<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Adding public block IPs to ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/adding-public-block-ips-to-asa/m-p/4406994#M1080968</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/313309"&gt;@Nazarevych&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Not much information regarding that message...but the message implies you've reached a limit!!&lt;/P&gt;
&lt;P&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/search?kw=(rm-conn-limit)%20RM%20connection%20limit%20reached&amp;amp;pf=prdNm&amp;amp;sb=anfr" target="_blank" rel="noopener"&gt;https://bst.cloudapps.cisco.com/bugsearch/search?kw=(rm-conn-limit)%20RM%20connection%20limit%20reached&amp;amp;pf=prdNm&amp;amp;sb=anfr&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you have many connected devices behind the ASA right now?&lt;/P&gt;
&lt;P&gt;How many current connections do you have? - use "show conn" command&lt;/P&gt;
&lt;P&gt;If you do, disconnect the inside interface, clear the connections and try again from the web-srv209 network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The error aside. There is no reason why this won't work when you have do have a license. All you are doing is routing from the 154.x.x.x network. You'll only need Dynamic PAT for the networks behind the inside interface.&lt;/P&gt;</description>
    <pubDate>Sat, 22 May 2021 11:03:14 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2021-05-22T11:03:14Z</dc:date>
    <item>
      <title>Adding public block IPs to ASA</title>
      <link>https://community.cisco.com/t5/network-security/adding-public-block-ips-to-asa/m-p/4406655#M1080939</link>
      <description>&lt;P&gt;Hi all, I've got some public IPs from our ISP 154.x.x.x/24. Also, I have one IP address 149.x.x.x/30 that binds me with ISP. 154.x.x.x/24 subnet should be used for web servers. I'm trying to implement this configuration in ASAv(9.15 version). My goal:&amp;nbsp;149.x.x.x/30 use as ASA Default Gateway,&amp;nbsp;154.x.x.x/24 use as separate subnets with traffic forwarding via&amp;nbsp;149.x.x.x/30. This scenario I've done it successfully on L3 switch, but with ASA have some troubles. After the configuring outside interface as 149.x.x.x/30 I'm able to go outside, my outside interface 149.x.x.x/30 is also visible from global, but neither IP of&amp;nbsp;154.x.x.x/24 available from "world". Is it possible to implement this scenario on ASA or not?&amp;nbsp;&lt;/P&gt;&lt;P&gt;P.S. My ASA is not licensed, but I should know before purchasing if it's possible to make&lt;/P&gt;</description>
      <pubDate>Fri, 21 May 2021 14:16:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-public-block-ips-to-asa/m-p/4406655#M1080939</guid>
      <dc:creator>Nazarevych</dc:creator>
      <dc:date>2021-05-21T14:16:52Z</dc:date>
    </item>
    <item>
      <title>Re: Adding public block IPs to ASA</title>
      <link>https://community.cisco.com/t5/network-security/adding-public-block-ips-to-asa/m-p/4406658#M1080940</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/313309"&gt;@Nazarevych&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You just need to create NAT objects in the 154.x.x.x/24 range and ensure the ISP routes this network to the outside interface IP 149.x.x.x/30 IP address of the ASA&amp;gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 May 2021 14:22:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-public-block-ips-to-asa/m-p/4406658#M1080940</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-05-21T14:22:19Z</dc:date>
    </item>
    <item>
      <title>Re: Adding public block IPs to ASA</title>
      <link>https://community.cisco.com/t5/network-security/adding-public-block-ips-to-asa/m-p/4406712#M1080946</link>
