<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Handling multiple subnets, NAT, port forwarding... (ASA5510, 9.1 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/handling-multiple-subnets-nat-port-forwarding-asa5510-9-1/m-p/2143211#M357150</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, 3 public subnets allocated from the ISP and we want ASA to handle all of them. Most ot the IPs would end up on used for port forwarding... but some of them would stay on the outside but behind firewall (DMZ if I understand correctly) so ASA would be able to do ACL on those public IPs.&lt;/P&gt;&lt;P&gt;We asked the ISP to give us more IPs so that's how we ended up with multiple subnets in the first place (I'd be happy with single bigger subnet). So now we have enough IPs to assign to all the servers we want to have exposed and redirected to intranet, but I need to configure ASA to be able to handle them.&lt;/P&gt;&lt;P&gt;I don't want the exposed mailserver (in different subnet) talking directly to the oustide becasue then I cannot control the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISP --&amp;gt; ASA --&amp;gt; Intranet router --&amp;gt; intranet clients&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; --&amp;gt; public mailserver&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; --&amp;gt; public webserver&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; --&amp;gt; public webserver2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;quite usual setup - but in my case with multiple subnets.&lt;/P&gt;&lt;P&gt;Did I explain it well? &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 04 Feb 2013 14:06:13 GMT</pubDate>
    <dc:creator>maramamarama</dc:creator>
    <dc:date>2013-02-04T14:06:13Z</dc:date>
    <item>
      <title>Handling multiple subnets, NAT, port forwarding... (ASA5510, 9.1)</title>
      <link>https://community.cisco.com/t5/network-security/handling-multiple-subnets-nat-port-forwarding-asa5510-9-1/m-p/2143209#M357148</link>
      <description>&lt;P&gt;Hello there!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am a novice myself, am making slow progress but there is an issue I've already lost a lot of time with and was thinkging maybe I can find some help here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our ISP assigned us 3 subnets, each with it's own gateway.&lt;/P&gt;&lt;P&gt;The idea now is to have the 5510 handle all the IPs and manage the NAT and basic routing for all the IPs in the 3 subnets. Some of them would en in DMZ, some in intranet. The goal is to achieve that in one interface and not using the separate ethernet ports for separate subnets. I've tried creating subinterfaces (Ethernet 0/0.1, 0/0.2) for each subnet but that did't work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know ASA is not a router, but I found several topics claiming it is possible, but those topics were either for 5505 or for pre 8.3 ASA. As I understood, I should NAT the subnets 2 and 3 into subnet 1 and then handle it from there. Anyone can direct me in right direction on how to achieve that?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tia&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:55:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/handling-multiple-subnets-nat-port-forwarding-asa5510-9-1/m-p/2143209#M357148</guid>
      <dc:creator>maramamarama</dc:creator>
      <dc:date>2019-03-12T00:55:56Z</dc:date>
    </item>
    <item>
      <title>Handling multiple subnets, NAT, port forwarding... (ASA5510, 9.1</title>
      <link>https://community.cisco.com/t5/network-security/handling-multiple-subnets-nat-port-forwarding-asa5510-9-1/m-p/2143210#M357149</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you are saying that you have 3 public subnets allocated from the ISP and want to use them on the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you clarify are you going to use them on the ASA "outside" interface or are you going to use some of the ranges behind the ASA as either directly connected networks on the ASA itself or route them towards the LAN?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A simple picture of your needs might also clarify the setup you are going for.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Feb 2013 13:31:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/handling-multiple-subnets-nat-port-forwarding-asa5510-9-1/m-p/2143210#M357149</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-04T13:31:09Z</dc:date>
    </item>
    <item>
      <title>Handling multiple subnets, NAT, port forwarding... (ASA5510, 9.1</title>
