<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PIX, AT&amp;T U-Verse and static IP block problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-at-t-u-verse-and-static-ip-block-problem/m-p/2275083#M347145</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would seem to me that there is no way to handle this with your PIX firewall. Atleast I cant think of anything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The solution I can think of are related to ASA firewall is not very suggestable one anyway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One solution with ASA would be to run it in multiple context mode which lets you share the same "outside" interface for each virtual firewall (Security Context) and therefore use public IP address from the same subnet on several virtual firewalls. This will also give you the freedom to manually set the mac address of the "outside" interface in each Security Context and therefore matching the ISP requirements.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But as I said there are several problems with the above setup. For one you probably are not looking into separating your LAN network to multiple different segments (which virtualizing the hardware to mutiple logical firewalls would do) so its not very good idea. Not to mention what the license cost might be just to get the supported Security Context amount (as its not supported by default) and then again you dont have an ASA at the moment ofcourse &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There seems to be no way to configure the ASA so that it would actually reply to ARP requests with another MAC address other than the one configured on its interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am too unfamiliar with Cisco IOS at the moment to tell you straight away if this was possible on a router. But the first place to look would probably be some Command Reference that Cisco has for all or most of its devices. I checked the ASA/PIX ones and the ARP configurations didnt seem to give options to do this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With relation to the HSRP again, I am not that familiar with all the possibilities of Cisco IOS. I do seem to recal that the router generates the MAC address of the virtual IP address by using the HSRP group number that you use. Wether this could be used to accomplish what you want I am not sure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do have a few Cisco routers (1841 and 881) at home. Maybe I'll have a look at them later today and see if this could be done on them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 03 Jul 2013 13:44:32 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-07-03T13:44:32Z</dc:date>
    <item>
      <title>PIX, AT&amp;T U-Verse and static IP block problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-at-t-u-verse-and-static-ip-block-problem/m-p/2275081#M347143</link>
      <description>&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I currently have a PIX 525 and have recently upgraded to AT&amp;amp;T U-Verse service. I have a static IP block and am having routing issues with the 2wire gateway that AT&amp;amp;T provides. After a lot of reading and calls to technical support, it seems that the problems that I am having are because the U-Verse gateway doesn't support bridged ethernet mode so I am unable to assign my static IP block to the PIX. Apparently, the 2wire gateway allows only 1 IP address per MAC address. A more detailed explanation of this problem can be found here...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://forums.att.com/t5/Features-and-How-To/How-to-fake-bridged-mode-with-U-Verse/m-p/2859191" target="_blank"&gt;http://forums.att.com/t5/Features-and-How-To/How-to-fake-bridged-mode-with-U-Verse/m-p/2859191&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is, can I use multiple outside interfaces on the PIX, one for each IP in the block or is there another way to work around this issue?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:06:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-at-t-u-verse-and-static-ip-block-problem/m-p/2275081#M347143</guid>
      <dc:creator>Chris Mickle</dc:creator>
      <dc:date>2019-03-12T02:06:23Z</dc:date>
    </item>
    <item>
      <title>PIX, AT&amp;T U-Verse and static IP block problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-at-t-u-verse-and-static-ip-block-problem/m-p/2275082#M347144</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Ok, I did some testing on using multiple interfaces connected to the 2wire gateway. As it turns out, I can't just use one interface on the PIX for each IP address in my static block because each IP is in the same block and I get an IP address conflict message when trying to set the IP address of the other interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I could really use some assistance with this if anyone has an idea on how to work around this crappy 2wire gateway's limitations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The bottom line is, I need to have one MAC address per IP address in the block.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any way to use VLANs to accomplish this or am I going to have the same problem with conflicting addresses?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The forum post listed above mentions using HSRP to create multiple virtual MAC addresses to get around this problem. Does the PIX support this functionality, or do I need another router? If so, what router?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Jul 2013 12:50:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-at-t-u-verse-and-static-ip-block-problem/m-p/2275082#M347144</guid>
      <dc:creator>Chris Mickle</dc:creator>
      <dc:date>2013-07-03T12:50:55Z</dc:date>
    </item>
    <item>