      <description>&lt;P&gt;Thank you for your answer, NAT is working successfully, but I want each web server from subnet 154.x.x.x/24 will be accessible from global, not as single ip&amp;nbsp;&lt;SPAN&gt;149.x.x.x/30.&amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;As on this scheme bellow:&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="asa1.png" style="width: 731px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/120946i79538719A9789638/image-size/large?v=v2&amp;amp;px=999" role="button" title="asa1.png" alt="asa1.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 May 2021 15:50:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-public-block-ips-to-asa/m-p/4406712#M1080946</guid>
      <dc:creator>Nazarevych</dc:creator>
      <dc:date>2021-05-21T15:50:36Z</dc:date>
    </item>
    <item>
      <title>Re: Adding public block IPs to ASA</title>
      <link>https://community.cisco.com/t5/network-security/adding-public-block-ips-to-asa/m-p/4406735#M1080950</link>
      <description>&lt;P&gt;You don't need to nat behind 149.x.x.x ip address.&lt;/P&gt;
&lt;P&gt;Have you assigned these 154.x.x.x to the physical interface of the webservers? In which case you don't need nat.&lt;/P&gt;
&lt;P&gt;Or do you have a static NAT for each? Translating a private IP address to a unique 154.x.x.x?&lt;/P&gt;
&lt;P&gt;Provide your configuration.&lt;/P&gt;</description>
      <pubDate>Fri, 21 May 2021 16:38:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-public-block-ips-to-asa/m-p/4406735#M1080950</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-05-21T16:38:18Z</dc:date>
    </item>
    <item>
      <title>Re: Adding public block IPs to ASA</title>
      <link>https://community.cisco.com/t5/network-security/adding-public-block-ips-to-asa/m-p/4406757#M1080951</link>
      <description>&lt;P&gt;ISP provides the routing from 149.x.x.x/30 to 154.x.x.x/24 and rent us one ip from subnet 149.x.x.x/30 and whole subnet 154.x.x.x/24. We should not use the NAT, just forward the traffic from 154.x.x.x/24 via 149.x.x.x/30(toward the ISPs network). Web servers should use the public IPs of subnet 154.x.x.x/24. Also, the clients should resolve web servers public IPs as well&lt;/P&gt;</description>
      <pubDate>Fri, 21 May 2021 17:08:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-public-block-ips-to-asa/m-p/4406757#M1080951</guid>
      <dc:creator>Nazarevych</dc:creator>
      <dc:date>2021-05-21T17:08:43Z</dc:date>
    </item>
    <item>
      <title>Re: Adding public block IPs to ASA</title>
      <link>https://community.cisco.com/t5/network-security/adding-public-block-ips-to-asa/m-p/4406771#M1080952</link>
      <description>&lt;P&gt;You still haven't confirmed whether the 154.x.x.x addresses are assigned to the webservers interfaces, if so then the traffic is just routed via the next hop. If they are not you will need to translate from the private ip address to the 154.x.x.x address using a one-to-one static nat.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Provide your configuration and we can see what is misconfigured.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Run packet-tracer from inside to outside to simulate the traffic flow, provide the output for review.&lt;/P&gt;</description>
      <pubDate>Fri, 21 May 2021 17:26:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-public-block-ips-to-asa/m-p/4406771#M1080952</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-05-21T17:26:49Z</dc:date>
    </item>
    <item>
      <title>Re: Adding public block IPs to ASA</title>