      <link>https://community.cisco.com/t5/network-security/handling-multiple-subnets-nat-port-forwarding-asa5510-9-1/m-p/2143211#M357150</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, 3 public subnets allocated from the ISP and we want ASA to handle all of them. Most ot the IPs would end up on used for port forwarding... but some of them would stay on the outside but behind firewall (DMZ if I understand correctly) so ASA would be able to do ACL on those public IPs.&lt;/P&gt;&lt;P&gt;We asked the ISP to give us more IPs so that's how we ended up with multiple subnets in the first place (I'd be happy with single bigger subnet). So now we have enough IPs to assign to all the servers we want to have exposed and redirected to intranet, but I need to configure ASA to be able to handle them.&lt;/P&gt;&lt;P&gt;I don't want the exposed mailserver (in different subnet) talking directly to the oustide becasue then I cannot control the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISP --&amp;gt; ASA --&amp;gt; Intranet router --&amp;gt; intranet clients&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; --&amp;gt; public mailserver&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; --&amp;gt; public webserver&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; --&amp;gt; public webserver2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;quite usual setup - but in my case with multiple subnets.&lt;/P&gt;&lt;P&gt;Did I explain it well? &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Feb 2013 14:06:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/handling-multiple-subnets-nat-port-forwarding-asa5510-9-1/m-p/2143211#M357150</guid>
      <dc:creator>maramamarama</dc:creator>
      <dc:date>2013-02-04T14:06:13Z</dc:date>
    </item>
    <item>
      <title>Re: Handling multiple subnets, NAT, port forwarding... (ASA5510,</title>
      <link>https://community.cisco.com/t5/network-security/handling-multiple-subnets-nat-port-forwarding-asa5510-9-1/m-p/2143212#M357151</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I am assuming that all of the public IP addresses are to be used on the ASA itself as NAT IP addresses&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can only give you some configuration examples but nothing really specific since I dont have the exact information of the setup you have.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ISP gateway&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;First subnet as the connected network between ISP and ASA&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Second and Third subnet routed towards ASA "outside" interface IP address&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface &lt;INTERFACE&gt;&lt;/INTERFACE&gt;&lt;/P&gt;&lt;P&gt; description Customer Gateway&lt;/P&gt;&lt;P&gt; ip address 1.1.1.1 255.255.255.248&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 2.2.2.0 255.255.255.248 1.1.1.2&lt;/P&gt;&lt;P&gt;ip route 3.3.3.0 255.255.255.248 1.1.1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ASA&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Interfaces &amp;amp; Default Route&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface &lt;INTERFACE&gt;&lt;/INTERFACE&gt;&lt;/P&gt;&lt;P&gt; description Firewall Outside&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 1.1.1.2 255.255.255.248&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 1.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface &lt;INTERFACE&gt;&lt;/INTERFACE&gt;&lt;/P&gt;&lt;P&gt; description LAN&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip add 10.10.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface &lt;INTERFACE&gt;&lt;/INTERFACE&gt;&lt;/P&gt;&lt;P&gt; description DMZ&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip add 192.168.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Static NATs&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network DMZ-SERVER-1&lt;/P&gt;&lt;P&gt; host 192.168.10.10&lt;/P&gt;&lt;P&gt; nat (dmz,outside) static 2.2.2.1 dns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network DMZ-SERVER-2&lt;/P&gt;&lt;P&gt; host 192.168.10.20&lt;/P&gt;&lt;P&gt; nat (dmz,outside) static 2.2.2.2 dns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network LAN-SERVER-1&lt;/P&gt;&lt;P&gt; host 10.10.10.10&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 3.3.3.1 dns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network LAN-SERVER-2&lt;/P&gt;&lt;P&gt; host 10.10.10.20&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 3.3.3.2 dns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;OUTSIDE ACL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN remark Open services to DMZ and LAN servers&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN remark DMZ Servers&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN permit tcp any object DMZ-SERVER-1 eq &lt;SERVICE&gt;&lt;/SERVICE&gt;&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN permit tcp any object DMZ-SERVER-2 eq &lt;SERVICE&gt;&lt;/SERVICE&gt;&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN remark LAN Servers&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN permit tcp any object LAN-SERVER-1 eq &lt;SERVICE&gt;&lt;/SERVICE&gt;&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN permit tcp any object LAN-SERVER-2 eq &lt;SERVICE&gt;&lt;/SERVICE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group OUTSIDE-IN in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Default PAT rules&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Using "outside" interface IP as PAT IP address&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network DEFAULT-PAT-SOURCE&lt;/P&gt;&lt;P&gt; description Source network for default PAT&lt;/P&gt;&lt;P&gt; network-object 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (any,outside) after-auto source dynamic DEFAULT-PAT-SOURCE interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Those are just some examples.