<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower 2110 - Secondary Outside interface port for 1 ISP router in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-2110-secondary-outside-interface-port-for-1-isp-router/m-p/4467197#M1083709</link>
    <description>&lt;P&gt;Okay, so If I'm correctly understand, ISP router is configured by ISP provider by adding static route.&lt;/P&gt;&lt;P&gt;For example) 12.678.9.1 x.x.x.x(subnet) via 12.345.6.1(my existing firewall outside)&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Therefore, I don't need to make physical connection between ISP router and my firewall, am I correct?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 15 Sep 2021 19:41:43 GMT</pubDate>
    <dc:creator>eeebbunee</dc:creator>
    <dc:date>2021-09-15T19:41:43Z</dc:date>
    <item>
      <title>Firepower 2110 - Secondary Outside interface port for 1 ISP router</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2110-secondary-outside-interface-port-for-1-isp-router/m-p/4467117#M1083698</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Public IP block from ISP gave is all occupied, so I requested extended IP block to ISP.&lt;/P&gt;&lt;P&gt;so I got new IP block with new port (same router), but I am not sure how can I make this new IP block to apply my firepower.&lt;/P&gt;&lt;P&gt;Here is the image what I am considering:&lt;/P&gt;&lt;P&gt;The blue line is about to newly add.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="1.PNG" style="width: 498px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/130983iAFC34496F2D1DA50/image-size/large?v=v2&amp;amp;px=999" role="button" title="1.PNG" alt="1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ISP provider gave me a notification that they are configured new IP block on 0/2 port. So I don't know If I can use same firepower. Is this possible without loop?&lt;/P&gt;&lt;P&gt;What else should I configure on my firepower to make it?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Sep 2021 17:08:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2110-secondary-outside-interface-port-for-1-isp-router/m-p/4467117#M1083698</guid>
      <dc:creator>eeebbunee</dc:creator>
      <dc:date>2021-09-15T17:08:01Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2110 - Secondary Outside interface port for 1 ISP router</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2110-secondary-outside-interface-port-for-1-isp-router/m-p/4467123#M1083699</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1110274"&gt;@eeebbunee&lt;/a&gt; you should get your ISP to route the new subnet to the outside IP address of your existing interface. You then just need to create NAT rules using an IP address from the new subnet.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Sep 2021 17:26:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2110-secondary-outside-interface-port-for-1-isp-router/m-p/4467123#M1083699</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-09-15T17:26:57Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2110 - Secondary Outside interface port for 1 ISP router</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2110-secondary-outside-interface-port-for-1-isp-router/m-p/4467160#M1083701</link>
      <description>&lt;P&gt;Is your goal to load balance or to set up a secondary route (in case of failure)?&lt;/P&gt;</description>
      <pubDate>Wed, 15 Sep 2021 18:33:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2110-secondary-outside-interface-port-for-1-isp-router/m-p/4467160#M1083701</guid>
      <dc:creator>MichaelMcCoy</dc:creator>
      <dc:date>2021-09-15T18:33:49Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2110 - Secondary Outside interface port for 1 ISP router</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2110-secondary-outside-interface-port-for-1-isp-router/m-p/4467164#M1083703</link>
      <description>&lt;P&gt;Thanks for the reply.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You mean the existing interface (Router 0/1 port) needs to have both IP blocks?&amp;nbsp;&lt;/P&gt;&lt;P&gt;New IP block has totally different IP address, so that's why ISP setup the other port.&lt;/P&gt;&lt;P&gt;Please correct me which part am I misunderstand.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Sep 2021 18:41:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2110-secondary-outside-interface-port-for-1-isp-router/m-p/4467164#M1083703</guid>
      <dc:creator>eeebbunee</dc:creator>
      <dc:date>2021-09-15T18:41:28Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2110 - Secondary Outside interface port for 1 ISP router</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2110-secondary-outside-interface-port-for-1-isp-router/m-p/4467169#M1083704</link>
      <description>&lt;P&gt;This is for secondary route, to using 1:1 NAT rule. Currently public IP addresses ran out.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Sep 2021 18:44:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2110-secondary-outside-interface-port-for-1-isp-router/m-p/4467169#M1083704</guid>
      <dc:creator>eeebbunee</dc:creator>
