<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic It depends on how this subnet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-nat-for-non-interface-ips/m-p/2800095#M169253</link>
    <description>&lt;P&gt;It depends on how this subnet is configured by the ISP.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;If the 2.2.2.0/28 is routed to your ASA address, then you don't have to do anything on the ASA. Just use the additional addresses in your NAT-stements.&lt;/LI&gt;
&lt;LI&gt;If the ISP has configured this&amp;nbsp;additional subnet&amp;nbsp;&amp;nbsp;as secondary addresses on his router, then you need to &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/A-H/cmdref1/a3.html#pgfId-1837762"&gt;"allow" the ASA to use this network&lt;/A&gt; before the NAT-statements will work:&lt;/LI&gt;
&lt;/OL&gt;
&lt;PRE class="prettyprint"&gt;asa(config)# arp permit-nonconnected&lt;/PRE&gt;</description>
    <pubDate>Wed, 06 Jan 2016 14:20:39 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2016-01-06T14:20:39Z</dc:date>
    <item>
      <title>ASA NAT for non interface ips</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-for-non-interface-ips/m-p/2800094#M169250</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ISP has give us two subnets which are 1.1.1.0/28 and 2.2.2.0/28 .&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;they are configured on the isp router&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;our asa is connected to the isp router using an intermidiate switch on range of 1.1.1 with its ip being .2 and isp .1&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I know the asa can nat and accept connections to 1.1.1.3 to 14 even though they are&amp;nbsp; not assigned to any interface.&lt;/P&gt;
&lt;P&gt;can it do this for ips not within its subnet such as 2.2.2.0?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;in another words what i need to do to get ASA to work on single interface with two ips without trunkig&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;how do ISPs usually do this?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Many thanks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:06:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-for-non-interface-ips/m-p/2800094#M169250</guid>
      <dc:creator>cisco8887</dc:creator>
      <dc:date>2019-03-12T07:06:56Z</dc:date>
    </item>
    <item>
      <title>It depends on how this subnet</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-for-non-interface-ips/m-p/2800095#M169253</link>
      <description>&lt;P&gt;It depends on how this subnet is configured by the ISP.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;If the 2.2.2.0/28 is routed to your ASA address, then you don't have to do anything on the ASA. Just use the additional addresses in your NAT-stements.&lt;/LI&gt;
&lt;LI&gt;If the ISP has configured this&amp;nbsp;additional subnet&amp;nbsp;&amp;nbsp;as secondary addresses on his router, then you need to &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/A-H/cmdref1/a3.html#pgfId-1837762"&gt;"allow" the ASA to use this network&lt;/A&gt; before the NAT-statements will work:&lt;/LI&gt;
&lt;/OL&gt;
&lt;PRE class="prettyprint"&gt;asa(config)# arp permit-nonconnected&lt;/PRE&gt;</description>
      <pubDate>Wed, 06 Jan 2016 14:20:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-for-non-interface-ips/m-p/2800095#M169253</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-01-06T14:20:39Z</dc:date>
    </item>
    <item>
      <title>many thanks I thought that</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-for-non-interface-ips/m-p/2800096#M169256</link>
      <description>&lt;P&gt;many thanks I thought that would be the case as sonicwall allows specific subnet to be passed through&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;so I can do something like nat (outside,inside ) 2.2.2.3 192.168.1.1 ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;and regarding the secod case, I don't quite get the difference. Can you elaborate please?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The ISP has assigned the two range with DG in each range so suggesting all routing is done on the router but I am interested to know what is the other model which involves ASA doing routing .&lt;/P&gt;
&lt;P&gt;Would ASA act as arp proxy eventhough the ip isn't assigned to an interface by typing the command you suggested ?&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2016 14:33:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-for-non-interface-ips/m-p/2800096#M169256</guid>
      <dc:creator>cisco8887</dc:creator>
      <dc:date>2016-01-06T14:33:00Z</dc:date>
    </item>
    <item>
      <title>&gt; so I can do something like</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-for-non-interface-ips/m-p/2800097#M169259</link>
      <description>&lt;P&gt;&amp;gt;&amp;nbsp;so I can do something like nat (outside,inside ) 2.2.2.3 192.168.1.1 ?&lt;/P&gt;