      <link>https://community.cisco.com/t5/network-security/adding-public-block-ips-to-asa/m-p/4406872#M1080960</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Yes, I've&amp;nbsp;assigned 154.x.x.x IPs to the physical interface of the webservers.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Traffic should forwards via the default gateway, agree with you, but probably something I've missed.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Here my ASA configuration:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;asav-fr# sh run&lt;BR /&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;BR /&gt;: Serial Number: AA57Bc92DD2&lt;BR /&gt;: Hardware: ASAv, 16384 MB RAM, CPU Xeon 4100/6100/8100 series 3200 MHz, 1 CPU (8 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.15(1)7&lt;BR /&gt;!&lt;BR /&gt;hostname asav-fr&lt;BR /&gt;enable password ***** pbkdf2&lt;BR /&gt;service-module 0 keepalive-timeout 4&lt;BR /&gt;service-module 0 keepalive-counter 6&lt;BR /&gt;!&lt;BR /&gt;license smart reservation&lt;BR /&gt;names&lt;BR /&gt;no mac-address auto&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;description Outside_interface contains&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0.3&lt;BR /&gt;description outside_interface&lt;BR /&gt;vlan 3&lt;BR /&gt;nameif outside_interface&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 149.x.x.2 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;description Contain Inside_interface&lt;BR /&gt;nameif inside_interface&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.0.0.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;description Interface contains Public pool web-server addresses&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2.209&lt;BR /&gt;description web-srv209&lt;BR /&gt;vlan 209&lt;BR /&gt;nameif web-srv209&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 154.x.x.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/6&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/7&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/8&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;no management-only&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 0&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network any-net&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;access-list outside_interface_access_in extended permit ip any any&lt;BR /&gt;access-list web-srv209_access_in extended permit ip any any&lt;BR /&gt;access-list web-srv209_access_out extended permit ip any any&lt;BR /&gt;pager lines 23&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside_interface 1500&lt;BR /&gt;mtu inside_interface 1500&lt;BR /&gt;mtu web-srv209 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;no failover wait-disable&lt;BR /&gt;no monitor-interface outside_interface&lt;BR /&gt;no monitor-interface web-srv209&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 32768&lt;BR /&gt;access-group outside_interface_access_in in interface outside_interface&lt;BR /&gt;access-group web-srv209_access_in in interface web-srv209&lt;BR /&gt;access-group web-srv209_access_out out interface web-srv209&lt;BR /&gt;!&lt;BR /&gt;route outside_interface 0.0.0.0 0.0.0.0 149.x.x.1 1&lt;BR /&gt;route inside_interface 10.0.0.0 255.255.255.0 10.0.0.2 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside_interface&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;sysopt noproxyarp web-srv209&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;no validation-usage&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;auto-import&lt;BR /&gt;crypto ca certificate chain _SmartCallHome_ServerCA&lt;BR /&gt;certificate ca 0509&lt;BR /&gt;308205b7 3082039f a0030201 02020205 09300d06 092a8648 86f70d01 01050500&lt;BR /&gt;3045310b 30090603 55040613 02424d31 19301706 0355040a 13105175 6f566164&lt;BR /&gt;6973204c 696d6974 6564311b 30190603 55040313 1251756f 56616469 7320526f&lt;BR /&gt;6f742043 41203230 1e170d30 36313132 34313832 3730305a 170d3331 31313234&lt;BR /&gt;31383233 33335a30 45310b30 09060355 04061302 424d3119 30170603 55040a13&lt;BR /&gt;1051756f 56616469 73204c69 6d697465 64311b30 19060355 04031312 51756f56&lt;BR /&gt;61646973 20526f6f 74204341 