<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic If you have some spare public in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-behind-an-asa-topology-issue/m-p/2516946#M237405</link>
    <description>&lt;P&gt;If you have some spare public IPs that are being routed to the outside IP of your edge ASA, you could NAT that public IP to the new customer ASAs and then establish a site to site VPN using that public IP.&lt;/P&gt;&lt;P&gt;Another option would be to establish site to site VPN with your edge ASA and in the crypto ACL only permit traffic to and from the required networks.&amp;nbsp; Then the traffic will be routed to the new ASAs and be filtered and sent to their destination.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
    <pubDate>Thu, 19 Jun 2014 12:09:24 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2014-06-19T12:09:24Z</dc:date>
    <item>
      <title>ASA Behind an ASA - Topology issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-behind-an-asa-topology-issue/m-p/2516943#M237401</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I am in quite the predicament, my company offers a cloud based infrastructure for customers who buy our software from us.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a pair of ASA 5525-X w/ IPS with multiple vLAN's for each customers (inside) and one vLAN for our outside interface - These should be contexts and we are convincing the business to make these context based.&lt;/P&gt;&lt;P&gt;But at the moment, one of our Sales person have sold a solution to allow a customer to have their own physical firewalls and now asked how would we go about it? The customer is commited to put in a pair of ASA 5515-X IPS devices into our Data Centres but we are quite confused on how to put their ASA behind our Edge ASA?&lt;/P&gt;&lt;P&gt;I can only assume we have two options:&lt;/P&gt;&lt;P&gt;1) We keep the NAT on our Edge Firewall and simply create another vLAN for this customer and but their Firewall behind our Edge. but then are we Double NAT-ing now?&lt;/P&gt;&lt;P&gt;2) We provide a seperate IP feed for this customer which goes directly into their physical firewalls which we will manage.&lt;/P&gt;&lt;P&gt;We do not wish to make many changes on our Edge firewall due to the amount of customers we manage so I do not know if enabling Transparent mode would work either without impacting all our customers.&lt;/P&gt;&lt;P&gt;The traffic we serve is mainly HTTP / HTTPs but this customer requires a VPN to keep their SQL DB's in sync with a search engine.&lt;/P&gt;&lt;P&gt;Any assistance would be greatly appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jazz&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:20:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-behind-an-asa-topology-issue/m-p/2516943#M237401</guid>
      <dc:creator>Jazz80813</dc:creator>
      <dc:date>2019-03-12T04:20:53Z</dc:date>
    </item>
    <item>
      <title>Hi Jazz,Here my suggestions</title>
      <link>https://community.cisco.com/t5/network-security/asa-behind-an-asa-topology-issue/m-p/2516944#M237402</link>
      <description>&lt;P&gt;Hi Jazz,&lt;/P&gt;&lt;P&gt;Here my suggestions for your query&lt;/P&gt;&lt;P&gt;Options:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;You can have the Customer Dedicated FW on the Internet Access Segment ( Down to the internet edge router) and assign that with a dedicated public IP stack and do the management. This will take care the specific customer alone &amp;amp; down the line you can connect to your core LAN network layer to get connected to the inside segment. This is something like isolating it as the seperate LAN infrastructure.&lt;/LI&gt;&lt;LI&gt;If you go with dual FW layer option.... then you can use customer FW for filtering and Edge FW for doing NAT. You can just pass thru the traffic to edge fw with the private segment.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jun 2014 09:51:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-behind-an-asa-topology-issue/m-p/2516944#M237402</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-06-19T09:51:48Z</dc:date>
    </item>
    <item>
      <title>Hi Karthik, Thank you for the</title>
      <link>https://community.cisco.com/t5/network-security/asa-behind-an-asa-topology-issue/m-p/2516945#M237403</link>
      <description>&lt;P&gt;Hi Karthik,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the response, going with the dual FW layer option, would the site to site VPN work in that scenario as I think I would be double NAT-ing? Or just have a single NAT on the Edge FW and just open the ports for VPN on edge to enable the traffic to pass through.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jazz&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jun 2014 12:05:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-behind-an-asa-topology-issue/m-p/2516945#M237403</guid>
      <dc:creator>Jazz80813</dc:creator>
      <dc:date>2014-06-19T12:05:45Z</dc:date>
    </item>
    <item>
      <title>If you have some spare public</title>
      <link>https://community.cisco.com/t5/network-security/asa-behind-an-asa-topology-issue/m-p/2516946#M237405</link>
      <description>&lt;P&gt;If you have some spare public IPs that are being routed to the outside IP of your edge ASA, you could NAT that public IP to the new customer ASAs and then establish a site to site VPN using that public IP.&lt;/P&gt;&lt;P&gt;Another option would be to establish site to site VPN with your edge ASA and in the crypto ACL only permit traffic to and from the required networks.&amp;nbsp; Then the traffic will be routed to the new ASAs and be filtered and sent to their destination.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jun 2014 12:09:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-behind-an-asa-topology-issue/m-p/2516946#M237405</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-06-19T12:09:24Z</dc:date>
    </item>
    <item>
      <title>Hi Jazz, You can have the</title>
      <link>https://community.cisco.com/t5/network-security/asa-behind-an-asa-topology-issue/m-p/2516947#M237407</link>
      <description>&lt;P&gt;Hi Jazz,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can have the public IP NAT towards the private IP (Outside) interface of the customer FW and make the edge ASA as a pass through &amp;amp; NAT fw to get that work. It will work as expected. I have deployed such setup in my experience.... Except double work you do in both firewalls... nothing else is hard here... it works technically.....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jun 2014 12:21:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-behind-an-asa-topology-issue/m-p/2516947#M237407</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-06-19T12:21:10Z</dc:date>