&lt;P&gt;Yes, but that's not the way the ASA is "thinking". In general NAT is seen as a source-NAT function. With that, your NAT would look like the following:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;object network SERVER&lt;BR /&gt;&amp;nbsp;host 192.168.1.1&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static 2.2.2.3&lt;/PRE&gt;
&lt;P&gt;The difference between these two options is indeed how the ASA handles ARP:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;If the second Network is routed to the ASA, then&amp;nbsp;there will be no ARP for the IP addresses in the new subnet. The ISP-router knows that all this traffic has to be forwarded to the ASA. The only ARP involved is for your ASA-address. The downside of this option is that the addresses of this new subnet can only be used by the ASA. You can't assign a single IP to a different device on the transfer network.&lt;/LI&gt;
&lt;LI&gt;If the provider configures the network as secondary addresses
&lt;PRE class="prettyprint"&gt;interface gig 0/0&lt;BR /&gt;&amp;nbsp;description Link to Customer&lt;BR /&gt;&amp;nbsp;ip address 1.1.1.1 255.255.255.240&lt;BR /&gt;&amp;nbsp;ip address 2.2.2.1 255.255.255.240 secondary&lt;/PRE&gt;
then the ISP-router needs to arp for every single address that is used.&amp;nbsp;And that won't work by default on the ASA with recent versions.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Wed, 06 Jan 2016 15:26:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-for-non-interface-ips/m-p/2800097#M169259</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-01-06T15:26:03Z</dc:date>
    </item>
    <item>
      <title>very interesting so ASA</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-for-non-interface-ips/m-p/2800098#M169261</link>
      <description>&lt;P&gt;very interesting so ASA always sees the source nat ( internal source ) as important object and nat based on that ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If all traffic was to be routed to ASA, would isp achieve this by a static route to asa? I think this will work as it is not seen as locally connected !&lt;/P&gt;
&lt;P&gt;regarding secondary ip, why wouldn't this work ? ISP arps and asa responds after the command you suggested is inputted&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2016 15:30:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-for-non-interface-ips/m-p/2800098#M169261</guid>
      <dc:creator>cisco8887</dc:creator>
      <dc:date>2016-01-06T15:30:45Z</dc:date>
    </item>
    <item>
      <title>&gt; If all traffic was to be</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-for-non-interface-ips/m-p/2800099#M169264</link>
      <description>&lt;P&gt;&amp;gt; If all traffic was to be routed to ASA, would isp achieve this by a static route to asa?&lt;BR /&gt;&amp;gt; I think this will work as it is not seen as locally connected !&lt;/P&gt;
&lt;P&gt;right, the ISP-router just needs a static route to your ASA.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;gt; regarding secondary ip, why wouldn't this work ? ISP arps and asa responds after the &amp;gt; command you suggested is inputted&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Yes, it will work (and is a quite common setup), but not by default.&amp;nbsp;If you miss the mentioned command it won't.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2016 15:43:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-for-non-interface-ips/m-p/2800099#M169264</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-01-06T15:43:52Z</dc:date>
    </item>
    <item>
      <title>brilliant</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-for-non-interface-ips/m-p/2800100#M169267</link>
      <description>&lt;P&gt;brilliant&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2016 08:52:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-for-non-interface-ips/m-p/2800100#M169267</guid>
      <dc:creator>cisco8887</dc:creator>
      <dc:date>2016-01-07T08:52:34Z</dc:date>
    </item>
    <item>
      <title>another question</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-for-non-interface-ips/m-p/2800101#M169269</link>
      <description>&lt;P&gt;another question&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;if one has three subnets from the isp on ethernet 0/0&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;how is that possible?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;if using the method of primary and secondary ip on ISP router then you have two ranges&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;how do you configure the third range ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;if not using the option of secondary ip, how could an ISP assign three ranges to a single interface all of them having a defualt gateway ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can you confirm my thoughts on how the packet flow will be is correct ,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;from internet a packet is sent to 2.2.2.5 which is received the ISP router. ISP router communicates with the ASA using 1.1.1.1 ( ISP) and 1.1.1.2(ASA). The packet is routed and sent to the ASA on 1.1.1.2 with destination address of 2.2.2.5&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ASA sees the nat table and forwards it&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;reverse is&lt;/P&gt;
