<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi AJ, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/back-to-back-cisco-asa-firewall-internal-and-external/m-p/2987014#M147790</link>
    <description>&lt;P&gt;Hi AJ,&lt;/P&gt;
&lt;P&gt;This is how we will interconnect the 2 firewalls on the network. Could you advise if this diagram will work fine?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have followed the network connection on this guide:&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/5508X/ftd-fmc-5508x-qsg.html"&gt;http://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/5508X/ftd-fmc-5508x-qsg.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/asa_network.png" class="migrated-markup-image" /&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks and regards.&lt;/P&gt;</description>
    <pubDate>Mon, 13 Mar 2017 05:00:20 GMT</pubDate>
    <dc:creator>VCsupport17</dc:creator>
    <dc:date>2017-03-13T05:00:20Z</dc:date>
    <item>
      <title>Back to Back Cisco ASA Firewall (Internal and External)</title>
      <link>https://community.cisco.com/t5/network-security/back-to-back-cisco-asa-firewall-internal-and-external/m-p/2987009#M147785</link>
      <description>&lt;P&gt;Hi Community,&lt;/P&gt;
&lt;P&gt;I am new with Cisco firewall and need some advice on the network diagram.&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/diag_3.png" class="migrated-markup-image" /&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;We will deploy 2x ASA firewall 5516 with Firepower for external and internal. We will use SG500-X switch in the network for DMZ and LAN.&lt;/P&gt;
&lt;P&gt;Based on the diagram and network devices, i need to know if this will work? Also i need some deployment guide on how to implement 2 firewalls with DMZ configuration.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:46:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/back-to-back-cisco-asa-firewall-internal-and-external/m-p/2987009#M147785</guid>
      <dc:creator>VCsupport17</dc:creator>
      <dc:date>2019-03-12T08:46:19Z</dc:date>
    </item>
    <item>
      <title>Hi Community,</title>
      <link>https://community.cisco.com/t5/network-security/back-to-back-cisco-asa-firewall-internal-and-external/m-p/2987010#M147786</link>
      <description>&lt;P&gt;Hi Community,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I would like to ask what is better design between the below diagrams with two back to back Cisco ASA firewall:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;1. DMZ is on external firewall and External firewall (inside interface) is connected directly to Internal firewall (outside interface).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/netdiag.png" class="migrated-markup-image" /&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;2. A DMZ is in between the External and Internal firewall with DMZ switch connected with each other.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/netdiag2.png" class="migrated-markup-image" /&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Need your recommendation please.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jan 2017 09:03:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/back-to-back-cisco-asa-firewall-internal-and-external/m-p/2987010#M147786</guid>
      <dc:creator>VCsupport17</dc:creator>
      <dc:date>2017-01-24T09:03:19Z</dc:date>
    </item>
    <item>
      <title>Both designs will work for</title>
      <link>https://community.cisco.com/t5/network-security/back-to-back-cisco-asa-firewall-internal-and-external/m-p/2987011#M147787</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Both designs will work for sure. I am not sure why you have implemented 2 ASA when we could have achieved with just one ASA. DMZ anyways would be a different segment. And 2 ASA inline is adding to latency because each ASA has to process the traffic as per their configured policies. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;If one of the design has to be there, I can just think of below criteria that we can check for the implementation:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;- In design 1 , we are adding one more hop between the lan and dmz segment which is not the case in design 2. If the communication between lan and dmz is required/expected and we expect some good amount of traffic(like server backup etc), design 2 should be considered. This is to improve efficiency and take load off the external ASA.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;Apart from that, I dont see anything else. This is assuming that both ASA are implemented in similar fashion.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;Please let me know if you have any specific requirement/criteria in mind that can be explored.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;AJ&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jan 2017 14:10:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/back-to-back-cisco-asa-firewall-internal-and-external/m-p/2987011#M147787</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2017-01-24T14:10:43Z</dc:date>