      <title>PIX, AT&amp;T U-Verse and static IP block problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-at-t-u-verse-and-static-ip-block-problem/m-p/2275083#M347145</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would seem to me that there is no way to handle this with your PIX firewall. Atleast I cant think of anything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The solution I can think of are related to ASA firewall is not very suggestable one anyway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One solution with ASA would be to run it in multiple context mode which lets you share the same "outside" interface for each virtual firewall (Security Context) and therefore use public IP address from the same subnet on several virtual firewalls. This will also give you the freedom to manually set the mac address of the "outside" interface in each Security Context and therefore matching the ISP requirements.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But as I said there are several problems with the above setup. For one you probably are not looking into separating your LAN network to multiple different segments (which virtualizing the hardware to mutiple logical firewalls would do) so its not very good idea. Not to mention what the license cost might be just to get the supported Security Context amount (as its not supported by default) and then again you dont have an ASA at the moment ofcourse &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There seems to be no way to configure the ASA so that it would actually reply to ARP requests with another MAC address other than the one configured on its interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am too unfamiliar with Cisco IOS at the moment to tell you straight away if this was possible on a router. But the first place to look would probably be some Command Reference that Cisco has for all or most of its devices. I checked the ASA/PIX ones and the ARP configurations didnt seem to give options to do this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With relation to the HSRP again, I am not that familiar with all the possibilities of Cisco IOS. I do seem to recal that the router generates the MAC address of the virtual IP address by using the HSRP group number that you use. Wether this could be used to accomplish what you want I am not sure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do have a few Cisco routers (1841 and 881) at home. Maybe I'll have a look at them later today and see if this could be done on them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Jul 2013 13:44:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-at-t-u-verse-and-static-ip-block-problem/m-p/2275083#M347145</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-03T13:44:32Z</dc:date>
    </item>
    <item>
      <title>PIX, AT&amp;T U-Verse and static IP block problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-at-t-u-verse-and-static-ip-block-problem/m-p/2275084#M347146</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks for the response!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The PIX 525 has the capability to run 2 security contexts. Not enough to accomplish what I need of course, but it is theoretically possible I guess. Segmenting my LAN is not an issue because it is already segmented. I am (or rather was) NATing each IP in my static block to a different physical inside interface so if the PIX had more security contexts available, this would be a great solution.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In refferance to the link I posted and the section that gives an example of a workaround using HSRP, I have started to play around a little with that using GNS3. I have run into a little snafu though that maybe someone could help me with...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the example config that was posted above, they use the router to do the NAT xlates. Is it possible for me to use the router to simply interface with AT&amp;amp;T's crappy RG and let the PIX handle the internal routing as before? I guess the way to do it would be to set up a static route for each one of the virtual IPs that was created using HSRP that would route all the traffic to another /29 address on the inside that the PIX could then be assigned on it's outside interface? Admittedly, this is a little over my head so forgive me if I sound like a doofus. I can post configs or any other information that would be necessary to help me with this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Jul 2013 14:25:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-at-t-u-verse-and-static-ip-block-problem/m-p/2275084#M347146</guid>
      <dc:creator>Chris Mickle</dc:creator>
      <dc:date>2013-07-04T14:25:09Z</dc:date>
    </item>
    <item>
      <title>PIX, AT&amp;T U-Verse and static IP block problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-at-t-u-verse-and-static-ip-block-problem/m-p/2275085#M347147</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I havent had time to check with my own routers yet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also managed to completely miss your link for some reason &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would seem to me if I understood correctly that you could actually use the Router in front of PIX to do NAT for the Internet connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX could then essentially be used so that it wouldnt have any NAT between interfaces either. So the only place where NAT would be performed is the Router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I personally like to have the firewall at the edge of the network but in your situation it does seem a bit hard to achieve.