gt;PIX 520 &lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD align="right"&gt;&lt;SPAN style="font-family: Arial,Helvetica;"&gt;PDM Version&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD align="left"&gt;&lt;SPAN style="font-family: Arial,Helvetica;"&gt;3.0(4) &lt;/SPAN&gt;&lt;/TD&gt;&lt;TD align="right"&gt;&lt;SPAN style="font-family: Arial,Helvetica;"&gt;PIX Version &lt;/SPAN&gt;&lt;/TD&gt;&lt;TD align="left"&gt;&lt;SPAN style="font-family: Arial,Helvetica;"&gt;6.3(5) &lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD align="right"&gt;&lt;SPAN style="font-family: Arial,Helvetica;"&gt;User&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD align="left"&gt;&lt;SPAN style="font-family: Arial,Helvetica;"&gt;root &lt;/SPAN&gt;&lt;/TD&gt;&lt;TD align="right"&gt;&lt;SPAN style="font-family: Arial,Helvetica;"&gt;Privilege Level&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD align="left"&gt;&lt;SPAN style="font-family: Arial,Helvetica;"&gt;15 &lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD align="right"&gt;&lt;SPAN style="font-family: Arial,Helvetica;"&gt;JavaScript&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD align="left"&gt;&lt;SPAN style="font-family: Arial,Helvetica;"&gt;Enabled&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD align="right"&gt;&lt;SPAN style="font-family: Arial,Helvetica;"&gt;Java&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD align="left"&gt;&lt;SPAN style="font-family: Arial,Helvetica;"&gt;Enabled&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD align="right"&gt;&lt;SPAN style="font-family: Arial,Helvetica;"&gt;Browser&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD align="left"&gt;&lt;SPAN style="font-family: Arial,Helvetica;"&gt;Internet Explorer 8.0 &lt;/SPAN&gt;&lt;/TD&gt;&lt;TD align="right"&gt;&lt;SPAN style="font-family: Arial,Helvetica;"&gt;JDK Version&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD align="left"&gt;&lt;SPAN style="font-family: Arial,Helvetica;"&gt;1.5.0_05 &lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD align="right"&gt;&lt;SPAN style="font-family: Arial,Helvetica;"&gt;OS&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD align="left" colspan="3"&gt;&lt;SPAN style="font-family: Arial,Helvetica;"&gt;Windows XP 5.1 &lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an existing external IP block on eth1 which is working fine. I have another eth3 card which I want to use for my additional IP range.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So my ISP gave me a new /27 block is addition to what I have now. This block is supposily active and nothing is needed to configure on the ISP router, it is said that it is autmatically available and ready to use once I configure my PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using the PIX GUI and running into an error while trying to create a NAT pool "Start and end addresses overlap with existing range"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have done the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. I have filled in the eth3 IP address info: &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; a. enabled: YES&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; b. name: NewBlock&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; c. security level: 30&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; d. ip address: 173.xxx.xx.65&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; e. subnet mask: 255.255.255.224&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; f. hardware: ethernet3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. physically plugged an ethernet cable in the ethernet3 port then to a laptop who has an ip address of 173.xxx.xx.66, mask: 255.255.255.224 (just as a test laptop to see if I can get the internet)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. Used the GUI and clicked the "host/networks" tab and selectted the interface "NewBlock".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4. Edited the NewBlock-pool, clicked the "NAT" tab, clicked "Manage Pools".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5. Tried to add a pool to "NewBlock" using range 173.xxx.xx.66 - 173.xxx.xx.91&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6. Receive error stating that "Start and end addresses overlap with existing range", my other range is nothing like this new range. This is the actual command that the PIX does not like:&amp;nbsp; global (NewBlock) 1 173.xxx.xx.67-173.xxx.xx.91&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have searched all throughout my PIX and cannot find any conflicting IP addresses anywhere. I have no idea what I am doing wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have posted some screen shots. Please let me know if you need me to post any other screen shot&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Mon, 04 Mar 2019 21:10:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736210#M169423</guid>
      <dc:creator>imanco671</dc:creator>
      <dc:date>2019-03-04T21:10:11Z</dc:date>
    </item>
    <item>
      <title>Re: Adding addition IP Block to PIX 520</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736211#M169424</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;John&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apologies but i only ever use the CLI. Is there any reason you cannot post the running-config ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also be aware that unless you need to you do not have to use another interface for the new block. It does depend on what you are using this new block for but if you just want it for static translations you can use them with actually assigning an IP from this block to a new interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Aug 2011 14:01:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736211#M169424</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2011-08-03T14:01:25Z</dc:date>
    </item>
    <item>
      <title>Adding addition IP Block to PIX 520</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736212#M169425</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;John&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do you want to use the new network range for ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Aug 2011 18:01:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736212#M169425</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2011-08-03T18:01:44Z</dc:date>
    </item>
    <item>
      <title>Adding addition IP Block to PIX 520</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736213#M169426</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I used up my first block of IP addresses and my ISP gave us another block to use.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We now have 2 different blocks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Aug 2011 20:18:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736213#M169426</guid>