    </item>
    <item>
      <title>Hi Karthik, How would you</title>
      <link>https://community.cisco.com/t5/network-security/asa-behind-an-asa-topology-issue/m-p/2516948#M237409</link>
      <description>&lt;P&gt;Hi Karthik,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How would you make the Edge ASA as pass through?&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jun 2014 15:05:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-behind-an-asa-topology-issue/m-p/2516948#M237409</guid>
      <dc:creator>Jazz80813</dc:creator>
      <dc:date>2014-06-20T15:05:08Z</dc:date>
    </item>
    <item>
      <title>Hi Marius, we do have some</title>
      <link>https://community.cisco.com/t5/network-security/asa-behind-an-asa-topology-issue/m-p/2516949#M237412</link>
      <description>&lt;P&gt;Hi Marius, we do have some spare public IP Addresses. but how would i create the public NAT on the customer FW, as wouldnt all the mapping of Public IP's address be pointed to the Edge ASA?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jazz&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jun 2014 15:08:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-behind-an-asa-topology-issue/m-p/2516949#M237412</guid>
      <dc:creator>Jazz80813</dc:creator>
      <dc:date>2014-06-20T15:08:18Z</dc:date>
    </item>
    <item>
      <title>Hi Jazz,Edge Firewall:On the</title>
      <link>https://community.cisco.com/t5/network-security/asa-behind-an-asa-topology-issue/m-p/2516950#M237416</link>
      <description>&lt;P&gt;Hi Jazz,&lt;/P&gt;&lt;P&gt;Edge Firewall:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;On the edge firewall you need to allow the required VPN ports like 500,4500,esp... etc towards the dedicated customer VPN firewall.&lt;/LI&gt;&lt;LI&gt;Static NAT for the Outside Private IP of the customer firewall with the public IP on the edge firewall.&lt;/LI&gt;&lt;LI&gt;NAT/PAT for the interesting traffic from the customer firewall with public IP which will be used for Site to Site Tunnel.&lt;/LI&gt;&lt;LI&gt;Outbound ACL in edge firewall for the Site to Site access. Source will be private address that comes from customer firewall&amp;nbsp; &amp;amp; destination will be client address.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;So that edge firewall will be used as pass through and NAT/PAT FW.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dedicated Customer Firewall:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Peer address would be on the actual public IP of the Customer site Firewall....&lt;/LI&gt;&lt;LI&gt;As usual rest all other things will be same phase 1 , phase 2 parameters, cryptomap.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Eg: Attached with sample&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" src="data:image/png;base64,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" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jun 2014 15:38:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-behind-an-asa-topology-issue/m-p/2516950#M237416</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-06-20T15:38:46Z</dc:date>
    </item>
    <item>
      <title>You have spare public IPs</title>
      <link>https://community.cisco.com/t5/network-security/asa-behind-an-asa-topology-issue/m-p/2516951#M237419</link>
      <description>&lt;P&gt;You have spare public IPs which should all either be part of the same subnet as the public IP configured on your edge ASA, or at least your ISP should be routing them to your ASA edge.&lt;/P&gt;&lt;P&gt;What you do then is configure a NAT statement which translates that public IP to your customer's ASA virtual (I am assuming you will have them set up in an active standby setup).&lt;/P&gt;&lt;P&gt;So, I would suggest (with the lack of an ASA context to use) configure a VLAN on the switch that connects to your edge ASA that is dedicated to your customer. then on your edge ASA either allocate a dedicated interface for that VLAN (this would be the best solution), If you do not have a dedicated interface to use, create another subinterface on the inside interface and allocate it to your chosen VLAN.&lt;/P&gt;&lt;P&gt;next create an object group that matches the virtual IP of your customer's outside interface:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network NEW_CUSTOMER&lt;BR /&gt;&amp;nbsp; host &amp;lt;CUSTOMER ASA private IP&amp;gt;&lt;BR /&gt;&amp;nbsp; nat (cust_int,outside) static interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Ofcourse depending on what services you are providing the customer, you might want to restrict the ports that are allowed either through an ACL and/or in the NAT statement.&lt;/P&gt;&lt;P&gt;You will also need an ACL entry allowing inbound traffic to the new customer ASA.&amp;nbsp; The following will allow for remote access IPsec VPN...If you are using Anyconnect the port is 443 unless you have manually changed that.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list CUST_ACL extended permit udp any &amp;lt;CUSTOMER ASA private IP&amp;gt; eq 500&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list CUST_ACL extended permit udp any &amp;lt;CUSTOMER ASA private IP&amp;gt; eq 4500&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group CUST_ACL in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Now, if the client machines, servers...etc. behind the customer's ASAs need access to the internet for updates or whatever (keep in mind in the scenario I am laying out customers will access resources over the VPN only) you will need to translate the subnet behind the customer ASAs to the virtual outside IP of the customer ASA.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network CUST_LAN&lt;BR /&gt;&amp;nbsp; subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp; nat (inside,outside) dynamic interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Hope I explained that well enough.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jun 2014 15:39:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-behind-an-asa-topology-issue/m-p/2516951#M237419</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-06-20T15:39:26Z</dc:date>
    </item>
  </channel>
</rss>