      <dc:date>2021-09-15T18:44:17Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2110 - Secondary Outside interface port for 1 ISP router</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2110-secondary-outside-interface-port-for-1-isp-router/m-p/4467170#M1083705</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1110274"&gt;@eeebbunee&lt;/a&gt; no I am saying on the router the ISP would create a static route for the new network with a next hop of the firewalls current outside interface IP address. You don't need to apply the new network on a physical interface. You then create static NAT rules on the firewall.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Sep 2021 18:47:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2110-secondary-outside-interface-port-for-1-isp-router/m-p/4467170#M1083705</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-09-15T18:47:32Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2110 - Secondary Outside interface port for 1 ISP router</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2110-secondary-outside-interface-port-for-1-isp-router/m-p/4467174#M1083706</link>
      <description>&lt;P&gt;Full disclosure, I am studying for my CCNA and trying to utilize these boards and questions to grow myself as a tech, so I just wanted to say that before I offer a suggestion.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;If I am not mistaken you should be able to issue the commands on your router that will allow for a backup default route:&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;ip route 0.0.0.0 0.0.0.0 gi0/1&amp;nbsp;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ip route 0.0.0.0 0.0.0.0 gi0/2 5&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;Issuing the "&lt;EM&gt;5&lt;/EM&gt;" at the end created a floating static route that will only be placed in the routing table and used in case the primary route "&lt;EM&gt;gi0/1&lt;/EM&gt;" is removed from the routing table.&lt;BR /&gt;&lt;BR /&gt;Sorry if I misunderstood your issue.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Sep 2021 18:53:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2110-secondary-outside-interface-port-for-1-isp-router/m-p/4467174#M1083706</guid>
      <dc:creator>MichaelMcCoy</dc:creator>
      <dc:date>2021-09-15T18:53:43Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2110 - Secondary Outside interface port for 1 ISP router</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2110-secondary-outside-interface-port-for-1-isp-router/m-p/4467180#M1083708</link>
      <description>&lt;P&gt;I appreciate that your considerable reply and the suggested solution.&lt;/P&gt;&lt;P&gt;I should've told you in detail, I was meant to one more active routing interface not for fail-over, in this case I am trying to make both interfaces as 'active' state.&amp;nbsp;&lt;/P&gt;&lt;P&gt;But, your reply was also helpful to me cause I didn't know that.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you very much,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Sep 2021 19:15:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2110-secondary-outside-interface-port-for-1-isp-router/m-p/4467180#M1083708</guid>
      <dc:creator>eeebbunee</dc:creator>
      <dc:date>2021-09-15T19:15:39Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2110 - Secondary Outside interface port for 1 ISP router</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2110-secondary-outside-interface-port-for-1-isp-router/m-p/4467197#M1083709</link>
      <description>&lt;P&gt;Okay, so If I'm correctly understand, ISP router is configured by ISP provider by adding static route.&lt;/P&gt;&lt;P&gt;For example) 12.678.9.1 x.x.x.x(subnet) via 12.345.6.1(my existing firewall outside)&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Therefore, I don't need to make physical connection between ISP router and my firewall, am I correct?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Sep 2021 19:41:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2110-secondary-outside-interface-port-for-1-isp-router/m-p/4467197#M1083709</guid>
      <dc:creator>eeebbunee</dc:creator>
      <dc:date>2021-09-15T19:41:43Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2110 - Secondary Outside interface port for 1 ISP router</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2110-secondary-outside-interface-port-for-1-isp-router/m-p/4467203#M1083711</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1110274"&gt;@eeebbunee&lt;/a&gt; correct. You then need to create static NAT rules with those new IP addresses.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Sep 2021 19:48:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2110-secondary-outside-interface-port-for-1-isp-router/m-p/4467203#M1083711</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-09-15T19:48:40Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2110 - Secondary Outside interface port for 1 ISP router</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2110-secondary-outside-interface-port-for-1-isp-router/m-p/4467798#M1083746</link>