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configurations naturally change if you decide to use the public subnets directly on the DMZ interface or further in your network. Then you naturally need to make sure through configurations that when those public addressed host traverse the ASA, their connections wont for example fall to the default PAT rule or something else along those lines (in the above example we did specify clearly the source networks for PAT)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Feb 2013 14:31:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/handling-multiple-subnets-nat-port-forwarding-asa5510-9-1/m-p/2143212#M357151</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-04T14:31:02Z</dc:date>
    </item>
    <item>
      <title>Handling multiple subnets, NAT, port forwarding... (ASA5510, 9.1</title>
      <link>https://community.cisco.com/t5/network-security/handling-multiple-subnets-nat-port-forwarding-asa5510-9-1/m-p/2143213#M357152</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jouni,&lt;/P&gt;&lt;P&gt;Thanx a lot for trying to help!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't have&amp;nbsp; admin-access to ISP gateway, so I cannot route the 2 subnets the 1.1.1.2&amp;nbsp; on the ISP gateway level, but I was hoping to be able to do it on the&amp;nbsp; ASA level.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway, I tried to reduce the configuration to this, but it's still not working:&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif WAN&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 61.99.232.108 255.255.255.248 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif LAN&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.16.1.35 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network Webserver&lt;/P&gt;&lt;P&gt; nat (LAN,WAN) static 80.223.213.187&lt;/P&gt;&lt;P&gt; host 172.16.1.78&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN remark Open services to DMZ and LAN servers&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN remark LAN Servers&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN permit tcp any object Webserver eq http&lt;/P&gt;&lt;P&gt;access-group OUTSIDE-IN in interface WAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network DEFAULT-PAT-SOURCE&lt;/P&gt;&lt;P&gt;description Source network for default PAT&lt;/P&gt;&lt;P&gt;network-object 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (any,WAN) after-auto source dynamic DEFAULT-PAT-SOURCE interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;but it's not working ;(&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So:&lt;/P&gt;
&lt;P&gt;1 subnet: 62.99.232.104/29&lt;/P&gt;
&lt;P&gt;2 subnet: 80.223.213.176/28&lt;/P&gt;
&lt;P&gt;LAN: 172.16.1.0/24&lt;/P&gt;
&lt;P&gt;"main" public IP of the ASA: 61.99.232.106&lt;/P&gt;
&lt;P&gt;inside IP of the ASA: 172.16.1.35&lt;/P&gt;
&lt;P&gt;Webserver im LAN: 172.16.1.78&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;and I am trying to redirect all traffic coming to 80.223.213.187 to go to 172.16.1.78.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The next step would be to configure a DMZ to use for&amp;nbsp; example 80.223.213.188 (without NAT), but I first want to configure&amp;nbsp; simple forwarding outside-&amp;gt;inside. FOrwarding the public IP from the&amp;nbsp; first public subnet block worked without an problems (61.99.232.110&amp;nbsp; -&amp;gt; 172.16.1.78) but I can't get the IP from the second subnet to&amp;nbsp; work.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Feb 2013 19:10:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/handling-multiple-subnets-nat-port-forwarding-asa5510-9-1/m-p/2143213#M357152</guid>
      <dc:creator>maramamarama</dc:creator>
      <dc:date>2013-02-04T19:10:32Z</dc:date>
    </item>
    <item>
      <title>Re: Handling multiple subnets, NAT, port forwarding... (ASA5510,</title>
      <link>https://community.cisco.com/t5/network-security/handling-multiple-subnets-nat-port-forwarding-asa5510-9-1/m-p/2143214#M357153</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have the command "arp permit-nonconnected" configured on the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If not could you try adding that and trying again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think the 9.1 Command Reference includes the command "arp non-connected-subnet" but even though I have that software level i cant find that command format myself. Only the first one I mention&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;EDIT:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Heres the explanation from 9.0(1) Release Notes for your reference when they added the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="1" cellpadding="3" cellspacing="0" id="wp101668table101663" width="80%"&gt;&lt;TBODY&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;P&gt; ARP