20323082 0222300d 06092a86 4886f70d 01010105&lt;BR /&gt;00038202 0f003082 020a0282 0201009a 18ca4b94 0d002daf 03298af0 0f81c8ae&lt;BR /&gt;4c19851d 089fab29 4485f32f 81ad321e 9046bfa3 86261a1e fe7e1c18 3a5c9c60&lt;BR /&gt;172a3a74 8333307d 615411cb edabe0e6 d2a27ef5 6b6f18b7 0a0b2dfd e93eef0a&lt;BR /&gt;c6b310e9 dcc24617 f85dfda4 daff9e49 5a9ce633 e62496f7 3fba5b2b 1c7a35c2&lt;BR /&gt;d667feab 66508b6d 28602bef d760c3c7 93bc8d36 91f37ff8 db1113c4 9c7776c1&lt;BR /&gt;aeb7026a 817aa945 83e205e6 b956c194 378f4871 6322ec17 6507958a 4bdf8fc6&lt;BR /&gt;5a0ae5b0 e35f5e6b 11ab0cf9 85eb44e9 f80473f2 e9fe5c98 8cf573af 6bb47ecd&lt;BR /&gt;d45c022b 4c39e1b2 95952d42 87d7d5b3 9043b76c 13f1dedd f6c4f889 3fd175f5&lt;BR /&gt;92c391d5 8a88d090 ecdc6dde 89c26571 968b0d03 fd9cbf5b 16ac92db eafe797c&lt;BR /&gt;adebaff7 16cbdbcd 252be51f fb9a9fe2 51cc3a53 0c48e60e bdc9b476 0652e611&lt;BR /&gt;13857263 0304e004 362b2019 02e874a7 1fb6c956 66f07525 dc67c10e 616088b3&lt;BR /&gt;3ed1a8fc a3da1db0 d1b12354 df44766d ed41d8c1 b222b653 1cdf351d dca1772a&lt;BR /&gt;31e42df5 e5e5dbc8 e0ffe580 d70b63a0 ff33a10f ba2c1515 ea97b3d2 a2b5bef2&lt;BR /&gt;8c961e1a 8f1d6ca4 6137b986 7333d797 969e237d 82a44c81 e2a1d1ba 675f9507&lt;BR /&gt;a32711ee 16107bbc 454a4cb2 04d2abef d5fd0c51 ce506a08 31f991da 0c8f645c&lt;BR /&gt;03c33a8b 203f6e8d 673d3ad6 fe7d5b88 c95efbcc 61dc8b33 77d34432 35096204&lt;BR /&gt;921610d8 9e2747fb 3b21e3f8 eb1d5b02 03010001 a381b030 81ad300f 0603551d&lt;BR /&gt;130101ff 04053003 0101ff30 0b060355 1d0f0404 03020106 301d0603 551d0e04&lt;BR /&gt;1604141a 8462bc48 4c332504 d4eed0f6 03c41946 d1946b30 6e060355 1d230467&lt;BR /&gt;30658014 1a8462bc 484c3325 04d4eed0 f603c419 46d1946b a149a447 3045310b&lt;BR /&gt;30090603 55040613 02424d31 19301706 0355040a 13105175 6f566164 6973204c&lt;BR /&gt;696d6974 6564311b 30190603 55040313 1251756f 56616469 7320526f 6f742043&lt;BR /&gt;41203282 02050930 0d06092a 864886f7 0d010105 05000382 0201003e 0a164d9f&lt;BR /&gt;065ba8ae 715d2f05 2f67e613 4583c436 f6f3c026 0c0db547 645df8b4 72c946a5&lt;BR /&gt;03182755 89787d76 ea963480 1720dce7 83f88dfc 07b8da5f 4d2e67b2 84fdd944&lt;BR /&gt;fc775081 e67cb4c9 0d0b7253 f8760707 4147960c fbe08226 93558cfe 221f6065&lt;BR /&gt;7c5fe726 b3f73290 9850d437 7155f692 2178f795 79faf82d 26876656 3077a637&lt;BR /&gt;78335210 58ae3f61 8ef26ab1 ef187e4a 5963ca8d a256d5a7 2fbc561f cf39c1e2&lt;BR /&gt;fb0aa815 2c7d4d7a 63c66c97 443cd26f c34a170a f890d257 a21951a5 2d9741da&lt;BR /&gt;074fa950 da908d94 46e13ef0 94fd1000 38f53be8 40e1b46e 561a20cc 6f588ded&lt;BR /&gt;2e458fd6 e9933fe7 b12cdf3a d6228cdc 84bb226f d0f8e4c6 39e90488 3cc3baeb&lt;BR /&gt;557a6d80 9924f56c 01fbf897 b0945beb fdd26ff1 77680d35 6423acb8 55a103d1&lt;BR /&gt;4d4219dc f8755956 a3f9a849 79f8af0e b911a07c b76aed34 d0b62662 381a870c&lt;BR /&gt;f8e8fd2e d3907f07 912a1dd6 7e5c8583 99b03808 3fe95ef9 3507e4c9 626e577f&lt;BR /&gt;a75095f7 bac89be6 8ea201c5 d666bf79 61f33c1c e1b9825c 5da0c3e9 d848bd19&lt;BR /&gt;a2111419 6eb2861b 683e4837 1a88b75d 965e9cc7 ef276208 e291195c d2f121dd&lt;BR /&gt;ba174282 97718153 31a99ff6 7d62bf72 e1a3931d cc8a265a 0938d0ce d70d8016&lt;BR /&gt;b478a53a 874c8d8a a5d54697 f22c10b9 bc5422c0 01506943 9ef4b2ef 6df8ecda&lt;BR /&gt;f1e3b1ef df918f54 2a0b25c1 2619c452 100565d5 8210eac2 31cd2e&lt;BR /&gt;quit&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group14-sha1&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside_interface&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access web-srv209&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username cisco password ***** pbkdf2 privilege 15&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect snmp&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_2&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;no active&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination address