<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: global (outside) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/global-outside/m-p/2296054#M343116</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you so so much&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 12 Sep 2013 12:21:28 GMT</pubDate>
    <dc:creator>alan-wong</dc:creator>
    <dc:date>2013-09-12T12:21:28Z</dc:date>
    <item>
      <title>global (outside)</title>
      <link>https://community.cisco.com/t5/network-security/global-outside/m-p/2296048#M343110</link>
      <description>&lt;P&gt;Hi. my company running ASA with inside and outside interface.&amp;nbsp; Example below.&amp;nbsp; Could you tell me why there are two difference global (outside) pool.&amp;nbsp; However. the global (outside) 2 123.123.123.123 does not have IP address in interface and this subnet does not have ip route to outside.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) How does it works without physical interface using on 123.123.123.123 subnet ?&lt;/P&gt;&lt;P&gt;2) How does it receive outside to inside PAT traffic without phsyical inteface using?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5)&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 111.111.111.111 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;global (outside) 1 111.111.111.222 netmask 255.255.255.255&lt;BR /&gt;global (outside) 2 123.123.123.123 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 111.111.111.1 1&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:37:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-outside/m-p/2296048#M343110</guid>
      <dc:creator>alan-wong</dc:creator>
      <dc:date>2019-03-12T02:37:30Z</dc:date>
    </item>
    <item>
      <title>global (outside)</title>
      <link>https://community.cisco.com/t5/network-security/global-outside/m-p/2296049#M343111</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration can be valid.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA can only have a single IP address/subnet configured directly on its interface. This however doesnt prevent you from using multiple different subnets on the interface with NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the second subnet/address to work properly either of the 2 must be true about the ISP Router/Gateway in front of the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;It must have the second subnet configured directly under its interface connecting to the ASA as a &lt;STRONG&gt;"secondary"&lt;/STRONG&gt; address range (something that is not possible in the ASA interface configuration mode as we noticed). In this setup the ISP Router/Gateway will ARP for the MAC address of the second subnet/address and the ASA will reply with its interface MAC address and this enables the traffic to be forwarded correctly.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; OR&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The ISP Router/Gateway must have a route for the second subnet/address and the next hop must be the interface IP address of the ASA. In this situation the ISP Router/Gateway WONT ARP for the MAC address since the second subnet/address is not directly connected from the ISP Router/Gateways perspective. It will therefore forward any traffic destined to the second subnet/address to the ASA using the ASA interface IP address as the next hop.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With either of the above mentioned ways, it will work just fine. The first option might require some additional configurations on some newer software levels but your seem to be the older version so there is no problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You wont need any additional&lt;STRONG&gt; "route" &lt;/STRONG&gt;configuration. Your current default route configuration will handle everything that is needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Sep 2013 09:39:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-outside/m-p/2296049#M343111</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-09-12T09:39:53Z</dc:date>
    </item>
    <item>
      <title>Re: global (outside)</title>
      <link>https://community.cisco.com/t5/network-security/global-outside/m-p/2296050#M343112</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;But how come 123.123.123.123 can also be reach by 111.111.111.111 interface. I do not quite understand it? Please help.&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Sep 2013 11:30:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-outside/m-p/2296050#M343112</guid>
      <dc:creator>alan-wong</dc:creator>
      <dc:date>2013-09-12T11:30:54Z</dc:date>
    </item>
    <item>
      <title>global (outside)</title>
      <link>https://community.cisco.com/t5/network-security/global-outside/m-p/2296051#M343113</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just explained it in the above reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mentioned the 2 ways your above mentioned ASA configuration could have been handled from the ISP side and still work normally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your above configurations is very typical in situations where a company has several public subnets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ISP side might be configured like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Example 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet1/1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; description CUSTOMER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip address 111.111.111.1 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip address 123.123.123.1 255.255.255.0 secondary&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OR&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Example 2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet1/1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; description CUSTOMER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip address 111.111.111.1 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip route 123.123.123.0 255.255.255.0 111.111.111.111&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unline in the above first example where ISP gateway interface has 2 networks/subnet configured on it, this is not possible on the ASA. In the ASAs case the WAN interface holds one subnet and rest of the subnets are only present in the NAT configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So when we look at the 2 ISP configurations above the following would happen in them&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Example 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Packet arrives on the ISP gateway with destination IP address 123.123.123.123&lt;/LI&gt;&lt;LI&gt;ISP gateway sees that its part of a directly connected network in its GigabitEthernet1/1 interface&lt;/LI&gt;&lt;LI&gt;Because the destination IP address is part of a directly connected network the ISP gateway will next try to determine the MAC address of the device that owns the IP address 123.123.123.123&lt;/LI&gt;&lt;LI&gt;ISP Gateway sends an ARP Request and the ASA replys to this ARP request with its own WAN interfaces MAC address.