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you use the Router in front of the PIX, this is how I imagine the setup would be (wihtout knowing the actual setup at the moment)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Router has WAN interface which is configured with HSRP and all the virtual IP/MAC pairs which are needed for your NAT purposes&lt;/LI&gt;&lt;LI&gt;Router is configured with default Dynamic PAT rule (and any additional PAT rules) for the actual real LAN/DMZ networks behind the PIX&lt;/LI&gt;&lt;LI&gt;Router has the default route towards the ISP and static routes for all the LAN/DMZ networks towards the PIX "outside" interface which can be changed to a private subnet that only acts as a link network between the router and the PIX&lt;/LI&gt;&lt;LI&gt;PIX will be configured (probably depending on software level) without any NAT. I am abit rusty on the old PIX firewall (for example I had forgotten that PIX actually supported Multiple Context as I have never used PIX in that way). You either have to disable "nat-control" and have no NAT configurations on the PIX or configure NAT0 for all the traffic through the PIX.&lt;/LI&gt;&lt;LI&gt;PIX will have a default route towards the Router&lt;/LI&gt;&lt;LI&gt;PIX would still be able to control traffic entering through the WAN Router but naturally the destination IP address of the "outside" interface ACL would have changed to the real IP rather than the public IP address as the NAT is done in front of the PIX&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will try to test this today. Good thing I work for my own ISP so I will be able to confirm the multiple MAC addresses on my router WAN interface &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will let you know how it went.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helped &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Jul 2013 14:42:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-at-t-u-verse-and-static-ip-block-problem/m-p/2275085#M347147</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-04T14:42:36Z</dc:date>
    </item>
    <item>
      <title>PIX, AT&amp;T U-Verse and static IP block problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-at-t-u-verse-and-static-ip-block-problem/m-p/2275086#M347148</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; This is what I had in mind actually. One of the posters on that thread suggests the following....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; ---&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I must point out that the end setup is still not quite like it should be -- which would be to insert a static route into the RG and actually run the static IPs behind the Cisco.&amp;nbsp; This method requires the 1-to-1 static NAT configuration on the Cisco, although in practice, that generally works perfectly for 99% of protocols, including esoteric setups like VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I understand this corectly, I could run the statics behind the router. Then I could still use the PIX for NAT as before.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does that sound like a viable option and if so, how would one go about it? I am a lot more farmiliar with PIX IOS than router IOS so maybe between the two of us, we could get it figured out. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Jul 2013 15:14:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-at-t-u-verse-and-static-ip-block-problem/m-p/2275086#M347148</guid>
      <dc:creator>Chris Mickle</dc:creator>
      <dc:date>2013-07-04T15:14:46Z</dc:date>
    </item>
    <item>
      <title>Re: PIX, AT&amp;T U-Verse and static IP block problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-at-t-u-verse-and-static-ip-block-problem/m-p/2275087#M347149</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did some simple test with my Cisco 1841 router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically my setup is&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Bridged ASDL modem&lt;/LI&gt;&lt;LI&gt;Switch (because router only has 2 ports which arent enough for my test setups)&lt;/LI&gt;&lt;LI&gt;Cisco Router 1841&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The WAN interface on the router is configure like this (changed IP/MAC configurations naturally)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface FastEthernet0/1.300&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; description ROUTER WAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; encapsulation dot1Q 300&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip address 1.1.1.250 255.255.255.248&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip access-group ROUTER-WAN-IN in&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip nat outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip virtual-reassembly&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; standby version 2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; standby 251 ip 1.1.1.251&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; standby 251 timers 254 255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; standby 251 preempt&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; standby 251 mac-address 0000.0000.000c&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; standby 252 ip 1.1.1.252&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; standby 252 timers 254 255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; standby 252 preempt&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; standby 252 mac-address 0000.0000.000d&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; standby 253 ip 1.1.1.253&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; standby 253 timers 254 255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; standby 253 preempt&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; standby 253 mac-address 0000.0000.000e&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip nat inside source static 10.0.0.100 1.1.1.251&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip nat inside source static 10.0.0.200 1.1.1.252&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;View from the ISP Core&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Internet&amp;nbsp; 1.1.1.252&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp; 0000.0000.000d&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; GigabitEthernetx/yy.1999&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Internet&amp;nbsp; 1.1.1.251&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp; 0000.0000.000c&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; GigabitEthernetx/yy.1999&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Internet&amp;nbsp; 1.1.1.253&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp; 0000.0000.000e&amp;nbsp; ARPA&amp;nbsp;&amp;nbsp; GigabitEthernetx/yy.1999&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also tested connectivity and it seems fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Jul 2013 15:47:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-at-t-u-verse-and-static-ip-block-problem/m-p/2275087#M347149</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-04T15:47:18Z</dc:date>
