<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Multiple external IPs on ASA 5505 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/multiple-external-ips-on-asa-5505/m-p/3739929#M11591</link>
    <description>&lt;P&gt;But as per your orginal message&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What I need:&lt;/P&gt;
&lt;P&gt;- Any external traffic arriving on 10.0.0.2 ports 80, 443 to forward to internal host 192.168.1. 20.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So we have suggested for single IP, if your requirement Multiple IP explain more please , Multiple IP also possible but we would like to know use case to suggest better rather assumptions.&lt;/P&gt;</description>
    <pubDate>Tue, 06 Nov 2018 10:40:21 GMT</pubDate>
    <dc:creator>balaji.bandi</dc:creator>
    <dc:date>2018-11-06T10:40:21Z</dc:date>
    <item>
      <title>Multiple external IPs on ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/multiple-external-ips-on-asa-5505/m-p/3739465#M11580</link>
      <description>&lt;P&gt;This is a dumbed down version of what I'm trying to do, but if I can get this much figured out I'm golden.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The setup:&lt;/P&gt;
&lt;P&gt;- ASA 5505 running 9.2.4(28)&lt;/P&gt;
&lt;P&gt;- ISP has assigned block of external IPs 10.0.0.1-10.0.0.14&lt;/P&gt;
&lt;P&gt;- ASA's outside interface can "see" traffic on all external IPs&lt;/P&gt;
&lt;P&gt;- ASA's outside interface configured for 10.0.0.1&lt;/P&gt;
&lt;P&gt;- ASA's inside configured for 192.168.1.1 (255.255.255.0 to keep it simple)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What I need:&lt;/P&gt;
&lt;P&gt;- Any external traffic arriving on 10.0.0.2 ports 80, 443 to forward to internal host 192.168.1. 20.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is this possible? And if so how do I do it (details pretty pretty please with sugar on top).&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:26:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-external-ips-on-asa-5505/m-p/3739465#M11580</guid>
      <dc:creator>GrootLives</dc:creator>
      <dc:date>2020-02-21T16:26:10Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple external IPs on ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/multiple-external-ips-on-asa-5505/m-p/3739471#M11581</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Try this:-&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;object network SRV1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;host 192.168.1.20&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;nat (inside,outside) static 10.0.0.2&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list OUTSIDE-&amp;gt;IN permit tcp any host 192.168.1.20 eq 443&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list OUTSIDE-&amp;gt;IN permit tcp any host 192.168.1.20 eq 80&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You will probably have to change the ACL name and possibly also the interface names (inside,outside).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Mon, 05 Nov 2018 22:01:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-external-ips-on-asa-5505/m-p/3739471#M11581</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-11-05T22:01:57Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple external IPs on ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/multiple-external-ips-on-asa-5505/m-p/3739474#M11583</link>
      <description>&lt;P&gt;Good example guide for your reference :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/115904-asa-config-dmz-00.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/115904-asa-config-dmz-00.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Nov 2018 22:06:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-external-ips-on-asa-5505/m-p/3739474#M11583</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2018-11-05T22:06:01Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple external IPs on ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/multiple-external-ips-on-asa-5505/m-p/3739617#M11585</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/282064"&gt;@GrootLives&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;This is a dumbed down version of what I'm trying to do, but if I can get this much figured out I'm golden.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The setup:&lt;/P&gt;
&lt;P&gt;- ASA 5505 running 9.2.4(28)&lt;/P&gt;
&lt;P&gt;- ISP has assigned block of external IPs 10.0.0.1-10.0.0.14&lt;/P&gt;
&lt;P&gt;- ASA's outside interface can "see" traffic on all external IPs&lt;/P&gt;
&lt;P&gt;- ASA's outside interface configured for 10.0.0.1&lt;/P&gt;
&lt;P&gt;- ASA's inside configured for 192.168.1.1 (255.255.255.0 to keep it simple)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What I need:&lt;/P&gt;