&lt;P&gt;packet received by asa, ASA changes the soruce ip to 2.2.2.5 and forward to 1.1.1.1 . ISP router receives it and do the routing from there&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2016 08:55:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-for-non-interface-ips/m-p/2800101#M169269</guid>
      <dc:creator>cisco8887</dc:creator>
      <dc:date>2016-01-07T08:55:57Z</dc:date>
    </item>
    <item>
      <title>You can configure multiple</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-for-non-interface-ips/m-p/2800102#M169271</link>
      <description>&lt;P&gt;You can configure multiple secondary addresses on one interface.&lt;/P&gt;
&lt;P&gt;The mentioned packet-flow is correct for the scenario where the ISP routes that new subnet to the customer. BTW: It doesn't have to be NAT that uses the new network. The customer could also route it to somewhere else in his network or use it as a DMZ with public IP addresses. That is sometimes needed&amp;nbsp;for example for some videoconference equipment that behaves oddly with NAT.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2016 09:13:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-for-non-interface-ips/m-p/2800102#M169271</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-01-07T09:13:34Z</dc:date>
    </item>
    <item>
      <title>got you</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-for-non-interface-ips/m-p/2800103#M169273</link>
      <description>&lt;P&gt;got you&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;in that case it will be something like&lt;/P&gt;
&lt;P&gt;nat (dmz,outside ) 2.2.2.3 2.2.2.3&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2016 09:31:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-for-non-interface-ips/m-p/2800103#M169273</guid>
      <dc:creator>cisco8887</dc:creator>
      <dc:date>2016-01-07T09:31:50Z</dc:date>
    </item>
    <item>
      <title>No, it's even easier. If you</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-for-non-interface-ips/m-p/2800104#M169274</link>
      <description>&lt;P&gt;No, it's even easier. If you have public addresses on a DMZ, then you just don't configure any nat rule for the that interface. If there is no nat-rule, then the ASA will route that traffic. With a higher security-leven on the DMZ, you still need access-control configured on the&amp;nbsp;outside interface.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2016 10:03:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-for-non-interface-ips/m-p/2800104#M169274</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-01-07T10:03:40Z</dc:date>
    </item>
    <item>
      <title>hmm so how does ASA know</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-for-non-interface-ips/m-p/2800105#M169276</link>
      <description>&lt;P&gt;hmm so how does ASA know about it , static route ?&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2016 10:05:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-for-non-interface-ips/m-p/2800105#M169276</guid>
      <dc:creator>cisco8887</dc:creator>
      <dc:date>2016-01-07T10:05:25Z</dc:date>
    </item>
    <item>
      <title>configured on an interface or</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-for-non-interface-ips/m-p/2800106#M169278</link>
      <description>&lt;P&gt;configured on an interface or a static route if the network is behind an extra L3-switch or router. But that's not specific to the ASA. That's purely how a Layer3 device operates.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2016 10:08:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-for-non-interface-ips/m-p/2800106#M169278</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-01-07T10:08:56Z</dc:date>
    </item>
    <item>
      <title>I know i am asking too many</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-for-non-interface-ips/m-p/2800107#M169280</link>
      <description>&lt;P&gt;I know i am asking too many questions and you are paitent &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am a very detailed person hence why trying to understand&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;what said makes sense now but when you say configured on an interface I believe this is not possible as the ASA interface and DMZ machine will have a same ip.This is if I understood you correctly.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I know one can do PBR on 9.3 and higher so that is a possibility&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2016 10:16:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-for-non-interface-ips/m-p/2800107#M169280</guid>
      <dc:creator>cisco8887</dc:creator>
      <dc:date>2016-01-07T10:16:17Z</dc:date>
    </item>
  </channel>
</rss>