    </item>
    <item>
      <title>Re: PIX, AT&amp;T U-Verse and static IP block problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-at-t-u-verse-and-static-ip-block-problem/m-p/2275088#M347150</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not totally sure about the setup in the discussion you linked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I am totally mistaken the suggestiong was that the public subnet assigned to you would actually be routed towards the ISP device behind another device (Router) which in turn would have a direct link to the PIX which again would handle the NAT as usual towards the router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the setup would be&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;ISP Router with link network and default route towards ISP&lt;/LI&gt;&lt;LI&gt;ISP Router with link network to your Router and a static route for the public subnet towards the PIX&lt;/LI&gt;&lt;LI&gt;Your router with default route towards the ISP Router&lt;/LI&gt;&lt;LI&gt;Your router with a LAN interface configured with the public subnet that is directly connected to the PIX outside&lt;/LI&gt;&lt;LI&gt;Your PIX that is connected to the LAN interface of your Router&lt;/LI&gt;&lt;LI&gt;Your PIX with the NAT configured using the public subnet as usual&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess the key idea in the above would be to have the ISP Router route the public subnet further so the multiple public IP vs. single MAC address wouldnt be an issue. Because that ISP Router would forward the traffic to another router and would not ARP for the MAC address of the public IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again, as i said, I am not sure if I understood the situation correctly but the above is what I got by quickly browsing the texts. I have no idea what kind of device the ISP Router is. Seems it has severe limitations that you would take for granted in any other router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Jul 2013 16:00:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-at-t-u-verse-and-static-ip-block-problem/m-p/2275088#M347150</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-04T16:00:15Z</dc:date>
    </item>
    <item>
      <title>Re: PIX, AT&amp;T U-Verse and static IP block problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-at-t-u-verse-and-static-ip-block-problem/m-p/2275089#M347151</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes. That sounds like what I am trying to accomplish. Where I get hung up is how exactly to configure the router to route the traffic to the PIX and then NAT from there.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Could a double NAT be done were the router would NAT the public addresses to another /29 on the inside that could then be configured on the PIX outside interface and segmented from there?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Jul 2013 16:44:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-at-t-u-verse-and-static-ip-block-problem/m-p/2275089#M347151</guid>
      <dc:creator>Chris Mickle</dc:creator>
      <dc:date>2013-07-04T16:44:36Z</dc:date>
    </item>
    <item>
      <title>Re: PIX, AT&amp;T U-Verse and static IP block problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-at-t-u-verse-and-static-ip-block-problem/m-p/2275090#M347152</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well, if I have understood correctly the ISP has provided you with ISP Router which has the limitation that each public IP address used behind its LAN interface must have a different MAC address. And to avoid hitting this restrictions there have been 2 possinble solutions suggested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Option 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One would be to use a Cisco router which WAN interface towards the ISP Router would be using the HSRP configured virtual IP address along with MAC address to enable using different MAC addresses for each public IP addresses. It would also have the Static NAT statements configured directly on your Cisco Router while PIX wouldnt be doing any kind of NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Option 2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the above isnt possible I understood that another possibility would be to configure the actual ISP Router so that you configure a link network between it and the Cisco Router which could be any private network you want. You would then route the public subnet towards your Cisco Router IP address on the link subnet. Your Cisco Router would in turn have the public subnet configured on its LAN interface which is connected to the PIX. The PIX would then be configured like usual with Static NAT and Dynamic PAT and so on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your Cisco Router would not have any NAT configurations nor would be ISP Router. I presume the ISP has provided the ISP Router so that they have static routing only. In other words ISP routes the public subnet towards the ISP Routers WAN IP address. The ISP Router then would usually have the public subnet directly on its LAN interface. And naturally also a default route towards the ISP core.