<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Two separate address pools on the same interface? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/two-separate-address-pools-on-the-same-interface/m-p/2103689#M393702</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;NAT and ACLs are both needed. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 26 Dec 2012 22:47:03 GMT</pubDate>
    <dc:creator>lcaruso</dc:creator>
    <dc:date>2012-12-26T22:47:03Z</dc:date>
    <item>
      <title>Two separate address pools on the same interface?</title>
      <link>https://community.cisco.com/t5/network-security/two-separate-address-pools-on-the-same-interface/m-p/2103686#M393684</link>
      <description>&lt;P&gt;I'm something of a routing novice so bear with me...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have an ASA 5510 and we also have two separate address pools which have been provided by our ISP.&amp;nbsp; The addresses are not contiguous.&amp;nbsp; Is there a way to configure an interface on the ASA to handle both sets of public address pools?&amp;nbsp; If the outside interface is set up on eth0/0 would I create two subinterfaces (eth0/0.1, eth0/0.2) and assign each subinterface an address pool?&amp;nbsp; Then just NAT/PAT to my heart's content?&amp;nbsp;&amp;nbsp; At that point I would want both to route to our inside network.&amp;nbsp; So it's basically two inbound sets of IP addresses comming into one interface and then comming into the network...&amp;nbsp; Right now the outside interface is configured with our first set of IP addresses.&amp;nbsp; We wanted additional addresses and when we called our ISP they told us we already had them - just a different pool.&amp;nbsp; Hence the question.&amp;nbsp; I'm guessing that I wouldn't put anything specific on the outside interface and I would put the specifics on the subinterfaces?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've never done something like this before - that's why I'm asking the question!&amp;nbsp; Any help/direction would be appreciated!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:41:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-separate-address-pools-on-the-same-interface/m-p/2103686#M393684</guid>
      <dc:creator>d.vinnedge</dc:creator>
      <dc:date>2019-03-12T00:41:11Z</dc:date>
    </item>
    <item>
      <title>Two separate address pools on the same interface?</title>
      <link>https://community.cisco.com/t5/network-security/two-separate-address-pools-on-the-same-interface/m-p/2103687#M393689</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It works. Nothing needed except NAT statments that have the 2nd ip range addresses specfied. As long as your ISP routes them to the ASA's outside interface, the ASA is smart enough to NAT them for you. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Dec 2012 22:42:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-separate-address-pools-on-the-same-interface/m-p/2103687#M393689</guid>
      <dc:creator>lcaruso</dc:creator>
      <dc:date>2012-12-26T22:42:17Z</dc:date>
    </item>
    <item>
      <title>Re: Two separate address pools on the same interface?</title>
      <link>https://community.cisco.com/t5/network-security/two-separate-address-pools-on-the-same-interface/m-p/2103688#M393697</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You &lt;STRONG&gt;shoud not&lt;/STRONG&gt; create subinterfaces for this purpose. You will only complicate your setup and cause problems.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To&amp;nbsp; be able to use the new public IP address range its basicly mostly up to&amp;nbsp; the ISP configurations. As long as the ISP has routed the new public&amp;nbsp; subnet towards ASA outside interface it should be usable. What you do&amp;nbsp; with it is up to you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Start&amp;nbsp; using the new public IP address range for server NAT addresses directly&amp;nbsp; on the ASA firewall and configure Static NAT when a new LAN/DMZ server&amp;nbsp; needs it.&lt;/LI&gt;&lt;LI&gt;You can also route the new public subnet further in to&amp;nbsp; your LAN behind the ASA and use the public subnet directly as some&amp;nbsp; subnet for server etc.&lt;/LI&gt;&lt;LI&gt;You could also configure the public&amp;nbsp; subnet directly to some interface on the ASA if you want the ASA to be&amp;nbsp; the gateway of the network. (This would be ofcourse some other interface than the current "outside" interface)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All of the above&amp;nbsp; depends on how your network is built. Meaning for example how your link&amp;nbsp; to ISP is configured and what kind of devices you have on your network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pleare rate if the information was helpfull and/or ask more questions if the above didnt answer your questions. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Dec 2012 22:44:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-separate-address-pools-on-the-same-interface/m-p/2103688#M393697</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-12-26T22:44:10Z</dc:date>
    </item>
    <item>
      <title>Two separate address pools on the same interface?</title>
      <link>https://community.cisco.com/t5/network-security/two-separate-address-pools-on-the-same-interface/m-p/2103689#M393702</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;NAT and ACLs are both needed. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Dec 2012 22:47:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-separate-address-pools-on-the-same-interface/m-p/2103689#M393702</guid>
      <dc:creator>lcaruso</dc:creator>
      <dc:date>2012-12-26T22:47:03Z</dc:date>
    </item>
    <item>
      <title>Re: Two separate address pools on the same interface?</title>
      <link>https://community.cisco.com/t5/network-security/two-separate-address-pools-on-the-same-interface/m-p/2103690#M393707</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thank you both.&amp;nbsp; I didn't realize that the ASA would be "smart" enough to handle two IP ranges on the same interface.&amp;nbsp; I simply created the access rules and then the nat translations and it worked!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Dec 2012 15:23:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-separate-address-pools-on-the-same-interface/m-p/2103690#M393707</guid>
      <dc:creator>d.vinnedge</dc:creator>
      <dc:date>2012-12-27T15:23:51Z</dc:date>
    </item>
  </channel>
</rss>