      <dc:creator>imanco671</dc:creator>
      <dc:date>2011-08-03T20:18:26Z</dc:date>
    </item>
    <item>
      <title>Adding addition IP Block to PIX 520</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736214#M169427</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is my logic about adding this IP bloc (which means nothing at all)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The IP block is active according to my ISP on our ISP router. So its being served.&lt;/P&gt;&lt;P&gt;I defined an IP address to a free NIC on my PIX with the starting IP address of my new block.&lt;/P&gt;&lt;P&gt;I then need to define a NAT pool which covers my full range.&lt;/P&gt;&lt;P&gt;I then need to create a group which defines each IP address.&lt;/P&gt;&lt;P&gt;Then there needs to be an access rule created. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After all this, then the PIX will allow me to use each IP address through ethernet3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am I way off? (probably)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Aug 2011 20:22:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736214#M169427</guid>
      <dc:creator>imanco671</dc:creator>
      <dc:date>2011-08-03T20:22:50Z</dc:date>
    </item>
    <item>
      <title>Adding addition IP Block to PIX 520</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736215#M169428</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okay, then you don't need a separate interface. Your ISP should be routing the new block of IPs to the existing outside interface (eth0). So to use them you can simply setup statics eg. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inside server = 192.168.5.1 &lt;/P&gt;&lt;P&gt;new ip = 173.22.10.10 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 173.22.10.10 192.168.5.1 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then from the internet you connect to 173.22.10.10. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, you seem to have used public IP addressing on your inside interface. Does this mean with the old block you have actually assigned public IPs to hosts on the inside ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Aug 2011 20:24:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736215#M169428</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2011-08-03T20:24:05Z</dc:date>
    </item>
    <item>
      <title>Adding addition IP Block to PIX 520</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736216#M169429</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;John&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See my other post. Just to add. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Generally speaking you don't assign public IPs to inside hosts, you simply use private IPs then use NATs on the firewall as described in my previous post. You don't seem to have done this though. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also it's still not clear what you are trying to use these addresses for ie. to NAT internal devices as they go out to the internet or to present internal devices so people can connect to them from the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Aug 2011 20:28:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736216#M169429</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2011-08-03T20:28:06Z</dc:date>
    </item>
    <item>
      <title>Adding addition IP Block to PIX 520</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736217#M169430</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, I have figured out some more to help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I executed the command: no global (NewBlock) 1 173.xxx.xx.66-173.xxx.xx0.91&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then I created the pool in the GUI and it showed. But once I specify an ip address of a host, the pool disappears.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do see these lines and I am tempted to add one for NewBlock, but I dont want to screw things up.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (inside) 1 69.xx.xxx.130-69.xx.xxx.190&lt;/P&gt;&lt;P&gt;global (NewBlock) 1 173.xxx.xx.66-173.xxx.xx.91&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_outbound_nat0_acl &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What would happen if I add this command: nat (NewBlock) 0 access-list inside_outbound_nat0_acl&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Aug 2011 20:45:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736217#M169430</guid>
      <dc:creator>imanco671</dc:creator>
      <dc:date>2011-08-03T20:45:30Z</dc:date>
    </item>
    <item>
      <title>Adding addition IP Block to PIX 520</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736218#M169431</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In my environment, the PIX goes to 2 different firewalls. That is why the inside has external IP addresses. &lt;/P&gt;&lt;P&gt;This is something I will have to configure later once I can get my test laptop to work, which proves that the new block is actually working. Then I will be able to start tackling the transfer to my other routers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;John.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Aug 2011 20:50:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736218#M169431</guid>
      <dc:creator>imanco671</dc:creator>
      <dc:date>2011-08-03T20:50:43Z</dc:date>
    </item>
    <item>
      <title>Re: Adding addition IP Block to PIX 520</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736219#M169432</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="min-height: 8pt; height: 8pt;"&gt;John&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;What would happen if I add this command: nat (NewBlock) 0 access-list inside_outbound_nat0_acl&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Depends what was in the access-list ? If it was the new block then it would simply not NAT them ie. they would go out as they are. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It really depends what you want to use these IPs for because even though i keep asking you haven't actually said &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) to assign to actual host &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) to use as a dynamic NAT pool for clients&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) to use as static NATs to present internal servers as public IPs to the internet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Aug 2011 21:06:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736219#M169432</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2011-08-03T21:06:06Z</dc:date>
    </item>
    <item>