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Option 3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would might even be possible that the ISP Router would have a link network between it and the PIX directly. The ISP Router would then have a route for the public subnet 1.1.1.0/29 towards the PIX interface IP address. The idea here is basically that the ISP Router would not see the public subnet as directly connected so it wouldnt ARP for the MAC address either. Since it has a route it would simply route the traffic towards the PIX. Even though the PIX would have a private link network between it and the ISP Router it could still use NAT IP address which are not configured on any of its interfaces. This is quite normal especially when a user/customer has multiple public subnets on the edge of his/her Cisco firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a picture of what I presume the 3 setups would look like. Had to resort to an online site to draw this as I am not on my work computer. (Click to enlarge)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/8/0/5/144508-CSC-PIX.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So essentially&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Option 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;ISP Core has a route for public subnet 1.1.1.0/29 pointing towards ISP Router&lt;/LI&gt;&lt;LI&gt;ISP Router has the public subnet 1.1.1.0/29 directly connected to its LAN interface&lt;/LI&gt;&lt;LI&gt;Cisco Router is directly connected to the ISP Router with the 1.1.1.0/29 subnet&lt;/LI&gt;&lt;LI&gt;HSRP is used on the Cisco Router to overcome the limitation of ISP Router with regards to requiring unique MAC per IP address&lt;/LI&gt;&lt;LI&gt;Cisco Router does Static NAT between the 1.1.1.0/29 subnets public IP address and local IP address behind the PIX (whatever that local IP address might be)&lt;/LI&gt;&lt;LI&gt;Cisco Router and PIX will have a private link network between them and appropriate routes forwarding traffic correctly between them&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Option 2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;ISP Core has a route for public subnet 1.1.1.0/29 pointing towards ISP Router&lt;/LI&gt;&lt;LI&gt;ISP Router and Cisco Router will have a link network between them&lt;/LI&gt;&lt;LI&gt;ISP Router will route the public subnet 1.1.1.0/29 towards the Cisco Router&lt;/LI&gt;&lt;LI&gt;Cisco Router will have the public subnet 1.1.1.0/29 directly on its LAN interface&lt;/LI&gt;&lt;LI&gt;PIX will have the public subnet 1.1.1.0/29 directly on its WAN interface and NAT configured as usual&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Option 3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;ISP Core has a route for public subnet 1.1.1.0/29 pointing towards ISP Router&lt;/LI&gt;&lt;LI&gt;ISP Router and PIX will have a private subnet between them&lt;/LI&gt;&lt;LI&gt;ISP Router will have a route for the public subnet 1.1.1.0/29 pointing towards the PIX link network interface IP address&lt;/LI&gt;&lt;LI&gt;PIX will have Dynamic PAT and Static NAT statements using the public subnet 1.1.1.0/29 IP addresses directly.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do remember to mark a reply as the correct answer if it answered your question and/or rate helpfull answers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally ask more if needed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Jul 2013 17:28:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-at-t-u-verse-and-static-ip-block-problem/m-p/2275090#M347152</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-04T17:28:23Z</dc:date>
    </item>
    <item>
      <title>PIX, AT&amp;T U-Verse and static IP block problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-at-t-u-verse-and-static-ip-block-problem/m-p/2275091#M347153</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I played around with this a little this morning after taking some much needed time off this weekend.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I created the following environment in GNS3 and it seemed to work properly when I connected it to actual computers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/4/2/8/144824-config.jpeg.jpeg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;Here are the configs for both the router and the PIX...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;---- R1 -----&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;version 12.2&lt;/P&gt;&lt;P&gt;service timestamps debug uptime&lt;/P&gt;&lt;P&gt;service timestamps log uptime&lt;/P&gt;&lt;P&gt;no service password-encryption&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname R1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip subnet-zero&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no ip domain-lookup&lt;/P&gt;&lt;P&gt;ip domain-name lab.local&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;call rsvp-sync&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/0&lt;/P&gt;&lt;P&gt; ip address xxx.xxx.xxx.221 255.255.255.248&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt; standby timers 254 255&lt;/P&gt;&lt;P&gt; standby preempt&lt;/P&gt;&lt;P&gt; standby 1 ip xxx.xxx.xxx.217&lt;/P&gt;&lt;P&gt; standby 1 mac-address 0000.0000.1217&lt;/P&gt;&lt;P&gt; standby 2 ip xxx.xxx.xxx.218&lt;/P&gt;&lt;P&gt; standby 2 mac-address 0000.0000.1218&lt;/P&gt;&lt;P&gt; standby 3 ip xxx.xxx.xxx.219&lt;/P&gt;&lt;P&gt; standby 3 mac-address 0000.0000.1219&lt;/P&gt;&lt;P&gt; standby 4 ip xxx.xxx.xxx.220&lt;/P&gt;&lt;P&gt; standby 4 mac-address 0000.0000.1220&lt;/P&gt;&lt;P&gt; lan-name wan&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet1/0&lt;/P&gt;&lt;P&gt; ip address 10.0.0.6 255.255.255.248&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt; lan-name lan&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip default-gateway xxx.xxx.xxx.222&lt;/P&gt;&lt;P&gt;ip nat inside source list acl-inet interface FastEthernet0/0 overload&lt;/P&gt;&lt;P&gt;ip nat inside source static 10.0.0.1 xxx.xxx.xxx.217&lt;/P&gt;&lt;P&gt;ip nat inside source static 10.0.0.2 xxx.xxx.xxx.218&lt;/P&gt;&lt;P&gt;ip nat inside source static 10.0.0.3 xxx.xxx.xxx.219&lt;/P&gt;&lt;P&gt;ip nat inside source static 10.0.0.4 xxx.xxx.xxx.220&lt;/P&gt;&lt;P&gt;ip nat inside source static 10.0.0.5 