<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Multiple interfaces in outside VLAN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/multiple-interfaces-in-outside-vlan/m-p/2153933#M356663</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;JouniForss wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Is there a completely separate physical connection coming from all the Partner Networks to your site and at your site you want to gather all the connections to the ASA forward all the traffic through the ASA5505 before entering your local network?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes - this is my intent.&amp;nbsp; Essentially I am bringing in many "outside" connections into one "inside" connection.&amp;nbsp; All connections will be initiated from the inside.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 13 Feb 2013 20:00:51 GMT</pubDate>
    <dc:creator>nathan_hanks</dc:creator>
    <dc:date>2013-02-13T20:00:51Z</dc:date>
    <item>
      <title>Multiple interfaces in outside VLAN</title>
      <link>https://community.cisco.com/t5/network-security/multiple-interfaces-in-outside-vlan/m-p/2153931#M356661</link>
      <description>&lt;P&gt;This is for an ASA 5505 with the base license...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a situation where I will not have one interface in my outside VLAN, but instead I want to have interfaces 1-7 in my outside VLAN and interface0/0 in my inside VLAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this supported with the Base license, and if so how would I do this?&amp;nbsp; Do I still just need to assign one IP address to the outside VLAN?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or will I need to upgrade to the Security Plus license and put each interface in a separate outside VLAN, so in essence I would have 7 outside VLANs each with the same security level (0)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My situation is that I have several partner networks that i want to "aggregate" thru my one ASA 5505.&amp;nbsp; So each outside interface represents a separate partner (outside) network, each of which I want to get to from my inside network.&amp;nbsp; Hence the many outside to one inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance and appreciate any help.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:00:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-interfaces-in-outside-vlan/m-p/2153931#M356661</guid>
      <dc:creator>nathan_hanks</dc:creator>
      <dc:date>2019-03-12T01:00:25Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple interfaces in outside VLAN</title>
      <link>https://community.cisco.com/t5/network-security/multiple-interfaces-in-outside-vlan/m-p/2153932#M356662</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess the question is how are you planning on connection all those Partner Networks to the ASA? I'm not sure if I get the whole picture here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a completely separate physical connection coming from all the Partner Networks to your site and at your site you want to gather all the connections to the ASA forward all the traffic through the ASA5505 before entering your local network?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or are you planning on some kind of L2L VPN setup or what?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Feb 2013 17:20:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-interfaces-in-outside-vlan/m-p/2153932#M356662</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-13T17:20:53Z</dc:date>
    </item>
    <item>
      <title>Multiple interfaces in outside VLAN</title>
      <link>https://community.cisco.com/t5/network-security/multiple-interfaces-in-outside-vlan/m-p/2153933#M356663</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;JouniForss wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Is there a completely separate physical connection coming from all the Partner Networks to your site and at your site you want to gather all the connections to the ASA forward all the traffic through the ASA5505 before entering your local network?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes - this is my intent.&amp;nbsp; Essentially I am bringing in many "outside" connections into one "inside" connection.&amp;nbsp; All connections will be initiated from the inside.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Feb 2013 20:00:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-interfaces-in-outside-vlan/m-p/2153933#M356663</guid>
      <dc:creator>nathan_hanks</dc:creator>
      <dc:date>2013-02-13T20:00:51Z</dc:date>
    </item>
    <item>
      <title>Multiple interfaces in outside VLAN</title>
      <link>https://community.cisco.com/t5/network-security/multiple-interfaces-in-outside-vlan/m-p/2153934#M356664</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Heres what I am assuming&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;You have 7 separate physical connections coming to the location with the ASA5505&lt;/LI&gt;&lt;LI&gt;Each connections router will be connected to the ASAs physical port&lt;/LI&gt;&lt;LI&gt;The ASA will have no actual "outside" interface for Internet traffic?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess in this case it might even be possible to use Base License (are we talking about a 10 user limit when checking the "show version" output?)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could try to&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Configure a link network/subnet on the "outside" interface of the ASA. All the other connections router would also have an interface belonging to this link network/subnet&lt;/LI&gt;&lt;LI&gt;Add route configurations for the Partner Networks on the ASA "outside" interface pointing to the different routers&lt;/LI&gt;&lt;LI&gt;Add routes for your "inside" network on the mentioned routers that would point to the ASA "outside" interface IP address&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm kinda wondering also that IF you have 10 user license then you will probably need to configure a default route pointing somewhere on the "outside" since the host behind the interface with the default route wont be counted towards the user limit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Heres one discussion from these forums that&amp;nbsp; clarifies the above a bit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://community.cisco.com/thread/2144579"&gt;https://supportforums.cisco.com/thread/2144579&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There should also be Cisco document about the ASA5505 models user limits.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Feb 2013 20:23:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-interfaces-in-outside-vlan/m-p/2153934#M356664</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-13T20:23:28Z</dc:date>
