<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic 2 firewalls connected to the vlan in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/2-firewalls-connected-to-the-vlan/m-p/2486470#M269368</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What version are you using on the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;8.3 + no problem&lt;/P&gt;&lt;P&gt;8.2 - not possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 10.1.1.10 172.16.1.10&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 10.2.2.10 172.16.1.10&lt;/P&gt;&lt;P&gt;ERROR: duplicate of existing static&lt;/P&gt;&lt;P&gt;&amp;nbsp; inside:172.16.1.10 to outside:10.1.1.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Felipe.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to rate useful posts. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 19 Feb 2014 01:12:16 GMT</pubDate>
    <dc:creator>lcambron</dc:creator>
    <dc:date>2014-02-19T01:12:16Z</dc:date>
    <item>
      <title>2 firewalls connected to the vlan</title>
      <link>https://community.cisco.com/t5/network-security/2-firewalls-connected-to-the-vlan/m-p/2486469#M269366</link>
      <description>&lt;P&gt;We are in process of migrating to different ISP thus we have to change the Public IP Addresses.&lt;/P&gt;&lt;P&gt;I have no issue changing inside and outside ip address but the servers in the DMZ are the issue.&lt;/P&gt;&lt;P&gt;We want clients access the DMZ servers from new and current ISP than turn the current one off after about a month or so.&lt;/P&gt;&lt;P&gt;My idea is assign new IP address for inside and outside interfaces and connect the DMZ in to the existing DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;current FW:&lt;/P&gt;&lt;P&gt;inside: 192.168.1.1/24: vlan 192&lt;/P&gt;&lt;P&gt;outside: 10.1.1.1/24: vlan 10&lt;/P&gt;&lt;P&gt;dmz: 172.16.1.1./24: vlan 172 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;new FW:&lt;/P&gt;&lt;P&gt;inside: 192.168.20.1/24: vlan 168&lt;/P&gt;&lt;P&gt;outside: 10.2.2.2/24: vlan 20&lt;/P&gt;&lt;P&gt;dmz: 172.16.1.2/24 vlan 172&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;do you see any issue configuring FW like this?&amp;nbsp; ACL and NAT rule will be simlar where outside clients will be reaching the same DMZ servers using different outisde IP addresses.&amp;nbsp; I have ASA5520&lt;/P&gt;&lt;P&gt;ie)&lt;/P&gt;&lt;P&gt;10.1.1.10 -&amp;gt; 172.16.1.10&lt;/P&gt;&lt;P&gt;10.2.2.10 -&amp;gt; 172.16.1.10&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:47:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-firewalls-connected-to-the-vlan/m-p/2486469#M269366</guid>
      <dc:creator>vatter</dc:creator>
      <dc:date>2019-03-12T03:47:07Z</dc:date>
    </item>
    <item>
      <title>2 firewalls connected to the vlan</title>
      <link>https://community.cisco.com/t5/network-security/2-firewalls-connected-to-the-vlan/m-p/2486470#M269368</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What version are you using on the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;8.3 + no problem&lt;/P&gt;&lt;P&gt;8.2 - not possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 10.1.1.10 172.16.1.10&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 10.2.2.10 172.16.1.10&lt;/P&gt;&lt;P&gt;ERROR: duplicate of existing static&lt;/P&gt;&lt;P&gt;&amp;nbsp; inside:172.16.1.10 to outside:10.1.1.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Felipe.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to rate useful posts. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Feb 2014 01:12:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-firewalls-connected-to-the-vlan/m-p/2486470#M269368</guid>
      <dc:creator>lcambron</dc:creator>
      <dc:date>2014-02-19T01:12:16Z</dc:date>
    </item>
    <item>
      <title>2 firewalls connected to the vlan</title>
      <link>https://community.cisco.com/t5/network-security/2-firewalls-connected-to-the-vlan/m-p/2486471#M269370</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; i am running 8.45&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Feb 2014 02:29:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-firewalls-connected-to-the-vlan/m-p/2486471#M269370</guid>
      <dc:creator>vatter</dc:creator>
      <dc:date>2014-02-19T02:29:47Z</dc:date>
    </item>
    <item>
      <title>2 firewalls connected to the vlan</title>
      <link>https://community.cisco.com/t5/network-security/2-firewalls-connected-to-the-vlan/m-p/2486472#M269371</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Then it should be fine. You will need to have both ranges of IPs on the outside at the same time and make sure you have the command: &lt;/P&gt;&lt;P&gt;arp permit-nonconnected&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Felipe.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to rate useful posts. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Feb 2014 02:32:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-firewalls-connected-to-the-vlan/m-p/2486472#M269371</guid>
      <dc:creator>lcambron</dc:creator>
      <dc:date>2014-02-19T02:32:49Z</dc:date>
    </item>
    <item>
      <title>2 firewalls connected to the vlan</title>
      <link>https://community.cisco.com/t5/network-security/2-firewalls-connected-to-the-vlan/m-p/2486473#M269374</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; what will happen if i don't have the command ?&lt;/P&gt;&lt;P&gt;arp permit-nonconnected&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Feb 2014 02:42:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-firewalls-connected-to-the-vlan/m-p/2486473#M269374</guid>
      <dc:creator>vatter</dc:creator>
      <dc:date>2014-02-19T02:42:11Z</dc:date>
    </item>
    <item>
      <title>2 firewalls connected to the vlan</title>
      <link>https://community.cisco.com/t5/network-security/2-firewalls-connected-to-the-vlan/m-p/2486474#M269376</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you have two networks on the outside, you need the command for the ASA to respond to arp requests:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/c/en/us/td/docs/security/asa/command-reference/cmdref/a3.html#pgfId-1837762"&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/command-reference/cmdref/a3.html#pgfId-1837762&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Cisco Worldwide Contact link:&amp;nbsp; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html"&gt;http://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Felipe.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to rate useful posts. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Feb 2014 03:31:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-firewalls-connected-to-the-vlan/m-p/2486474#M269376</guid>
      <dc:creator>lcambron</dc:creator>
      <dc:date>2014-02-19T03:31:16Z</dc:date>
    </item>
  </channel>
</rss>

