<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA - Virtual Contexts - Cascade Setup in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-virtual-contexts-cascade-setup/m-p/3223682#M1064826</link>
    <description>&lt;P&gt;1. I believe you are missing some routing config&amp;nbsp; and I do not see the point of having NAT on the&amp;nbsp;&lt;SPAN&gt;INSIDE Firewall.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;DMZ Firewall:&lt;/P&gt;
&lt;P&gt;route dmz&amp;nbsp;192.168.16.0 255.255.255.0&amp;nbsp;172.23.0.254&lt;/P&gt;
&lt;P&gt;INSIDE Firewall:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;route outside&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;0.0.0.0 0.0.0.0&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;172.23.0.1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;no nat (inside,outside) dynamic interface&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. Should not be a problem having the VPN terminated on one context and then sending the traffic to a different context.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would avoid having my &lt;SPAN&gt;INSIDE Firewall&lt;/SPAN&gt;&amp;nbsp;in the same network as DMZ servers. I would set up a dedicated interface to the&amp;nbsp;&lt;SPAN&gt;INSIDE Firewall.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Also, for testing purposes you are better&amp;nbsp;off using a emulator like GNS3 instead of Packet Tracer, which is a simulator.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 28 Nov 2017 10:51:01 GMT</pubDate>
    <dc:creator>Bogdan Nita</dc:creator>
    <dc:date>2017-11-28T10:51:01Z</dc:date>
    <item>
      <title>Cisco ASA - Virtual Contexts - Cascade Setup</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-virtual-contexts-cascade-setup/m-p/3223454#M1064825</link>
      <description>&lt;P&gt;Hello, due to some certifications that I need to get for my current platform,&amp;nbsp;they request to setup a firewall&amp;nbsp;between&amp;nbsp;the DMZ and the&amp;nbsp;inside network. I recently installed brand new Cisco ASAs 5545-x (v9.7) with cluster licensing, so I was thinking&amp;nbsp;on setting up 2 contexts, one for each LAN on cascade mode. Of course I need to be able to reach the&amp;nbsp;INSIDE servers from the DMZ since all the Databases are on the inside&amp;nbsp;network (just specific ports)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I tried running a simulation of this architecture on the Cisco Packet Tracer (although you can only use a ASA 5505 with v8.4 but it should be the same but with some different commands) with the current setup: (image attached network_example.png)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1.&amp;nbsp;DMZ Firewall/Network:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;- outside interface connected to the simulated ISP (1.1.1.0)&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;- dmz interface&amp;nbsp;connected&amp;nbsp;to the DMZ network switch (172.23.0.0)&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;- dmz servers (with public address&amp;nbsp;nat from ISP to test their connection to the outside world)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;2.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;INSIDE Firewall/Network:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;- outside interface connected to the&amp;nbsp;&lt;SPAN&gt;DMZ network switch (172.23.0.254 - is this the correct way to set it up or it should go&amp;nbsp;directly&amp;nbsp;to another interface on the DMZ-Firewall ???)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;-&amp;nbsp;inside interface&amp;nbsp;connected&amp;nbsp;to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;the&amp;nbsp;INSIDE network switch (192.168.16.0)&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;- inside servers&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Questions/Problems:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;1.&amp;nbsp;I can reach the DMZ servers from the INSIDE network using NAT and access lists, but I haven't been able to reach the&amp;nbsp;INSIDE servers from the&amp;nbsp;DMZ network. I've tried using NAT, routing, access-lists but still haven't figure out how to reach them. Any clues on how should I proceed?&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;2.&amp;nbsp; I currently have 2 platforms (production/contingency) which are connected through a site-to-site VPN connection so the database servers can be synchronized periodically. Since the ISP connection is on the DMZ firewall, and the databases are on the INSIDE firewall, are the database servers from each platforms are going to be able to reach each other or should it be easier to get a dedicated connection between the 2 INSIDE Firewalls and set up the Site-to-Site VPN through this channel.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Firewall configs:&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;1. DMZ Firewall:&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;daycodmz#sh run&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;: Saved&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;:&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;ASA Version 8.4(2)&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;!&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;hostname daycodmz&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;names&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;!&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;interface Ethernet0/0&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;switchport access vlan 2&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;!&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;interface Ethernet0/1&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;&lt;SPAN&gt;switchport access vlan 1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;!&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;interface Vlan1&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;nameif dmz&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;security-level 50&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;ip address 172.23.0.1 255.255.255.0&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;!