email callhome@cisco.com&lt;BR /&gt;destination transport-method http&lt;BR /&gt;subscribe-to-alert-group diagnostic&lt;BR /&gt;subscribe-to-alert-group environment&lt;BR /&gt;subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;profile License&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination transport-method http&lt;BR /&gt;Cryptochecksum:e9aaf1f07e9615b4e5eueihed637e6e&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;remark:&lt;/P&gt;&lt;P&gt;inside_interface 10.0.0.1 is directed to the L3 switch (10.0.0.2) and I'm using it just to get access to SSH/HTTP&lt;/P&gt;&lt;P&gt;Also, all VLANs configured at this L3 switch as well, internal routing is working too well.&lt;/P&gt;</description>
      <pubDate>Fri, 21 May 2021 21:06:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-public-block-ips-to-asa/m-p/4406872#M1080960</guid>
      <dc:creator>Nazarevych</dc:creator>
      <dc:date>2021-05-21T21:06:37Z</dc:date>
    </item>
    <item>
      <title>Re: Adding public block IPs to ASA</title>
      <link>https://community.cisco.com/t5/network-security/adding-public-block-ips-to-asa/m-p/4406879#M1080961</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/313309"&gt;@Nazarevych&lt;/a&gt; the only thing that stands out is the security level, try changing the security-level of Gi0/2.209 from 0 to 50. 0 is the lowest trusted and usually only the outside interface is set to 0.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;interface GigabitEthernet0/2.209&lt;BR /&gt;description web-srv209&lt;BR /&gt;vlan 209&lt;BR /&gt;nameif web-srv209&lt;BR /&gt;&lt;STRONG&gt;security-level 50&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;If you still have a problem run packet-tracer, e.g. &lt;STRONG&gt;packet-tracer input web-srv209 tcp 154.x.x.5 3000 8.8.8.8 80&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Don't use the FW IP .1 as the source, provide the output for review.&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 May 2021 21:17:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-public-block-ips-to-asa/m-p/4406879#M1080961</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-05-21T21:17:38Z</dc:date>
    </item>
    <item>
      <title>Re: Adding public block IPs to ASA</title>
      <link>https://community.cisco.com/t5/network-security/adding-public-block-ips-to-asa/m-p/4406992#M1080967</link>
      <description>&lt;P&gt;Thank you for advice,&lt;/P&gt;&lt;P&gt;I've changed the security-level of web-srv209 interface, but unfornutely results still the same. Here my outup:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;asav-fr# packet-tracer input web-srv209 tcp 154.x.x.162 3000 8.8.8.8 80

Phase: 1
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list

Phase: 2
Type: INPUT-ROUTE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
Found next-hop 149.x.x.1 using egress ifc outside_interface

Phase: 3
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group web-srv209_access_in in interface web-srv209
access-list web-srv209_access_in extended permit ip any any
Additional Information:

Phase: 4
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:

Phase: 5
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:

Result:
input-interface: web-srv209
input-status: up
input-line-status: up
output-interface: outside_interface
output-status: up
output-line-status: up
Action: drop
Drop-reason: (rm-conn-limit) RM connection limit reached, Drop-location: frame 0x000055b0dd67e9a3 flow (NA)/NA&lt;/PRE&gt;&lt;P&gt;Is the drop-reason mean my 100 kbit/s ASA free license limitation restricts this act?&lt;/P&gt;</description>
      <pubDate>Sat, 22 May 2021 10:27:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-public-block-ips-to-asa/m-p/4406992#M1080967</guid>
      <dc:creator>Nazarevych</dc:creator>
      <dc:date>2021-05-22T10:27:53Z</dc:date>