xxx.xxx.xxx.221&lt;/P&gt;&lt;P&gt;ip classless&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 xxx.xxx.xxx.222&lt;/P&gt;&lt;P&gt;no ip http server&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip access-list standard acl-inet&lt;/P&gt;&lt;P&gt; permit 0.0.0.0 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dial-peer cor custom&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; exec-timeout 0 0&lt;/P&gt;&lt;P&gt; privilege level 15&lt;/P&gt;&lt;P&gt; logging synchronous&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt; exec-timeout 0 0&lt;/P&gt;&lt;P&gt; privilege level 15&lt;/P&gt;&lt;P&gt; logging synchronous&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; login&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;----- PIX -----&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pixfirewall# sh run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 8.0(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname pixfirewall&lt;/P&gt;&lt;P&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.0.0.1 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt; nameif domain&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet2&lt;/P&gt;&lt;P&gt; nameif ftp&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu domain 1500&lt;/P&gt;&lt;P&gt;mtu ftp 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;global (outside) 2 10.0.0.2&lt;/P&gt;&lt;P&gt;nat (domain) 1 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (ftp) 2 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 10.0.0.6 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;no crypto isakmp nat-traversal&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:75144c5d561af8bde29c401317e76ba2&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;pixfirewall#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is that it was almost too easy LOL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you look over the configs and give me your opinion?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jul 2013 15:14:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-at-t-u-verse-and-static-ip-block-problem/m-p/2275091#M347153</guid>
      <dc:creator>Chris Mickle</dc:creator>
      <dc:date>2013-07-08T15:14:48Z</dc:date>
    </item>
    <item>
      <title>Re: PIX, AT&amp;T U-Verse and static IP block problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-at-t-u-verse-and-static-ip-block-problem/m-p/2275092#M347154</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are going to use the HSRP configuration to give each public IP address their own MAC address then I dont see much point in doing extra NAT configurations on the PIX firewall itself. It will only add complexity to the setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you didnt configure any NAT configurations on the PIX then you could simply do NAT for the real IP addresses of the hosts directly on the router. Naturally you could still use ACLs on the PIX firewall to control which traffic can enter through the "outside" interface of the PIX. Naturally you would need such ACL on the routers interface facing Internet also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont know if I can comment much on the setup. If you are going to setup this on some production environment then I would suggest configuring the router with the mentioned ACLs and restricting management connections etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would imagine the same would apply to the firewall configurations. Naturally the firewall NAT configurations is something you can do either the way you mentioned above or you can remove the NAT configurations on the firewall and add the necesary routing on the Router and do all the LAN to WAN NATing on the router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to the routers Dynamic PAT configuration...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think you have misstyped the Dynamic PAT ACL on the router&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip access-list standard acl-inet&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; permit 0.0.0.0 255.255.255.248&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It should be&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip access-list standard acl-inet&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; permit 10.0.0.0 0.0.0.7&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Because we are using wildcard mask on the Cisco IOS while on Cisco firewalls we use the normal network mask.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have found any of the information helpfull so far, please do remember to rate the answers or mark any replys as correct if you have felt that they have answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jul 2013 15:37:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-at-t-u-verse-and-static-ip-block-problem/m-p/2275092#M347154</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-08T15:37:06Z</dc:date>
    </item>
    <item>
      <title>Re: PIX, AT&amp;T U-Verse and static IP block problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-at-t-u-verse-and-static-ip-block-problem/m-p/2275093#M347155</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok. I felt confident enough with my brief testing to go ahead and acquire a 2811 and try this on real hardware. I got the router last night and configured it. Everything seems to be working great! I fumbled a bit with the configuration of the new router. My PIX knowledge didn't completely translate into router IOS, but I think I have a good configuration. Here are the final configs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First, the AT&amp;amp;T RG...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(IP addresses have been erased for security)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This page allows you to configure your static block....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/7/3/3/145337-broadband-link%20config%20scrubbed.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This page is where your supposed to configure your LAN devices to use your static IPs...