<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IP Sec tunnel to a firewall in DMZ of another firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ip-sec-tunnel-to-a-firewall-in-dmz-of-another-firewall/m-p/2482931#M269934</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are they allocating a public IP address directly to your ASA5505 firewall or is this done through Static NAT on their ASA5510 firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Either way you should be able to configure a L2L VPN from this ASA to another VPN device on some remote location.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If they are allocating your ASA a public IP address directly that you will be configuring in its interface then I would imagine the main things you would need to make sure is that the ASA5510 firewall admins allow UDP/500 and ESP through their firewall to the public IP address of your ASA5505. I presume they would not be doing any NAT for this IP address and would either be doing NAT0 or Static Identity NAT for your public IP address. (so it passes without NAT through their firewall)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If they are doing Static NAT on the ASA5510 I think they would also have to allow UDP/4500 through their firewall to your ASA5505 public IP address. In this case you might also need NAT Traversal configurations on the VPN devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 10 Feb 2014 13:00:43 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2014-02-10T13:00:43Z</dc:date>
    <item>
      <title>IP Sec tunnel to a firewall in DMZ of another firewall</title>
      <link>https://community.cisco.com/t5/network-security/ip-sec-tunnel-to-a-firewall-in-dmz-of-another-firewall/m-p/2482930#M269932</link>
      <description>&lt;P style="margin: 0cm; margin-bottom: .0001pt;"&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;We will share the Internet line with the building management. Building management have Cisco firewall 5510 and we will connect our Cisco firewall 5505 to the Building management firewall DMZ port. We have been given one public IP address to assign to our firewall. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;My question is can we configure IPsec site-2-site VPN tunnel on our firewall to another site although this firewall is connecting to building management firewall DMZ port.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;Thanks for your help.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;Sethi&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:43:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-sec-tunnel-to-a-firewall-in-dmz-of-another-firewall/m-p/2482930#M269932</guid>
      <dc:creator>mazars-cisco</dc:creator>
      <dc:date>2019-03-12T03:43:32Z</dc:date>
    </item>
    <item>
      <title>Re: IP Sec tunnel to a firewall in DMZ of another firewall</title>
      <link>https://community.cisco.com/t5/network-security/ip-sec-tunnel-to-a-firewall-in-dmz-of-another-firewall/m-p/2482931#M269934</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are they allocating a public IP address directly to your ASA5505 firewall or is this done through Static NAT on their ASA5510 firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Either way you should be able to configure a L2L VPN from this ASA to another VPN device on some remote location.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If they are allocating your ASA a public IP address directly that you will be configuring in its interface then I would imagine the main things you would need to make sure is that the ASA5510 firewall admins allow UDP/500 and ESP through their firewall to the public IP address of your ASA5505. I presume they would not be doing any NAT for this IP address and would either be doing NAT0 or Static Identity NAT for your public IP address. (so it passes without NAT through their firewall)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If they are doing Static NAT on the ASA5510 I think they would also have to allow UDP/4500 through their firewall to your ASA5505 public IP address. In this case you might also need NAT Traversal configurations on the VPN devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Feb 2014 13:00:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-sec-tunnel-to-a-firewall-in-dmz-of-another-firewall/m-p/2482931#M269934</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-02-10T13:00:43Z</dc:date>
    </item>
    <item>
      <title>IP Sec tunnel to a firewall in DMZ of another firewall</title>
      <link>https://community.cisco.com/t5/network-security/ip-sec-tunnel-to-a-firewall-in-dmz-of-another-firewall/m-p/2482932#M269937</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes,&amp;nbsp; but port 500 and 4500 have to be allowed through the managment firewall for this to work.&amp;nbsp; So make sure that they have an access list that permits those ports (if they haven't already allowed all traffic through that is.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Feb 2014 13:02:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-sec-tunnel-to-a-firewall-in-dmz-of-another-firewall/m-p/2482932#M269937</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-02-10T13:02:06Z</dc:date>
    </item>
    <item>
      <title>IP Sec tunnel to a firewall in DMZ of another firewall</title>
      <link>https://community.cisco.com/t5/network-security/ip-sec-tunnel-to-a-firewall-in-dmz-of-another-firewall/m-p/2482933#M269938</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Guys for your help and feedback. I will implement this in few weeks time and will let you know. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Feb 2014 13:11:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-sec-tunnel-to-a-firewall-in-dmz-of-another-firewall/m-p/2482933#M269938</guid>
      <dc:creator>mazars-cisco</dc:creator>
      <dc:date>2014-02-10T13:11:19Z</dc:date>
    </item>
  </channel>
</rss>

