<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Adding a new Vlan to existing DMZ interface on ASA 5520 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/adding-a-new-vlan-to-existing-dmz-interface-on-asa-5520/m-p/2500692#M234458</link>
    <description>&lt;P&gt;I have a pair of ASA 5520's in active/standby with a leg off the firewall being used for the DMZ servers. &amp;nbsp;The interface has an IP address on it. &amp;nbsp;Now I need to add a second vlan off this interface. &amp;nbsp;I realize that I will have to pull off the Ip address off the interface and then create 2 sub-interfaces. &amp;nbsp;But any one know what other changes will I have to make? &amp;nbsp;Will I recreate all the access-lists or will they work if the nameif is recreated?&lt;/P&gt;&lt;P&gt;I am trying to figure out how much time I need to tell people for downtime.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was going to shut down the standby firewall and I screw something up majorly, use that one to go back to a working state. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As a side note, is there anywhere I can test my configs before applying them? &amp;nbsp;I have heard of GNS3, is there something similar online?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 04:51:00 GMT</pubDate>
    <dc:creator>johnvojtech</dc:creator>
    <dc:date>2019-03-12T04:51:00Z</dc:date>
    <item>
      <title>Adding a new Vlan to existing DMZ interface on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/adding-a-new-vlan-to-existing-dmz-interface-on-asa-5520/m-p/2500692#M234458</link>
      <description>&lt;P&gt;I have a pair of ASA 5520's in active/standby with a leg off the firewall being used for the DMZ servers. &amp;nbsp;The interface has an IP address on it. &amp;nbsp;Now I need to add a second vlan off this interface. &amp;nbsp;I realize that I will have to pull off the Ip address off the interface and then create 2 sub-interfaces. &amp;nbsp;But any one know what other changes will I have to make? &amp;nbsp;Will I recreate all the access-lists or will they work if the nameif is recreated?&lt;/P&gt;&lt;P&gt;I am trying to figure out how much time I need to tell people for downtime.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was going to shut down the standby firewall and I screw something up majorly, use that one to go back to a working state. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As a side note, is there anywhere I can test my configs before applying them? &amp;nbsp;I have heard of GNS3, is there something similar online?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:51:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-a-new-vlan-to-existing-dmz-interface-on-asa-5520/m-p/2500692#M234458</guid>
      <dc:creator>johnvojtech</dc:creator>
      <dc:date>2019-03-12T04:51:00Z</dc:date>
    </item>
    <item>
      <title>But any one know what other</title>
      <link>https://community.cisco.com/t5/network-security/adding-a-new-vlan-to-existing-dmz-interface-on-asa-5520/m-p/2500693#M234459</link>
      <description>&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;But any one know what other changes will I have to make? &lt;/STRONG&gt;&lt;/EM&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With regards to setting up the interfaces no other changes need to be made.&amp;nbsp; Just add the security level, name, IP and no shut and you are good to go.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Will I recreate all the access-lists or will they work if the nameif is recreated?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Depending on how the ACLs are set up, I would assume you will not have to recreate these (unless they reference the interface you are pulling down.&lt;/P&gt;&lt;P&gt;You will need to recreate all commands that reference the interface you are pulling down. So, lets take the ACL for example. The access-group command will need to be reappled as it references the ingress interface (lets call the interface inside).&amp;nbsp; So if you have an ACL assigned to the inside interface you will need to reassign it to that interface after you have recreated it as a sub interface&lt;/P&gt;&lt;P&gt;you will also need to recreate all NAT statements that reference the interface you are pulling down.&lt;/P&gt;&lt;P&gt;So, I suggest you go through your configuration file and take note of all the commands that reference the interface.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 02 Oct 2014 08:55:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-a-new-vlan-to-existing-dmz-interface-on-asa-5520/m-p/2500693#M234459</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-10-02T08:55:46Z</dc:date>
    </item>
  </channel>
</rss>