      <title>Adding addition IP Block to PIX 520</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736220#M169433</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think I was posting too fast and too many at the same time. Sorrry about that. I saw all your posts....thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using these Ip addresses for application servers. There is a PIX on the exterior and then 2 different firewalls from my DMZ switch. Each one of these firewalls "feeds" its own subnet of servers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So on the PIX it takes a WAN address and just passes it to the DMZ switch where each of the 2 firewalls are able to use them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Does this mean with the old block you have actually assigned public IPs to hosts on the inside ?"&lt;/P&gt;&lt;P&gt;yes, the entire range is being used by app servers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Should I delete that ethernet3 and try to add a range to my ethernet1 (inside)?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Aug 2011 21:16:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736220#M169433</guid>
      <dc:creator>imanco671</dc:creator>
      <dc:date>2011-08-03T21:16:35Z</dc:date>
    </item>
    <item>
      <title>Adding addition IP Block to PIX 520</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736221#M169434</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;John &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You don't need to add anything to an interface. If this is for presenting servers simply do this - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (&lt;INTERFACE where="" app="" server="" is=""&gt;, outside) &lt;PUBLIC ip="" from="" new="" block=""&gt; &lt;APP server="" real="" ip=""&gt; netmask 255.255.255.255&lt;/APP&gt;&lt;/PUBLIC&gt;&lt;/INTERFACE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then you should be able to just connect to the public IP (obviously you would need to update any acl on the outside interface). Where i am a bit unclear is whether you want to present these to the outside interface or eth1. I'm assuing the ISP is connected via eth0 and this is where they will route the new block to ie. your outside interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if you want to present your apps servers to the outside with the new IPs the above should work. If not could you please clarify further ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Aug 2011 21:22:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736221#M169434</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2011-08-03T21:22:58Z</dc:date>
    </item>
    <item>
      <title>Adding addition IP Block to PIX 520</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736222#M169435</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have my test laptop connected directly to the DMZ switch. I have my laptop manually configured with 173.xxx.xx.65&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just purely testing purposes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Should I issue the command: static (inside,outside) 173.xxx.xx.65 173.xxx.xx.65 netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;( About to head on the road, I will be back tomorrow, Thanks a ton for all the valuable info!!)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Aug 2011 21:44:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736222#M169435</guid>
      <dc:creator>imanco671</dc:creator>
      <dc:date>2011-08-03T21:44:17Z</dc:date>
    </item>
    <item>
      <title>Adding addition IP Block to PIX 520</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736223#M169436</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;John&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, if you want to access the laptop from outside or you want the laptop to send traffic to the outsie with that address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Aug 2011 21:47:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736223#M169436</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2011-08-03T21:47:25Z</dc:date>
    </item>
    <item>
      <title>Adding addition IP Block to PIX 520</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736224#M169437</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, I want to just setup the laptop to access the outside. Not the outside accessing the laptop. I only have the laptop for testing to make sure everything with the new block and the PIX are configured properly. Once I am able to verify that the laptop is properly configured with an ip address of the new block, then I will move to configuring my 2 other internal firewalls (which will be a pain)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I am unable to access the internet from my laptop which is statically set using an IP from the new block.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have issued the command you told me: &lt;/P&gt;&lt;P&gt;static (inside,outside) 173.xxx.xx.65 173.xxx.xx.65 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have also created a access rule stating outside to 173.xxx.xx.65 allow ANY. So I allowed full traffic for the 65 address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what I have set the laptop NIC using:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IP address: 173.xxx.xx.65&lt;/P&gt;&lt;P&gt;Subnet: 255.255.255.0&lt;/P&gt;&lt;P&gt;gateway: 69.xx.xxx.129&amp;nbsp; (this is the inside NIC of my PIX)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no DNS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I have tried to access a webmail server: &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://69.xx.xxx.155"&gt;https://69.xx.xxx.155&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No success.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are so close, I can smell it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*********************&amp;nbsp; I am copying all the record for the 173.xx.xxx.0 from my running config ********&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;name 173.xxx.xx.64 newblock-pool &lt;/P&gt;&lt;P&gt;ip address NewBlock 173.xxx.xx.65 255.255.255.224 &lt;/P&gt;&lt;P&gt;pdm location 173.xxx.xx.65 255.255.255.255 inside &lt;/P&gt;&lt;P&gt;global (inside) 2 newblock-pool-173.xxx.xx.91 &lt;/P&gt;&lt;P&gt;static (inside,outside) 173.xxx.xx.65 173.xxx.xx.65 netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;conduit permit tcp host 173.xxx.xx.65 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Aug 2011 13:28:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736224#M169437</guid>
      <dc:creator>imanco671</dc:creator>
      <dc:date>2011-08-04T13:28:35Z</dc:date>
    </item>
    <item>
