<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cascaded Firewalls and DHCP relay... in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cascaded-firewalls-and-dhcp-relay/m-p/2454336#M267674</link>
    <description>&lt;P&gt;&lt;SPAN style="font-size: 12px"&gt;Hi All,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px"&gt;Have a challenge for you guys and gals.&amp;nbsp; I am trying to working out if the following is possible...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px"&gt;In detail, the exmaple below has a pair of ASAs that are cascaded at a remote site, say ASA_LAN and ASA_WAN.&amp;nbsp; Both would be in L3 routed mode (can't change to transparent mode) and am having a few issues with DHCP relaying across the units...&amp;nbsp; For once I have RTM for&amp;nbsp;the ASA IOS (9.1.3) on this topic, but have drawn a blank...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px"&gt;Example Scenario is as follows:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="DHCP Cascased ASA Example" class="image-style-none media-element file-default" data-file_info="%7B%22fid%22:%22971501%22,%22view_mode%22:%22default%22,%22fields%22:%7B%22format%22:%22default%22,%22field_file_image_alt_text%5Bund%5D%5B0%5D%5Bvalue%5D%22:%22DHCP%20Cascased%20ASA%20Example%22,%22field_file_image_title_text%5Bund%5D%5B0%5D%5Bvalue%5D%22:%22DHCP%20Cascased%20ASA%20Example%22,%22field_media_description%5Bund%5D%5B0%5D%5Bvalue%5D%22:%22DHCP%20Cascased%20ASA%20Example%22%7D,%22type%22:%22media%22%7D" height="219" src="https://community.cisco.com/legacyfs/online/media/asa_dhcp_question_0.png" title="DHCP Cascased ASA Example" typeof="foaf:Image" width="405" /&gt;&lt;!--MEDIA-WRAPPER-END-2--&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px"&gt;In this example there is a Site-to-Site VPN tunnel between ASA-WAN and ASA-REMOTE, as shown above.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px"&gt;On ASA_LAN I have the following configuration snippet:&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 36pt"&gt;&lt;CODE&gt;&lt;SPAN style="font-size: 12px"&gt;interface gi0/0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; nameif lan_outside&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip address 2.2.2.1 255.255.255.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; security-level 0&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/P&gt;&lt;P style="margin-left: 36pt"&gt;&lt;CODE&gt;&lt;SPAN style="font-size: 12px"&gt;interface gi0/1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; nameif lan_inside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip address 1.1.1.2 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; security-level 99&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/P&gt;&lt;P style="margin-left: 36pt"&gt;&lt;CODE&gt;&lt;SPAN style="font-size: 12px"&gt;dhcprelay server 4.4.4.2 lan_outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;dhcprelay enable lan_inside&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px"&gt;On the ASA_WAN I have the following configuration snippet:&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 36pt"&gt;&lt;CODE&gt;&lt;SPAN style="font-size: 12px"&gt;interface gi0/0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; nameif wan_outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip address 3.3.3.1 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; security-level 0&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/P&gt;&lt;P style="margin-left: 36pt"&gt;&lt;CODE&gt;&lt;SPAN style="font-size: 12px"&gt;interface gi0/1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; nameif wan_inside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip address 2.2.2.2 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; security-level 99&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/P&gt;&lt;P style="margin-left: 36pt"&gt;&lt;CODE&gt;&lt;SPAN style="font-size: 12px"&gt;access-list inside_outside extended permit udp host 2.2.2.1 host 4.4.4.2 eq bootps log&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;access-list inside_outside extended permit icmp host 2.2.2.1 host 4.4.4.2 log&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;access-list inside_outside extended deny ip any any log&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;access-group inside_outside in interface wan_inside&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/P&gt;&lt;P style="margin-left: 36pt"&gt;&lt;CODE&gt;&lt;SPAN style="font-size: 12px"&gt;access-list outside_ inside extended permit udp host 4.4.4.2 host 2.2.2.1 eq bootps log&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;access-list outside_ inside extended permit icmp host 4.4.4.2 host 2.2.2.1 log&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;access-list outside_ inside extended deny ip any any log&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;access-group outside_inside in interface wan_outside&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/P&gt;&lt;P style="margin-left: 36pt"&gt;&lt;CODE&gt;&lt;SPAN style="font-size: 12px"&gt;access-list enc_to_remote extended permit ip 1.1.1.0 255.255.255.0 4.4.4.0 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;crypto map std_enc 1 match address enc_to_remote&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;crypto map std_enc 1 set peer 3.3.3.2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;crypto map std_enc 1 set ikev2 ipsec-proposal std_enc_pol&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;crypto ikev2 enable wan_outside&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px"&gt;On ASA_REMOTE I would have a matching configuration.