cache additions for non-connected subnets &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;A name="wp101736"&gt;&lt;/A&gt;&lt;P&gt; The ASA ARP cache only contains entries from directly-connected subnets&amp;nbsp; by default. You can now enable the ARP cache to also include&amp;nbsp; non-directly-connected subnets. We do not recommend enabling this&amp;nbsp; feature unless you know the security risks. This feature could&amp;nbsp; facilitate denial of service (DoS) attack against the ASA; a user on any&amp;nbsp; interface could send out many ARP replies and overload the ASA ARP&amp;nbsp; table with false entries. &lt;/P&gt;&lt;A name="wp101744"&gt;&lt;/A&gt;&lt;P&gt; You may want to use this feature if you use: &lt;/P&gt;&lt;A name="wp101745"&gt;&lt;/A&gt;&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;Secondary subnets. &lt;/P&gt;&lt;A name="wp101746"&gt;&lt;/A&gt;&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;Proxy ARP on adjacent routes for traffic forwarding. &lt;/P&gt;&lt;A name="wp101747"&gt;&lt;/A&gt;&lt;P&gt; We introduced the following command: &lt;STRONG&gt;arp permit-nonconnected&lt;/STRONG&gt;. &lt;/P&gt;&lt;A name="wp101748"&gt;&lt;/A&gt;&lt;P&gt; We modified the following screen: Configuration &amp;gt; Device Management &amp;gt; Advanced &amp;gt; ARP &amp;gt; ARP Static Table. &lt;/P&gt;&lt;A name="wp101749"&gt;&lt;/A&gt;&lt;P&gt; &lt;EM&gt;Also available in 8.4(5).&lt;/EM&gt; &lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Feb 2013 19:58:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/handling-multiple-subnets-nat-port-forwarding-asa5510-9-1/m-p/2143214#M357153</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-04T19:58:02Z</dc:date>
    </item>
    <item>
      <title>Re: Handling multiple subnets, NAT, port forwarding... (ASA5510,</title>
      <link>https://community.cisco.com/t5/network-security/handling-multiple-subnets-nat-port-forwarding-asa5510-9-1/m-p/2143215#M357154</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to suggest that if you are going to use some public IP addresses directly on the host behind the ASA and NOT as NAT IP addresses on the ASA then use the WHOLE subnet behind the ASA. You cant really use single IP public IP addresses behind the ASA (or any device for matter, unless host IP address on loopback interface etc)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Subnet1 = "outside" interface connected network between the ASA and ISP&lt;/LI&gt;&lt;LI&gt;Subnet2 = Subnet directly configured on the ASA "dmz" interface and hosts behind it&lt;/LI&gt;&lt;LI&gt;Subnet3 = Subnet used on ASA for NAT configurations for servers&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would still suggest using only single IP subnet on the ISP router gateway interface towards your ASA and routing the rest towards your ASA (I think this is needed if you want to use the IP addresses behind the ASA)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Feb 2013 20:08:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/handling-multiple-subnets-nat-port-forwarding-asa5510-9-1/m-p/2143215#M357154</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-04T20:08:53Z</dc:date>
    </item>
    <item>
      <title>Re: Handling multiple subnets, NAT, port forwarding... (ASA5510,</title>
      <link>https://community.cisco.com/t5/network-security/handling-multiple-subnets-nat-port-forwarding-asa5510-9-1/m-p/2143216#M357155</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jouni - it's working!!!!&lt;/P&gt;&lt;P&gt;Thanx a lot for your help &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I will probably still have questions but this is a big milestone for me - thanx!&lt;/P&gt;&lt;P&gt;I restored to factory configuration and then did what you told me to do.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Feb 2013 08:58:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/handling-multiple-subnets-nat-port-forwarding-asa5510-9-1/m-p/2143216#M357155</guid>
      <dc:creator>maramamarama</dc:creator>
      <dc:date>2013-02-05T08:58:09Z</dc:date>
    </item>
    <item>
      <title>Handling multiple subnets, NAT, port forwarding... (ASA5510, 9.1</title>
      <link>https://community.cisco.com/t5/network-security/handling-multiple-subnets-nat-port-forwarding-asa5510-9-1/m-p/2143217#M357156</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Great that its working now &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate the answers and mark the question as answered so others can find the solution easier &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally it always helps the motivation to answer on these forums also &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dont hesitate to start new threads when you have questions. Theres usually someone here that can try to help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Feb 2013 09:00:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/handling-multiple-subnets-nat-port-forwarding-asa5510-9-1/m-p/2143217#M357156</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-05T09:00:47Z</dc:date>
    </item>
  </channel>
</rss>