      <description>&lt;P&gt;I was thinking about one more physical connection between firewall and ISP because ISP provider told me to do it (use another ports), but I will request them to change routing configuration followed your advise.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I really appreciate it..!!&lt;/P&gt;</description>
      <pubDate>Thu, 16 Sep 2021 15:39:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2110-secondary-outside-interface-port-for-1-isp-router/m-p/4467798#M1083746</guid>
      <dc:creator>eeebbunee</dc:creator>
      <dc:date>2021-09-16T15:39:31Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2110 - Secondary Outside interface port for 1 ISP router</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2110-secondary-outside-interface-port-for-1-isp-router/m-p/4468511#M1083776</link>
      <description>&lt;P&gt;Rob, My ISP is providing me two ranges ( totally different) and have added a static route on the Internet Router for the new range pointing to the FW outside interface having IP from the existing range.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;New range could be used to create NAT rules for traffic coming from the inside interface on the FW, correct.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Will I be able to create NAT rules for AnyconnectVPN users ( connecting via the existing interface IP) using the new range ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks very much in advance.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Sep 2021 14:11:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2110-secondary-outside-interface-port-for-1-isp-router/m-p/4468511#M1083776</guid>
      <dc:creator>ashwanik2008</dc:creator>
      <dc:date>2021-09-17T14:11:22Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2110 - Secondary Outside interface port for 1 ISP router</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2110-secondary-outside-interface-port-for-1-isp-router/m-p/4468519#M1083777</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1184829"&gt;@ashwanik2008&lt;/a&gt; Not sure I totally understand your question.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you want to NAT traffic from a VPN user using one of those new IP addresses, yes that would probably work - not tried it myself but something like this:-&lt;/P&gt;
&lt;PRE&gt;nat (outside,inside) source static RAVPN RAVPN-NATTED destination static LAN LAN&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Sep 2021 14:21:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2110-secondary-outside-interface-port-for-1-isp-router/m-p/4468519#M1083777</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-09-17T14:21:24Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2110 - Secondary Outside interface port for 1 ISP router</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2110-secondary-outside-interface-port-for-1-isp-router/m-p/4468523#M1083778</link>
      <description>&lt;P&gt;Thanks for quick reply, Rob.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I meant the internet bound traffic from AnyConnect VPN users, ( OUTSIDE, OUTSIDE) hair-pinned on the OUTSIDE interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;OUTSIDE interface has an IP from the existing range but requirement is to use new range for NAT statements for these remote users.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Sep 2021 14:27:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2110-secondary-outside-interface-port-for-1-isp-router/m-p/4468523#M1083778</guid>
      <dc:creator>ashwanik2008</dc:creator>
      <dc:date>2021-09-17T14:27:56Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2110 - Secondary Outside interface port for 1 ISP router</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2110-secondary-outside-interface-port-for-1-isp-router/m-p/4468526#M1083779</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1184829"&gt;@ashwanik2008&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Try this:-&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;object network RAVPN&lt;BR /&gt;&amp;nbsp;subnet &amp;lt;vpn ip pool network&amp;gt; &amp;lt;subnet mask&amp;gt;&lt;BR /&gt;&amp;nbsp;nat (outside,outside) dynamic &amp;lt;ip address from new range&amp;gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Sep 2021 14:34:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2110-secondary-outside-interface-port-for-1-isp-router/m-p/4468526#M1083779</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-09-17T14:34:29Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2110 - Secondary Outside interface port for 1 ISP router</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2110-secondary-outside-interface-port-for-1-isp-router/m-p/4468547#M1083780</link>
      <description>&lt;P&gt;Yes, that`s what I`m gonna try. Thanks Rob&lt;/P&gt;</description>
      <pubDate>Fri, 17 Sep 2021 14:57:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2110-secondary-outside-interface-port-for-1-isp-router/m-p/4468547#M1083780</guid>
      <dc:creator>ashwanik2008</dc:creator>
      <dc:date>2021-09-17T14:57:50Z</dc:date>
    </item>
  </channel>
</rss>

