<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: new transit interface on firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/new-transit-interface-on-firewall/m-p/2057701#M397854</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;saA flag means that it is waiting for SYN-ACK from the outside host (server).&lt;/P&gt;&lt;P&gt;You can run packet tracer to see if it's passing through the ASA fine. I would check with the end host to see if it is seeing the SYN packet, or if it's responding at all.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 19 Oct 2012 12:19:38 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2012-10-19T12:19:38Z</dc:date>
    <item>
      <title>new transit interface on firewall</title>
      <link>https://community.cisco.com/t5/network-security/new-transit-interface-on-firewall/m-p/2057696#M397849</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is the set-up. we'r planning to implement the second firewall portion which will connect to the ASA on asa's lan interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;internet == ASA == firewall 2 == LAN / Application servers &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA interface configuration:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inte e0/0 (outside) - connected to internet , 202.95.64.21 &lt;/P&gt;&lt;P&gt;inte e0/1(inside) - connected to single server , 192.168.0.2 /24 &lt;/P&gt;&lt;P&gt;inte e0/2(transit) - configured for connecting the second firewall , 192.168.1.11 /24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int e0/2 will connect to the second firewall. Second firewall will have ip 192.168.1.12 on its outside interface facing ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, following are the requirements for server access:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Outound -&amp;nbsp; Server 10.58.82.10 connected in the LAN needs to access an internet destination 203.12.12.12 for an ftp service&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; But this destination 203.12.12.12 only recognises request from ip 202.95.64.27 ( which is an ip from our internet subnet )&lt;/P&gt;&lt;P&gt;2. Inbound&amp;nbsp; - Destination 203.12.12.12 access to 10.58.82.12 for sql service on port 1510&lt;/P&gt;&lt;P&gt;3. Outbound - Server 10.58.82.21 connected in LAN needs to acces internet destination 203.11.11.11 for an http service&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; ( there is no restriction on the public ip it uses for this need )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Queries:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. int e0/2 is only created as an interface to connect the asa to the second firewall. will this work fine?&lt;/P&gt;&lt;P&gt;2. we'll be using static statements ; static ( transit, outside ) 203.12.12.12 10.58.82.10 to get requirement 1 working. Is this correct?&lt;/P&gt;&lt;P&gt;3. for requirement 2, how should it be configured?&lt;/P&gt;&lt;P&gt;4. how should requirement 3 be configured?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA will have a route for lan 10.58.x.x network on the transit interface to 192.16.1.12 and second firewall will have default route to 192.168.1.11.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will this work well for my requirement, Please suggest with inputs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:06:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-transit-interface-on-firewall/m-p/2057696#M397849</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2019-03-12T00:06:34Z</dc:date>
    </item>
    <item>
      <title>new transit interface on firewall</title>
      <link>https://community.cisco.com/t5/network-security/new-transit-interface-on-firewall/m-p/2057697#M397850</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1. Yes, that is not a problem. You can configure e0/2 as a transit interface to the second firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. For requirement one, yes, you are correct if the server also accesses other destination IP address with the same NATed address, but your static NAT statement has incorrect IP address &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;It should be:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (transit,outside) 202.95.64.27 10.58.82.10 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or you can configure NAT/global pair as well if that server only requires outbound access, not both:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list nat1 permit ip host 10.58.82.10 host 203.12.12.12&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (transit) 10 access-list nat1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (outside) 10 202.95.64.27 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. For requirement two, what public IP address do you want to use for the NAT? You can either use a spare if you like:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (transit,outside) 202.95.64.2x 10.58.82.12 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Then you would need to have ACL configured on the outside interface to permit the traffic:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list &lt;ACL-NAME&gt; permit tcp any host 202.95.64.2x eq 1510&lt;/ACL-NAME&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OR/ alternatively, you can also use the ASA outside