    </item>
    <item>
      <title>Re: Adding public block IPs to ASA</title>
      <link>https://community.cisco.com/t5/network-security/adding-public-block-ips-to-asa/m-p/4406994#M1080968</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/313309"&gt;@Nazarevych&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Not much information regarding that message...but the message implies you've reached a limit!!&lt;/P&gt;
&lt;P&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/search?kw=(rm-conn-limit)%20RM%20connection%20limit%20reached&amp;amp;pf=prdNm&amp;amp;sb=anfr" target="_blank" rel="noopener"&gt;https://bst.cloudapps.cisco.com/bugsearch/search?kw=(rm-conn-limit)%20RM%20connection%20limit%20reached&amp;amp;pf=prdNm&amp;amp;sb=anfr&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you have many connected devices behind the ASA right now?&lt;/P&gt;
&lt;P&gt;How many current connections do you have? - use "show conn" command&lt;/P&gt;
&lt;P&gt;If you do, disconnect the inside interface, clear the connections and try again from the web-srv209 network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The error aside. There is no reason why this won't work when you have do have a license. All you are doing is routing from the 154.x.x.x network. You'll only need Dynamic PAT for the networks behind the inside interface.&lt;/P&gt;</description>
      <pubDate>Sat, 22 May 2021 11:03:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-public-block-ips-to-asa/m-p/4406994#M1080968</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-05-22T11:03:14Z</dc:date>
    </item>
    <item>
      <title>Re: Adding public block IPs to ASA</title>
      <link>https://community.cisco.com/t5/network-security/adding-public-block-ips-to-asa/m-p/4407031#M1080973</link>
      <description>&lt;P&gt;For a test, I run just one Linux-based VM that connected to 154.x.x.x network, and only this one located behind ASA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Every time I have approximately 100 connections even my inside interface in a shutdown state and also after the &lt;STRONG&gt;'clear conn'&lt;/STRONG&gt; command completed. Regardless my web-srv209 interface is shutdown or no shutdown or with a narrower mask (/30 for instance) I see these connections:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;TCP outside_interface  154.x.x.143:19912 outside_interface  91.x.x.x:43909, idle 0:00:11, bytes 0, flags SaAB 
TCP outside_interface  154.x.x.143:20170 outside_interface  193.x.x.x:41471, idle 0:00:12, bytes 0, flags SaAB 
TCP outside_interface  154.x.x.210:8883 outside_interface  184.x.x.x:60839, idle 0:00:10, bytes 0, flags SaAB &lt;BR /&gt;.&lt;BR /&gt;.&lt;BR /&gt;.&lt;/PRE&gt;&lt;P&gt;the public IPs I see geographically&amp;nbsp;distributed around the world, but the destination network definitely mine (154.x.x.x/24)&lt;/P&gt;</description>
      <pubDate>Mon, 24 May 2021 14:38:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-public-block-ips-to-asa/m-p/4407031#M1080973</guid>
      <dc:creator>Nazarevych</dc:creator>
      <dc:date>2021-05-24T14:38:26Z</dc:date>
    </item>
    <item>
      <title>Re: Adding public block IPs to ASA</title>
      <link>https://community.cisco.com/t5/network-security/adding-public-block-ips-to-asa/m-p/4407704#M1081013</link>
      <description>&lt;P&gt;Thank you for your advice on the number of connections. After made restricting the amount of them directed inside in my network via&amp;nbsp;outside_interface the routing has been working correctly&lt;/P&gt;</description>
      <pubDate>Mon, 24 May 2021 14:36:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-public-block-ips-to-asa/m-p/4407704#M1081013</guid>
      <dc:creator>Nazarevych</dc:creator>
      <dc:date>2021-05-24T14:36:39Z</dc:date>
    </item>
  </channel>
</rss>