    </item>
    <item>
      <title>Multiple interfaces in outside VLAN</title>
      <link>https://community.cisco.com/t5/network-security/multiple-interfaces-in-outside-vlan/m-p/2153935#M356665</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;JouniForss wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Heres what I am assuming&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;You have 7 separate physical connections coming to the location with the ASA5505&lt;/LI&gt;&lt;LI&gt;Each connections router will be connected to the ASAs physical port&lt;/LI&gt;&lt;LI&gt;The ASA will have no actual "outside" interface for Internet traffic?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess in this case it might even be possible to use Base License (are we talking about a 10 user limit when checking the "show version" output?)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could try to&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Configure a link network/subnet on the "outside" interface of the ASA. All the other connections router would also have an interface belonging to this link network/subnet&lt;/LI&gt;&lt;LI&gt;Add route configurations for the Partner Networks on the ASA "outside" interface pointing to the different routers&lt;/LI&gt;&lt;LI&gt;Add routes for your "inside" network on the mentioned routers that would point to the ASA "outside" interface IP address&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm kinda wondering also that IF you have 10 user license then you will probably need to configure a default route pointing somewhere on the "outside" since the host behind the interface with the default route wont be counted towards the user limit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Heres one discussion from these forums that&amp;nbsp; clarifies the above a bit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/thread/2144579" rel="nofollow"&gt;https://supportforums.cisco.com/thread/2144579&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There should also be Cisco document about the ASA5505 models user limits.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jouni - thanks for your time!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To answer your questions:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. all your assumptions are correct&lt;/P&gt;&lt;P&gt;2. For each physical connection, there would be one long running TCP session - so there would be 7 connections per ASA, originating from an inside server to one host on each of the partner networks.&lt;/P&gt;&lt;P&gt;3. On all the route configurations you mention that is what I intended.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My resulting question is this:&lt;/P&gt;&lt;P&gt;How would I configure NAT in this instance?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Feb 2013 21:06:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-interfaces-in-outside-vlan/m-p/2153935#M356665</guid>
      <dc:creator>nathan_hanks</dc:creator>
      <dc:date>2013-02-13T21:06:00Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple interfaces in outside VLAN</title>
      <link>https://community.cisco.com/t5/network-security/multiple-interfaces-in-outside-vlan/m-p/2153936#M356666</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NAT configuration depends on your ASA software. It might even be that you would not need to configure ANY NAT at all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I actually didnt think one of the things through and that is that you would actually have 2 options how to handle the routing between the Partner Network routers and your "inside" network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The first option which I have already said would be to add a route on every Partner Network router that tells that you "inside" network is found behind the ASA "outside" interface IP address. If your "inside" network is something that doesnt overlap with any of the Partner Networks you wont really need to do any NAT. Depending on your software the ASA might behave a bit differently &lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;On ASA 8.2&lt;/STRONG&gt; software you have to make sure the "nat-control" is on its default setting which is "no nat-control". If the default setting is on, you shouldnt see any mention of "nat-control" in the CLI configuration. However if "nat-control" is enabled, you should see it right above the first "global" configuration command in the CLI configuration&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;On ASA 8.3&lt;/STRONG&gt; and newer software you could simply leave the ASA without ANY NAT configurations and it would simply route traffic in between and perform statefull firewalling only.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;The second option would be to leave out configuring the routes on the Partner Network&amp;nbsp; routers and simply NAT all traffic from the "inside" network to the "outside" interface IP address on the ASA with PAT translation. Since all the Partner Network routers are connected to the same link network/subnet with the ASA they wouldnt need a route for that PAT address on the ASA. They would see it as part of a "directly connected" network.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;EDIT: Heres a link to the ASA 8.2 software Command Reference and the command "nat-control"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/no.html#wp1746857" rel="nofollow"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/no.html#wp1746857&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully I made any sense and the information was helpfull &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Feb 2013 21:24:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-interfaces-in-outside-vlan/m-p/2153936#M356666</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-13T21:24:04Z</dc:date>
    </item>
  </channel>
</rss>