interface IP:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (transit,outside) tcp interface 1510 10.58.82.12 1510 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;And the ACL:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list &lt;ACL-NAME&gt; permit tcp any interface outside eq 1510&lt;/ACL-NAME&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4. For requirement three, you can just use the existing global that you already have configured on the ASA and configure a generic NAT statement for the whole 10.58.82.0/24 subnet:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (transit) &lt;EXISTING-SEQ-NUMBER&gt; 10.58.82.0 255.255.255.0&lt;/EXISTING-SEQ-NUMBER&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OR/ if you want to be more specific then:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (transit) &lt;EXISTING-SEQ-NUMBER&gt; 10.58.82.21 255.255.255.255&lt;/EXISTING-SEQ-NUMBER&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope the above helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Oct 2012 13:30:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-transit-interface-on-firewall/m-p/2057697#M397850</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-09T13:30:06Z</dc:date>
    </item>
    <item>
      <title>Re: new transit interface on firewall</title>
      <link>https://community.cisco.com/t5/network-security/new-transit-interface-on-firewall/m-p/2057698#M397851</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you. Do we need to configure any access list or anything for the transit interface, based on the requirements above for the flow.&lt;/P&gt;&lt;P&gt;Transit interface has security level 90 , outside has 1 and inside is 100 currently.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks in advance!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Oct 2012 03:18:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-transit-interface-on-firewall/m-p/2057698#M397851</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2012-10-10T03:18:44Z</dc:date>
    </item>
    <item>
      <title>Re: new transit interface on firewall</title>
      <link>https://community.cisco.com/t5/network-security/new-transit-interface-on-firewall/m-p/2057699#M397852</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you haven't configured any ACL on transit interface, then NO, you don't need any ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But if you already have an existing ACL then yes, you would need to add ACL on transit interface for outbound access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For requirement 1:&lt;/P&gt;&lt;P&gt;access-list &lt;TRANSIT-ACL&gt; permit tcp host 10.58.82.10 host 203.12.12.12 eq 21&lt;/TRANSIT-ACL&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For requirement 3:&lt;/P&gt;&lt;P&gt;access-list &lt;TRANSIT-ACL&gt; permit tcp host 10.58.82.21 host 203.11.11.11 eq 80&lt;/TRANSIT-ACL&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Oct 2012 04:47:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-transit-interface-on-firewall/m-p/2057699#M397852</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-10T04:47:20Z</dc:date>
    </item>
    <item>
      <title>Re: new transit interface on firewall</title>
      <link>https://community.cisco.com/t5/network-security/new-transit-interface-on-firewall/m-p/2057700#M397853</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jennifer.&lt;/P&gt;&lt;P&gt;We tested this traffic.&lt;/P&gt;&lt;P&gt;The http service outbound from 10.58.82.21 to 203.11.11.11 is accessible &amp;amp; fine&lt;/P&gt;&lt;P&gt;However, the outbound from 10.58.82.10 to 203.12.12.12 on FTP service is not working fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can see the traffic reaching the ASA based on the topology. The flags show me as saA in the connection table.&lt;/P&gt;&lt;P&gt;Since, at destination 203.12.12.12, it will only recognise request coming from 202.95.64.27 , static configuration as below &lt;/P&gt;&lt;P&gt;was put : static (transit,outside) 202.95.64.27 10.58.82.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;even after this the traffic for 203.12.12.12 is not working via the ASA. the service on that destination is active, as we have verified &lt;/P&gt;&lt;P&gt;this without the asa.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help.Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Oct 2012 02:02:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-transit-interface-on-firewall/m-p/2057700#M397853</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2012-10-19T02:02:52Z</dc:date>
    </item>
    <item>
      <title>Re: new transit interface on firewall</title>
      <link>https://community.cisco.com/t5/network-security/new-transit-interface-on-firewall/m-p/2057701#M397854</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;saA flag means that it is waiting for SYN-ACK from the outside host (server).&lt;/P&gt;&lt;P&gt;You can run packet tracer to see if it's passing through the ASA fine. I would check with the end host to see if it is seeing the SYN packet, or if it's responding at all.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Oct 2012 12:19:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-transit-interface-on-firewall/m-p/2057701#M397854</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-19T12:19:38Z</dc:date>
    </item>
  </channel>
</rss>