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/8/3/3/145338-lan-ip%20allocation%20scrubbed.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After configuring HSRP on FA0/0 on the 2811, I was able to configure each unique MAC address with an IP in the RG. Note that the last address (.221) is the actual interface FA0/0 on the 2811. The other 4 are the MACs setup with HSRP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now for the 2811 config...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;---------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Building configuration...&lt;/P&gt;&lt;P&gt;Current configuration : 1617 bytes&lt;BR /&gt;!&lt;BR /&gt;! NVRAM config last updated at 00:11:24 EDT Sat Jul 13 2013&lt;BR /&gt;!&lt;BR /&gt;version 12.4&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;no service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname R1&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;enable secret 5 xxxxxxxxxxxxxxxxxxxxxx&lt;BR /&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;!&lt;BR /&gt;resource policy&lt;BR /&gt;!&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;ip subnet-zero&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip cef&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip domain name xxxxxxx&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/0&lt;BR /&gt;ip address xxx.xxx.xxx.221 255.255.255.248&lt;BR /&gt;ip nat outside&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;standby timers 254 255&lt;BR /&gt;standby preempt&lt;BR /&gt;standby 1 ip xxx.xxx.xxx.217&lt;BR /&gt;standby 1 mac-address 0000.0000.0217&lt;BR /&gt;standby 2 ip xxx.xxx.xxx.218&lt;BR /&gt;standby 2 mac-address 0000.0000.0218&lt;BR /&gt;standby 3 ip xxx.xxx.xxx.219&lt;BR /&gt;standby 3 mac-address 0000.0000.0219&lt;BR /&gt;standby 4 ip xxx.xxx.xxx.220&lt;BR /&gt;standby 4 mac-address 0000.0000.0220&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1&lt;BR /&gt;ip address 10.0.0.6 255.255.255.248&lt;BR /&gt;ip nat inside&lt;BR /&gt;duplex full&lt;BR /&gt;speed auto&lt;BR /&gt;no mop enabled&lt;BR /&gt;!&lt;BR /&gt;ip default-gateway xxx.xxx.xxx.222&lt;BR /&gt;ip classless&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 xxx.xxx.xxx.222&lt;BR /&gt;!&lt;BR /&gt;no ip http server&lt;BR /&gt;ip nat inside source list acl-inet interface FastEthernet0/0 overload&lt;BR /&gt;ip nat inside source static 10.0.0.1 xxx.xxx.xxx.217&lt;BR /&gt;ip nat inside source static 10.0.0.2 xxx.xxx.xxx.218&lt;BR /&gt;ip nat inside source static 10.0.0.3 xxx.xxx.xxx.219&lt;BR /&gt;ip nat inside source static 10.0.0.4 xxx.xxx.xxx.220&lt;BR /&gt;ip nat inside source static 10.0.0.5 xxx.xxx.xxx.221&lt;BR /&gt;!&lt;BR /&gt;ip access-list standard acl-inet&lt;BR /&gt;permit 10.0.0.0 0.0.0.7&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;line aux 0&lt;BR /&gt;line vty 0 4&lt;BR /&gt;password xxxxxxxxxxxxxxxxxxxxx&lt;BR /&gt;login&lt;BR /&gt;!&lt;BR /&gt;scheduler allocate 20000 1000&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see, what I basically did was use NAT to translate my public IP block into another segmented /29 address. It should be more clear why I did this when you see the PIX config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX 525 Config....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 8.0(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname pixfirewall&lt;/P&gt;&lt;P&gt;enable password xxxxxxxxxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 10.0.0.1 255.255.255.248&lt;/P&gt;&lt;P&gt;ospf cost 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt;nameif domain&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ospf cost 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet2&lt;/P&gt;&lt;P&gt;nameif ftp&lt;/P&gt;&lt;P&gt;security-level 60&lt;/P&gt;&lt;P&gt;ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ospf cost 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet3&lt;/P&gt;&lt;P&gt;nameif vmhost&lt;/P&gt;&lt;P&gt;security-level 80&lt;/P&gt;&lt;P&gt;ip address 192.168.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ospf cost 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet4&lt;/P&gt;&lt;P&gt;nameif vm&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;ip address 192.168.3.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ospf cost 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet5&lt;/P&gt;&lt;P&gt;speed 10&lt;/P&gt;&lt;P&gt;nameif public&lt;/P&gt;&lt;P&gt;security-level 40&lt;/P&gt;&lt;P&gt;ip address 192.168.4.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd xxxxxxxxxxxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;time-range IPBlocked&lt;/P&gt;&lt;P&gt;absolute end 01:12 28 October 2010&lt;/P&gt;&lt;P&gt;periodic daily 0:00 to 23:59&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host 10.0.0.1 eq www&lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host 10.0.0.1 eq https&lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host 10.0.0.1 eq pop3&lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host 10.0.0.1 eq smtp&lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host 10.0.0.1 eq 587&lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host 10.0.0.1 eq 5000&lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host 10.0.0.2 eq www&lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host 10.0.0.2 eq ftp&lt;/P&gt;&lt;P&gt;access-list 301 extended permit ip 192.168.0.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 301 extended permit ip 192.168.0.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu domain 1500&lt;/P&gt;&lt;P&gt;mtu ftp 1500&lt;/P&gt;&lt;P&gt;mtu vmhost 1500&lt;/P&gt;&lt;P&gt;mtu vm 1500&lt;/P&gt;&lt;P&gt;mtu public 1500&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image flash:/asdm-602.