      <title>Adding addition IP Block to PIX 520</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736225#M169438</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;John&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Okay the problem is that you cannot have a default-gateway that is not from the same subnet.&amp;nbsp; This is why private addressing is generally used ie. you would not have run out of private IPs as quickly on the inside interface so you would simply have been able to use another private IP with the correc default-gateway and then used one of your new IPs. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But i am still confused. What would be the address of an app server you wanted to NAT for with the new IPs ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Aug 2011 13:34:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736225#M169438</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2011-08-04T13:34:54Z</dc:date>
    </item>
    <item>
      <title>Adding addition IP Block to PIX 520</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736226#M169439</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sorry things are a little confusing on my end. We have a bunch of apps that run on the same port. We issue a different WAN address for each application for our clients. So there is no WAN IP address sharing allowed. Each server has its own internal address too. The PIX does not do the "proper" NATing of WAN to internal. The "proper" NATing is done on the 2 other firewalls which are behind the PIX. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our PIX is our exterior firewall who is just redundant to the firewalls behind it. It is just for extra security. So starting with the PIX, each WAN address is passed through it and is picked up by either firewall behind it. So a WAN address is passed and NATed to itself and added to and acl which could be part of a group or a single entry. Basically passing a WAN address to a WAN address to be picked up by something on the DMZ switch or the 2 other firewalls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; There is also a DMZ switch in between the PIX and the 2 firewalls. On the DMZ switch, the PIX is plugged in, 2 other firewalls, 2 DNS servers and my laptop for testing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;( Its a network that was already configured before I joined this company) If you have suggestions, I am definately listening. I am able to change anything that makes sense. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Aug 2011 13:59:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736226#M169439</guid>
      <dc:creator>imanco671</dc:creator>
      <dc:date>2011-08-04T13:59:47Z</dc:date>
    </item>
    <item>
      <title>Re: Adding addition IP Block to PIX 520</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736227#M169440</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;John&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Think i'd be a bit scared to make suggestions &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seriously though there does seem to be too much public addressing assigned to interfaces. Without seeing the full topology and configs it would be very difficult to suggest changes but it does, on first appearances seem to be more complicated than it needs to be.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So this is my understanding so far which my well be incorrect. You want to present to your WAN ie. on the outside of your pix one of the new IP addresses. You then want to simply pass this connection through to your internal firewalls where it will get correctly natted to real app server IP ? Is this correct. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If so you need to add a route on your outside pix for the new block pointing to the next-hop ie. one of your internal firewalls. Use the static i provided and then on the internal firewall NAT it to the real address. To test you will have to be on the app server subnet with your laptop using an IP from that subnet. If that subnet is also using public IPs and you have run out then i'm not sure how you are going to test to be honest. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I understand you didn't set this up and it's always difficult to say something is wrong. There may be a reason why the interconnect between your pix and the other firewalls are using public IPs. But i have to say this seems to me to be a waste of public IPs and unnecessarily complex. But to redesign may well create a whole new set of problems especially if things are referencing public IPs from the interconnect subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Aug 2011 14:11:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736227#M169440</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2011-08-04T14:11:02Z</dc:date>
    </item>
    <item>
      <title>Adding addition IP Block to PIX 520</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736228#M169441</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV&gt;&lt;P&gt;Hi Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, you are correct. PIX just passes the connection, then the interior firewalls do all the "proper" NATing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The 2 interior firewalls are WatchGuards. (so we can reference them that way)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So&amp;nbsp; you dont want me to test using the laptop? I was thinking it would be&amp;nbsp; easier to get PIX verified (passing the IP) first, then verify the&amp;nbsp; WatchGuards next. But if you want me to put the laptop behined the&amp;nbsp; WatchGuards, then no problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The laptop did not work even after I have reassigned the NIC using:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ip address: 173.xxx.xx.65&lt;/P&gt;&lt;P&gt;subnet: 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I still could not get anywhere and test. Maybe I am not testing the proper way (since I am using a browser).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Aug 2011 14:26:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736228#M169441</guid>
      <dc:creator>imanco671</dc:creator>
      <dc:date>2011-08-04T14:26:42Z</dc:date>
    </item>
    <item>
      <title>Adding addition IP Block to PIX 520</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736229#M169442</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;John&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, because of the way your network is setup you will have to test from the app server subnet ie. behind the watchguards. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Don't forget to add the route to the pix for the new block that points to the WatchGuard(s). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Aug 2011 14:34:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/adding-addition-ip-block-to-pix-520/m-p/1736229#M169442</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2011-08-04T14:34:23Z</dc:date>
    </item>
  </channel>
</rss>

