<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower 2140 additional external IP range in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-2140-additional-external-ip-range/m-p/4799806#M1098929</link>
    <description>&lt;P&gt;The routing part is good as long as the ISP is Routed to your network.&lt;/P&gt;
&lt;P&gt;What you like to use for a new Subnet, it's purely your requirement, You can use a Pool of IP in Dynamic NAT or Static NAT for incoming traffic and so on.&lt;/P&gt;
&lt;P&gt;You don't need any Interface to configure, you can make utilization of new subnets as Objects or object groups for your usage intention.&lt;/P&gt;
&lt;P&gt;below configuration guide for reference :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-management-center/212702-configure-and-verify-nat-on-ftd.html#anc12" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/firepower-management-center/212702-configure-and-verify-nat-on-ftd.html#anc12&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 23 Mar 2023 06:42:24 GMT</pubDate>
    <dc:creator>balaji.bandi</dc:creator>
    <dc:date>2023-03-23T06:42:24Z</dc:date>
    <item>
      <title>Firepower 2140 additional external IP range</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2140-additional-external-ip-range/m-p/4799448#M1098898</link>
      <description>&lt;P&gt;Hello all, happy Wednesday.&lt;/P&gt;&lt;P&gt;We have a Firepower 2140 on 7.0.1.1 build 11, and prior to yesterday, our outside IP range was limited to a single /27 network.&amp;nbsp; Yesterday as part of a HSRP installation, we got assigned an additional outside range, a /28.&amp;nbsp; I'm not 100% certain where I need to look in the FMC to define this network as it's completely different from our existing range.&amp;nbsp; It isn't contiguous, and is in fact a completely separate range, so I'm not sure if I need to add a whole extra physical interface with that range assigned to it or not.&amp;nbsp; When I try to edit the existing Outside interface, 1/13, I don't see the ability to add a second range, nor does it seem to be OK with a comma separated list.&lt;/P&gt;&lt;P&gt;Happy to provide any other information, just not sure what all would be needed.&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 22 Mar 2023 15:55:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2140-additional-external-ip-range/m-p/4799448#M1098898</guid>
      <dc:creator>m.santangelo</dc:creator>
      <dc:date>2023-03-22T15:55:43Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2140 additional external IP range</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2140-additional-external-ip-range/m-p/4799514#M1098906</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;The fact that you got a new subnet to you does not necessary means that you have to configure it on an interface.&lt;/P&gt;
&lt;P&gt;The ISP will route that new subnet towards your existing Outside IP.&lt;/P&gt;
&lt;P&gt;It's up to you what to do with it:&lt;/P&gt;
&lt;P&gt;1. further subnet the network into a new DMZ and use an IP from that new subnet on FTD (gateway for hosts beloning to that new subnet)&lt;/P&gt;
&lt;P&gt;2. leave everything as is and just use NAT (static/dynamic, your call) and use IPs from that new subnet&lt;/P&gt;
&lt;P&gt;BTW - on FTD you don't have the option to add secondary IPs on an existing interface like on a router/switch SVI&lt;/P&gt;
&lt;P&gt;BR,&lt;/P&gt;
&lt;P&gt;Octavian&lt;/P&gt;</description>
      <pubDate>Wed, 22 Mar 2023 16:50:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2140-additional-external-ip-range/m-p/4799514#M1098906</guid>
      <dc:creator>Octavian Szolga</dc:creator>
      <dc:date>2023-03-22T16:50:35Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2140 additional external IP range</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2140-additional-external-ip-range/m-p/4799806#M1098929</link>
      <description>&lt;P&gt;The routing part is good as long as the ISP is Routed to your network.&lt;/P&gt;
&lt;P&gt;What you like to use for a new Subnet, it's purely your requirement, You can use a Pool of IP in Dynamic NAT or Static NAT for incoming traffic and so on.&lt;/P&gt;
&lt;P&gt;You don't need any Interface to configure, you can make utilization of new subnets as Objects or object groups for your usage intention.&lt;/P&gt;
&lt;P&gt;below configuration guide for reference :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-management-center/212702-configure-and-verify-nat-on-ftd.html#anc12" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/firepower-management-center/212702-configure-and-verify-nat-on-ftd.html#anc12&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2023 06:42:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2140-additional-external-ip-range/m-p/4799806#M1098929</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2023-03-23T06:42:24Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2140 additional external IP range</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2140-additional-external-ip-range/m-p/4799989#M1098942</link>
      <description>&lt;P&gt;As part of option 2, for testing, I did the following:&lt;/P&gt;&lt;P&gt;NAT Rule mapping TestVM-IN (10.1.1.67, a vm on our internal network) to TestVM-EXT (&lt;SPAN&gt;63.247.x.y; one of our new&amp;nbsp; external ips&lt;/SPAN&gt;&lt;SPAN&gt;).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ACL Rule saying ports 80 and 443 are allowed to TestVM-IN.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;When I try to access the site on http or https, I get a slow, very slow timeout page.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;When I change the TestVM-EXT to one of our existing IPs&amp;nbsp;24.157.a.b, the site comes up properly, so I am pretty sure I have the NAT and the Port configuration properly.&amp;nbsp; I must be missing something else because I'm not even seeing packets hitting either IP in the logging.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Maybe they're not properly routing our new IP space to us yet.&amp;nbsp; I am very unsure at this point and will need to reach out to them.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you anyway!&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2023 13:50:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2140-additional-external-ip-range/m-p/4799989#M1098942</guid>
      <dc:creator>m.santangelo</dc:creator>
      <dc:date>2023-03-23T13:50:48Z</dc:date>
    </item>
  </channel>
</rss>