&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;interface Vlan2&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;nameif outside&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;security-level 0&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;ip address 1.1.1.2 255.255.255.0&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;!&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;object network LAN&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;subnet 172.23.0.0 255.255.255.0&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;object network core&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;host 172.23.0.2&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;object network web&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;host 172.23.0.4&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;!&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;route outside 0.0.0.0 0.0.0.0 1.1.1.1 1&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;!&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;access-list in_to_internet extended permit tcp any any&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;access-list in_to_internet extended permit icmp any any&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;access-list in_to_inside extended permit icmp any any&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;!&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;access-group in_to_internet in interface outside&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;access-group in_to_inside in interface dmz&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;object network LAN&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;nat (dmz,outside) dynamic interface&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;object network core&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;nat (dmz,outside) static 1.1.1.3&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;object network web&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;nat (dmz,outside) static 1.1.1.4&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. INSIDE Firewall:&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;daycoinside#sh run&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;: Saved&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;:&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;ASA Version 8.4(2)&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;!&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;hostname daycoinside&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;names&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;!&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;interface Ethernet0/0&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;switchport access vlan 2&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;!&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;interface Ethernet0/1&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;switchport access vlan 3&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;!&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;interface Vlan2&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;nameif outside&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;security-level 0&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;ip address 172.23.0.254 255.255.255.0&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;!&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;interface Vlan3&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;nameif inside&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;security-level 100&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;ip address 192.168.16.1 255.255.255.0&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;!&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;object network inside&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;subnet 192.168.16.0 255.255.255.0&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;!&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;access-list in_to_internet extended permit icmp any any&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;access-list in_to_internet extended permit tcp any any&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;!&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;access-group in_to_internet in interface outside&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;object network inside&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;nat (inside,outside) dynamic interface&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:50:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-virtual-contexts-cascade-setup/m-p/3223454#M1064825</guid>
      <dc:creator>fgfuentes</dc:creator>
      <dc:date>2020-02-21T14:50:23Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - Virtual Contexts - Cascade Setup</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-virtual-contexts-cascade-setup/m-p/3223682#M1064826</link>
      <description>&lt;P&gt;1. I believe you are missing some routing config&amp;nbsp; and I do not see the point of having NAT on the&amp;nbsp;&lt;SPAN&gt;INSIDE Firewall.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;DMZ Firewall:&lt;/P&gt;
&lt;P&gt;route dmz&amp;nbsp;192.168.16.0 255.255.255.0&amp;nbsp;172.23.0.254&lt;/P&gt;
&lt;P&gt;INSIDE Firewall:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;route outside&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;0.0.0.0 0.0.0.0&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;172.23.0.1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;no nat (inside,outside) dynamic interface&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. Should not be a problem having the VPN terminated on one context and then sending the traffic to a different context.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would avoid having my &lt;SPAN&gt;INSIDE Firewall&lt;/SPAN&gt;&amp;nbsp;in the same network as DMZ servers. I would set up a dedicated interface to the&amp;nbsp;&lt;SPAN&gt;INSIDE Firewall.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Also, for testing purposes you are better&amp;nbsp;off using a emulator like GNS3 instead of Packet Tracer, which is a simulator.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Nov 2017 10:51:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-virtual-contexts-cascade-setup/m-p/3223682#M1064826</guid>
      <dc:creator>Bogdan Nita</dc:creator>
      <dc:date>2017-11-28T10:51:01Z</dc:date>
    </item>
  </channel>
</rss>