&lt;P&gt;- Any external traffic arriving on 10.0.0.2 ports 80, 443 to forward to internal host 192.168.1. 20.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is this possible? And if so how do I do it (details pretty pretty please with sugar on top).&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Looks promising. I'll give it a go tomorrow. Done for the day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286878"&gt;@balaji.bandi&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;Good example guide for your reference :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/115904-asa-config-dmz-00.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/115904-asa-config-dmz-00.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;Easy to read to guide. Only uses a single IP though. Have to see if it scales up to multiple IPs. Again I'll check it out tomorrow.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Nov 2018 00:12:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-external-ips-on-asa-5505/m-p/3739617#M11585</guid>
      <dc:creator>GrootLives</dc:creator>
      <dc:date>2018-11-06T00:12:16Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple external IPs on ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/multiple-external-ips-on-asa-5505/m-p/3739866#M11588</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;thats interesting! i've always configured it like this:&lt;/P&gt;
&lt;P&gt;object network websvr-ext&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; host 10.0.0.2&lt;BR /&gt;object network websvr-int-80&lt;BR /&gt;&amp;nbsp; host 192.168.1.20&lt;BR /&gt;&amp;nbsp; nat (inside,outside) static websvr-ext service tcp 80 80&lt;BR /&gt;object network websvr-int-443&lt;BR /&gt;&amp;nbsp; host 192.168.1.20&lt;BR /&gt;&amp;nbsp; nat (inside,outside) static websvr-ext service tcp 443 443&lt;BR /&gt;&lt;BR /&gt;access-list OUTSIDE-IN ext permit tcp any object websvr-int eq 80&lt;BR /&gt;access-list OUTSIDE-IN ext permit tcp any object websvr-int eq 443&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;will have to test your config sometime.&lt;/P&gt;
&lt;P&gt;regards, mk&lt;/P&gt;</description>
      <pubDate>Tue, 06 Nov 2018 08:45:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-external-ips-on-asa-5505/m-p/3739866#M11588</guid>
      <dc:creator>mkazam001</dc:creator>
      <dc:date>2018-11-06T08:45:46Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple external IPs on ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/multiple-external-ips-on-asa-5505/m-p/3739929#M11591</link>
      <description>&lt;P&gt;But as per your orginal message&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What I need:&lt;/P&gt;
&lt;P&gt;- Any external traffic arriving on 10.0.0.2 ports 80, 443 to forward to internal host 192.168.1. 20.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So we have suggested for single IP, if your requirement Multiple IP explain more please , Multiple IP also possible but we would like to know use case to suggest better rather assumptions.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Nov 2018 10:40:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-external-ips-on-asa-5505/m-p/3739929#M11591</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2018-11-06T10:40:21Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple external IPs on ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/multiple-external-ips-on-asa-5505/m-p/3739970#M11592</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/130309"&gt;@mkazam001&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;thats interesting! i've always configured it like this:&lt;/P&gt;
&lt;P&gt;object network websvr-ext&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; host 10.0.0.2&lt;BR /&gt;object network websvr-int-80&lt;BR /&gt;&amp;nbsp; host 192.168.1.20&lt;BR /&gt;&amp;nbsp; nat (inside,outside) static websvr-ext service tcp 80 80&lt;BR /&gt;object network websvr-int-443&lt;BR /&gt;&amp;nbsp; host 192.168.1.20&lt;BR /&gt;&amp;nbsp; nat (inside,outside) static websvr-ext service tcp 443 443&lt;BR /&gt;&lt;BR /&gt;access-list OUTSIDE-IN ext permit tcp any object websvr-int eq 80&lt;BR /&gt;access-list OUTSIDE-IN ext permit tcp any object websvr-int eq 443&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;will have to test your config sometime.&lt;/P&gt;
&lt;P&gt;regards, mk&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;That seemed to do the trick. Thanks everyone.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Nov 2018 12:15:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-external-ips-on-asa-5505/m-p/3739970#M11592</guid>
      <dc:creator>GrootLives</dc:creator>
      <dc:date>2018-11-06T12:15:42Z</dc:date>
    </item>
  </channel>
</rss>