&lt;/LI&gt;&lt;LI&gt;ISP gateway forwards the packet to the ASA&lt;/LI&gt;&lt;LI&gt;ASA has a NAT configurations for this IP 123.123.123.123 and an existing Dynamic PAT translation using the IP address 123.123.123.123 and therefore lets the packet pass to the actual hosts on the internal network.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Example 2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Packet arrives on the ISP gateway with destination IP address 123.123.123.123&lt;/LI&gt;&lt;LI&gt;ISP gateway sees that it has a routing table entry for the network 123.123.123.0/24 and its pointing to the next hop IP address of 111.111.111.111, therefore ISP gateway has to forward the packet destined to 123.123.123.123 to the next hop IP address of 111.111.111.111&lt;/LI&gt;&lt;LI&gt;The IP address 111.111.111.111 is part of a directly connected network to the ISP gateway&lt;/LI&gt;&lt;LI&gt;Because&amp;nbsp; the destination IP address is part of a directly connected network the&amp;nbsp; ISP gateway will next try to determine the MAC address of the device&amp;nbsp; that owns the IP address 111.111.111.111&lt;/LI&gt;&lt;LI&gt;ISP Gateway sends an ARP Request and the ASA replys to this ARP request with its own WAN interfaces MAC address.&lt;/LI&gt;&lt;LI&gt;ISP gateway forwards the packet to the ASA&lt;/LI&gt;&lt;LI&gt;ASA&amp;nbsp; has a NAT configurations for this IP 123.123.123.123 and an existing&amp;nbsp; Dynamic PAT translation using the IP address 123.123.123.123 and&amp;nbsp; therefore lets the packet pass to the actual hosts on the internal&amp;nbsp; network.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Sep 2013 11:44:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-outside/m-p/2296051#M343113</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-09-12T11:44:32Z</dc:date>
    </item>
    <item>
      <title>Re: global (outside)</title>
      <link>https://community.cisco.com/t5/network-security/global-outside/m-p/2296052#M343114</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thx. That means all 111.111.111.111 and 123.123.123.123 routing is take care by ISP. I just apply global (outside) 2 123.123.123.123 can also accept from 111.111.111.111 interface. Am I correct?&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Sep 2013 12:09:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-outside/m-p/2296052#M343114</guid>
      <dc:creator>alan-wong</dc:creator>
      <dc:date>2013-09-12T12:09:56Z</dc:date>
    </item>
    <item>
      <title>global (outside)</title>
      <link>https://community.cisco.com/t5/network-security/global-outside/m-p/2296053#M343115</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Provided that the ISP has handles its part correctly with regards to their gateway configurations you should be able to use your original posts configurations just fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could even have a third or fourth subnets (or whatever amount you want) NAT configurations on the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface and they would work just as long as the ISP gateway would be configured correctly to forward the traffic (and naturally you would have to make sure you have configured the NAT properly)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could for example have these configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (outside) 1 111.111.111.222 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (outside) 2 123.123.123.123 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 1 10.10.10.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 2 10.10.20.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above configurations would basically mean that hosts in network 10.10.10.0/24 would have Dynamic PAT translation using IP address 111.111.111.222 towards any network behind &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface and hosts in network 10.10.20.0/24 would have Dynamic PAT translation using IP address 123.123.123.123 towards any network behind &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Sep 2013 12:15:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-outside/m-p/2296053#M343115</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-09-12T12:15:04Z</dc:date>
    </item>
    <item>
      <title>Re: global (outside)</title>
      <link>https://community.cisco.com/t5/network-security/global-outside/m-p/2296054#M343116</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you so so much&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Sep 2013 12:21:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-outside/m-p/2296054#M343116</guid>
      <dc:creator>alan-wong</dc:creator>
      <dc:date>2013-09-12T12:21:28Z</dc:date>
    </item>
    <item>
      <title>Re: global (outside)</title>
      <link>https://community.cisco.com/t5/network-security/global-outside/m-p/2296055#M343117</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;May I know why need Tcp and UDP max connection to the local host like below example?&lt;BR /&gt;&lt;BR /&gt;nat (inside) 1 access-list NET1 tcp 0 2000 udp 10000&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Sep 2013 13:02:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-outside/m-p/2296055#M343117</guid>
      <dc:creator>alan-wong</dc:creator>
      <dc:date>2013-09-12T13:02:49Z</dc:date>
    </item>
  </channel>
</rss>