    </item>
    <item>
      <title>Hi AJ,</title>
      <link>https://community.cisco.com/t5/network-security/back-to-back-cisco-asa-firewall-internal-and-external/m-p/2987012#M147788</link>
      <description>&lt;P&gt;Hi AJ,&lt;/P&gt;
&lt;P&gt;Thank you for your helpful comments.&lt;/P&gt;
&lt;P&gt;We will consider the option 2 and we will add also are core switch (3850) in between the internal firewall and the SG500-X Stackable LAN switch.&lt;/P&gt;
&lt;P&gt;Is there any guide on how we can configure the two ASA firewalls with the design we want to implement?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks and regards.&lt;/P&gt;
&lt;P&gt;Sy&lt;/P&gt;</description>
      <pubDate>Thu, 23 Feb 2017 08:58:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/back-to-back-cisco-asa-firewall-internal-and-external/m-p/2987012#M147788</guid>
      <dc:creator>VCsupport17</dc:creator>
      <dc:date>2017-02-23T08:58:58Z</dc:date>
    </item>
    <item>
      <title>Hi Sy,</title>
      <link>https://community.cisco.com/t5/network-security/back-to-back-cisco-asa-firewall-internal-and-external/m-p/2987013#M147789</link>
      <description>&lt;P&gt;Hi Sy,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Unfortunately, there isn't a design guide specifically for this requirement. This should be fairly simple to deploy. Let me know if there are any specific concerns regarding this design.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;AJ&lt;/P&gt;</description>
      <pubDate>Sat, 25 Feb 2017 03:09:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/back-to-back-cisco-asa-firewall-internal-and-external/m-p/2987013#M147789</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2017-02-25T03:09:31Z</dc:date>
    </item>
    <item>
      <title>Hi AJ,</title>
      <link>https://community.cisco.com/t5/network-security/back-to-back-cisco-asa-firewall-internal-and-external/m-p/2987014#M147790</link>
      <description>&lt;P&gt;Hi AJ,&lt;/P&gt;
&lt;P&gt;This is how we will interconnect the 2 firewalls on the network. Could you advise if this diagram will work fine?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have followed the network connection on this guide:&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/5508X/ftd-fmc-5508x-qsg.html"&gt;http://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/5508X/ftd-fmc-5508x-qsg.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/asa_network.png" class="migrated-markup-image" /&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks and regards.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2017 05:00:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/back-to-back-cisco-asa-firewall-internal-and-external/m-p/2987014#M147790</guid>
      <dc:creator>VCsupport17</dc:creator>
      <dc:date>2017-03-13T05:00:20Z</dc:date>
    </item>
    <item>
      <title>I don't see any issues as</title>
      <link>https://community.cisco.com/t5/network-security/back-to-back-cisco-asa-firewall-internal-and-external/m-p/2987015#M147791</link>
      <description>&lt;P&gt;I don't see any issues as such with the design. If you have a firepower/IPS module in the ASA 5515x, for outbound traffic (lan-to-internet and internet-to-lan), you can have one of the ASA inspect it and skip on second ASA since inspecting it twice would add to latency and does not make sense.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Other than that, I don't see any flaws with the design.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let me know if you have any questions.&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;-AJ&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2017 11:49:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/back-to-back-cisco-asa-firewall-internal-and-external/m-p/2987015#M147791</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2017-03-13T11:49:51Z</dc:date>
    </item>
    <item>
      <title>Re: Hi Community,</title>
      <link>https://community.cisco.com/t5/network-security/back-to-back-cisco-asa-firewall-internal-and-external/m-p/3996967#M147792</link>
      <description>&lt;P&gt;Hi Community,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have the external firewall ASA 5506 configured from&amp;nbsp;internet service provider to DMZ&amp;nbsp; and I would like to add an internal firewall ASA 5506 to connect my local area network. do you have any guide I can follow?.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 11 Dec 2019 06:24:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/back-to-back-cisco-asa-firewall-internal-and-external/m-p/3996967#M147792</guid>
      <dc:creator>pxngomane</dc:creator>
      <dc:date>2019-12-11T06:24:12Z</dc:date>
    </item>
  </channel>
</rss>