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;global (outside) 2 10.0.0.2&lt;/P&gt;&lt;P&gt;global (outside) 3 10.0.0.3&lt;/P&gt;&lt;P&gt;global (outside) 4 10.0.0.4&lt;/P&gt;&lt;P&gt;global (outside) 5 10.0.0.5&lt;/P&gt;&lt;P&gt;nat (domain) 0 access-list 301&lt;/P&gt;&lt;P&gt;nat (domain) 1 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (ftp) 2 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (vmhost) 3 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (vm) 4 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (public) 5 192.168.4.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (domain,outside) tcp interface smtp 192.168.0.3 smtp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (domain,outside) tcp interface 5000 192.168.0.10 5000 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (domain,outside) tcp interface https 192.168.0.3 https netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (domain,outside) tcp interface pop3 192.168.0.3 pop3 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (domain,outside) tcp interface 587 192.168.0.3 587 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (domain,outside) tcp interface www 192.168.0.3 www netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (ftp,outside) tcp 10.0.0.2 www 192.168.1.2 www netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (ftp,outside) tcp 10.0.0.2 ftp 192.168.1.2 ftp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group 101 in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 10.0.0.6 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.0.0 255.255.255.0 domain&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;no crypto isakmp nat-traversal&lt;/P&gt;&lt;P&gt;telnet 192.168.0.0 255.255.255.0 domain&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.0.0 255.255.255.0 domain&lt;/P&gt;&lt;P&gt;ssh timeout 30&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd dns 68.94.156.1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.4.10-192.168.4.50 public&lt;/P&gt;&lt;P&gt;dhcpd enable public&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat shun except ip-address 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat shun except ip-address 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat shun except ip-address 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat shun except ip-address 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat shun except ip-address 192.168.4.0 255.255.255.0&lt;/P&gt;&lt;P&gt;threat-detection statistics&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect pptp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;ntp server 207.46.197.32 source outside prefer&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:4f63a0448cae6f4efd994004e49b06f1&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My goal here was to keep my internal network unchanged with the end result being that each one of my public IPs is ultimately routed to a different physical network on the inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I said before, everything is working beautifully right now and I could probably go on like this for ever. I still wonder though if there isn't a better way to configure the 2811 rather than using NAT. Could I create static routes in the 2811 to basically bridge the RG and the PIX. I read a bit about transparent bridge mode, but I didn't understand it enough to determine weather it would be applicable to what I am trying to accomplish.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again, thanks a lot for all your help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Jul 2013 13:34:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-at-t-u-verse-and-static-ip-block-problem/m-p/2275093#M347155</guid>
      <dc:creator>Chris Mickle</dc:creator>
      <dc:date>2013-07-13T13:34:42Z</dc:date>
    </item>
    <item>
      <title>Re: PIX, AT&amp;T U-Verse and static IP block problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-at-t-u-verse-and-static-ip-block-problem/m-p/2275094#M347156</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; One more little thing. As I have indicated, I am new to router IOS and I wanted to make sure that my router config is secure. I would only like to allow consol access; no telnet or SSH, but it is unclear to me whether this is the case with my current config.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Jul 2013 13:42:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-at-t-u-verse-and-static-ip-block-problem/m-p/2275094#M347156</guid>
      <dc:creator>Chris Mickle</dc:creator>
      <dc:date>2013-07-13T13:42:37Z</dc:date>
    </item>
    <item>
      <title>PIX, AT&amp;T U-Verse and static IP block problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-at-t-u-verse-and-static-ip-block-problem/m-p/2275095#M347157</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You might want to apply atleast ACLs on to the &lt;STRONG&gt;"vty 0 4"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Something like&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip acces-list standard ROUTER-MGMT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; permit 10.0.0.0 0.0.0.7&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; deny any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;line vty 0 4&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; access-class ROUTER-MGMT in&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which should enable you to take management connections from behind the Router from the PIX NAT IP addresses but nowhere else.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You might also want to add some ACL to the WAN interface of the router to limit traffic which can enter. Even though you are still doing Dynamic PAT on the PIX side, so even if the connections came through the Router they would still get blocked on the PIX side.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do remember to mark a reply as the correct answer if you have felt that it has answered your question and/or mark helpfull answers-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Jul 2013 13:53:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-at-t-u-verse-and-static-ip-block-problem/m-p/2275095#M347157</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-13T13:53:47Z</dc:date>
    </item>
  </channel>
</rss>