&amp;nbsp; For the sack of this discussion, the VPN tunnel is up and active, showing good health.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;The ASA-LAN device is receiving a DHCP discovery packet destined for&amp;nbsp;255.255.255.255.udp67 from the DHCP client and is relaying&amp;nbsp;on the packet correctly out of the lan_outside interface with great success.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px"&gt;Note the packet being sent from ASA-LAN to ASA-WAN now&amp;nbsp;has a source address of 2.2.2.1.udp67, destined for 4.4.4.2.udp67, with option 82 set.&amp;nbsp; The ASA-WAN never sends&amp;nbsp;the udp packet over the VPN link but instead sends an unencrypted ICMP packet to 4.4.4.2!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px"&gt;I have noticed that if I configure DHCP relay on the ASA_WAN device, it expects the destination address to be 255.255.255.255.udp67 and not the DHCP server its self…&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px"&gt;Any ideas on what the correct configuration for the ASA_WAN device should be; could NAT be used here with a double relay, could this be a bug in the IOS?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px"&gt;You collective thoughts are most welcomed!&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 04:03:16 GMT</pubDate>
    <dc:creator>JamesVPN123</dc:creator>
    <dc:date>2019-03-12T04:03:16Z</dc:date>
    <item>
      <title>Cascaded Firewalls and DHCP relay...</title>
      <link>https://community.cisco.com/t5/network-security/cascaded-firewalls-and-dhcp-relay/m-p/2454336#M267674</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 12px"&gt;Hi All,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px"&gt;Have a challenge for you guys and gals.&amp;nbsp; I am trying to working out if the following is possible...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px"&gt;In detail, the exmaple below has a pair of ASAs that are cascaded at a remote site, say ASA_LAN and ASA_WAN.&amp;nbsp; Both would be in L3 routed mode (can't change to transparent mode) and am having a few issues with DHCP relaying across the units...&amp;nbsp; For once I have RTM for&amp;nbsp;the ASA IOS (9.1.3) on this topic, but have drawn a blank...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px"&gt;Example Scenario is as follows:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="DHCP Cascased ASA Example" class="image-style-none media-element file-default" data-file_info="%7B%22fid%22:%22971501%22,%22view_mode%22:%22default%22,%22fields%22:%7B%22format%22:%22default%22,%22field_file_image_alt_text%5Bund%5D%5B0%5D%5Bvalue%5D%22:%22DHCP%20Cascased%20ASA%20Example%22,%22field_file_image_title_text%5Bund%5D%5B0%5D%5Bvalue%5D%22:%22DHCP%20Cascased%20ASA%20Example%22,%22field_media_description%5Bund%5D%5B0%5D%5Bvalue%5D%22:%22DHCP%20Cascased%20ASA%20Example%22%7D,%22type%22:%22media%22%7D" height="219" src="https://community.cisco.com/legacyfs/online/media/asa_dhcp_question_0.png" title="DHCP Cascased ASA Example" typeof="foaf:Image" width="405" /&gt;&lt;!--MEDIA-WRAPPER-END-2--&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px"&gt;In this example there is a Site-to-Site VPN tunnel between ASA-WAN and ASA-REMOTE, as shown above.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px"&gt;On ASA_LAN I have the following configuration snippet:&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 36pt"&gt;&lt;CODE&gt;&lt;SPAN style="font-size: 12px"&gt;interface gi0/0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; nameif lan_outside&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip address 2.2.2.1 255.255.255.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; security-level 0&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/P&gt;&lt;P style="margin-left: 36pt"&gt;&lt;CODE&gt;&lt;SPAN style="font-size: 12px"&gt;interface gi0/1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; nameif lan_inside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip address 1.1.1.2 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; security-level 99&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/P&gt;&lt;P style="margin-left: 36pt"&gt;&lt;CODE&gt;&lt;SPAN style="font-size: 12px"&gt;dhcprelay server 4.4.4.2 lan_outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;dhcprelay enable lan_inside&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px"&gt;On the ASA_WAN I have the following configuration snippet:&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 36pt"&gt;&lt;CODE&gt;&lt;SPAN style="font-size: 12px"&gt;interface gi0/0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; nameif wan_outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip address 3.3.3.1 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; security-level 0&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/P&gt;&lt;P style="margin-left: 36pt"&gt;&lt;CODE&gt;&lt;SPAN style="font-size: 12px"&gt;interface gi0/1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; nameif wan_inside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip address 2.2.2.2 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; security-level 99&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/P&gt;&lt;P style="margin-left: 36pt"&gt;&lt;CODE&gt;&lt;SPAN style="font-size: 12px"&gt;access-list inside_outside extended permit udp host 2.2.2.1 host 4.4.4.2 eq bootps log&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;access-list inside_outside extended permit icmp host 2.2.2.1 host 4.4.4.2 log&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;access-list inside_outside extended deny ip any any log&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;access-group inside_outside in interface wan_inside&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/P&gt;&lt;P style="margin-left: 36pt"&gt;&lt;CODE&gt;&lt;SPAN style="font-size: 12px"&gt;access-list outside_ inside extended permit udp host 4.4.4.2 host 2.2.2.1 eq bootps log&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;access-list outside_ inside extended permit icmp host 4.4.4.2 host 2.2.2.1 log&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;access-list outside_ inside extended deny ip any any log&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;access-group outside_inside in interface wan_outside&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/P&gt;&lt;P style="margin-left: 36pt"&gt;&lt;CODE&gt;&lt;SPAN style="font-size: 12px"&gt;access-list enc_to_remote extended permit ip 1.1.1.0 255.255.255.0 4.4.4.0 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;crypto map std_enc 1 match address enc_to_remote&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;crypto map std_enc 1 set peer 3.3.3.2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;crypto map std_enc 1 set ikev2 ipsec-proposal std_enc_pol&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;crypto ikev2 enable wan_outside&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px"&gt;On ASA_REMOTE I would have a matching configuration.&amp;nbsp; For the sack of this discussion, the VPN tunnel is up and active, showing good health.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px"&gt;The ASA-LAN device is receiving a DHCP discovery packet destined for&amp;nbsp;255.255.255.255.udp67 from the DHCP client and is relaying&amp;nbsp;on the packet correctly out of the lan_outside interface with great success.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px"&gt;Note the packet being sent from ASA-LAN to ASA-WAN now&amp;nbsp;has a source address of 2.2.2.1.udp67, destined for 4.4.4.2.udp67, with option 82 set.&amp;nbsp; The ASA-WAN never sends&amp;nbsp;the udp packet over the VPN link but instead sends an unencrypted ICMP packet to 4.4.4.2!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px"&gt;I have noticed that if I configure DHCP relay on the ASA_WAN device, it expects the destination address to be 255.255.255.255.udp67 and not the DHCP server its self…&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px"&gt;Any ideas on what the correct configuration for the ASA_WAN device should be; could NAT be used here with a double relay, could this be a bug in the IOS?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px"&gt;You collective thoughts are most welcomed!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:03:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cascaded-firewalls-and-dhcp-relay/m-p/2454336#M267674</guid>
      <dc:creator>JamesVPN123</dc:creator>
      <dc:date>2019-03-12T04:03:16Z</dc:date>
    </item>
    <item>
      <title>access-list enc_to_remote</title>
      <link>https://community.cisco.com/t5/network-security/cascaded-firewalls-and-dhcp-relay/m-p/2454337#M267675</link>
      <description>&lt;P&gt;&lt;CODE&gt;&lt;SPAN style="font-size:12px"&gt;access-list enc_to_remote extended permit ip 1.1.1.0 255.255.255.0 4.4.4.0 255.255.255.0&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px"&gt;Well, you mention that once the packet leave ASA-LAN destined for ASA-WAN the source address is 2.2.2.1 udp67.&amp;nbsp; You cryptomap is only looking for a source address of 1.1.1.x .&amp;nbsp; Amend the crypto ACL to include the source of 2.2.2.1 and a destination of 4.4.4.2, and remember to adjust the remote end also, and then test to see if you can get an IP address from the DHCP server.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px"&gt;--&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px"&gt;Please remember to rate and select a correct answer&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Apr 2014 10:13:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cascaded-firewalls-and-dhcp-relay/m-p/2454337#M267675</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-04-10T10:13:15Z</dc:date>
    </item>
  </channel>
</rss>

