<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5510 behind another firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-behind-another-firewall/m-p/1625978#M594165</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Krishna,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you would like to provide more information I am sure that either me or somebody else will be able to help you out with this.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 14 Jan 2011 21:45:23 GMT</pubDate>
    <dc:creator>Federico Coto Fajardo</dc:creator>
    <dc:date>2011-01-14T21:45:23Z</dc:date>
    <item>
      <title>ASA 5510 behind another firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-behind-another-firewall/m-p/1625974#M594161</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have purchased CISCO ASA 5510 for Clientless VPN use. This device will be behind Watchguard appliance.&lt;/P&gt;&lt;P&gt;Please provide or point how to configure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Krishna&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:35:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-behind-another-firewall/m-p/1625974#M594161</guid>
      <dc:creator>keddans</dc:creator>
      <dc:date>2019-03-11T19:35:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 behind another firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-behind-another-firewall/m-p/1625975#M594162</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the ASA sits behind another firewall in order to allow clientless SSL you need to open TCP 443 (SSL).&lt;/P&gt;&lt;P&gt;You might also want to open for example TCP 22 (SSH) to administer the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Jan 2011 20:46:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-behind-another-firewall/m-p/1625975#M594162</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-01-14T20:46:28Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 behind another firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-behind-another-firewall/m-p/1625976#M594163</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please provide basic configuration for ASA box as well. (since its connected only inside what configuration should be for inside and outside interfaces?) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Jan 2011 20:58:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-behind-another-firewall/m-p/1625976#M594163</guid>
      <dc:creator>keddans</dc:creator>
      <dc:date>2011-01-14T20:58:42Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 behind another firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-behind-another-firewall/m-p/1625977#M594164</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unfortunately you have not provide more information as to give you more details on the configuration needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In general terms to allow the ASA to work behind another firewall (not sure why you're having this setup), you are required to open in the Watchguard:&lt;/P&gt;&lt;P&gt;TCP 443 for Clientless VPN&lt;/P&gt;&lt;P&gt;TCP 22 for SSH access&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Watchguard should redirect the above ports to the ASA's outside IP.&lt;/P&gt;&lt;P&gt;In this way, when the Watchguard receives the VPN or SSH traffic, it will redirect it to the ASA's outside IP (assuming the ASA has a private IP and is not reachable directly from the Internet). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again... it depends heaviliy on your network setup and needs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Jan 2011 21:05:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-behind-another-firewall/m-p/1625977#M594164</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-01-14T21:05:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 behind another firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-behind-another-firewall/m-p/1625978#M594165</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Krishna,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you would like to provide more information I am sure that either me or somebody else will be able to help you out with this.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Jan 2011 21:45:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-behind-another-firewall/m-p/1625978#M594165</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-01-14T21:45:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 behind another firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-behind-another-firewall/m-p/1625979#M594166</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN&gt;Federico,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for responding to my queries.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&lt;SPAN&gt;I have purchased this ASA 5510 basically for clientless VPN access to our network due to some of our remote users are at customer's location where they cannot install IPSec client or SSL VPN client. Watchguard unfortunately it does&lt;/SPAN&gt;n’t support clientless VPN. Hence the purchase of ASA box.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&lt;SPAN&gt;I need all configuration help right from dropping this baby in the network to having remote users connecting to our Network. I will open those ports you have mentioned in Watchguard. Yes, Watchguard will NAT public to private IP of ASA box.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;So help me.&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/6/3/2/10236-network.png" class="jive-image" /&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Jan 2011 22:12:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-behind-another-firewall/m-p/1625979#M594166</guid>
      <dc:creator>keddans</dc:creator>
      <dc:date>2011-01-14T22:12:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 behind another firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-behind-another-firewall/m-p/1625980#M594167</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Krishna,&lt;/P&gt;&lt;P&gt;Why double layer protection?&lt;/P&gt;&lt;P&gt;If I were you I'd replace the watchdog with the ASA.&amp;nbsp; Deploy the watchdog on another location.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you need this double protection then you need to connect the LAN off the switch to the ASA so, your topology looks like this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Internet--Router--Watchdog--Cisco3750--ASA--Router--switch--Inside hosts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding VPN configuration - pls. spin up a new thead under the VPN community.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, pls. provide specific problem and ask for assitance.&amp;nbsp; I want this unit configured and dropped in the network is a very wide problem desctiption.&amp;nbsp; We have no idea what help you need. interface config, nat, acl, routing, aaa, vpn or what?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, make sure to spin a new thread with a clear problem desciption and title for each new problem. Like for example you have trouble with the inside hosts reaching the internet you should provide topology and specify the clear probelm desctiption. I have such and such inside network and I need assitance with configuring translation etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; You can watch my Webcast: &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.youtube.com/watch?v=kRY8DuaRp5U"&gt;http://www.youtube.com/watch?v=kRY8DuaRp5U&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I go over initial config of the firewall to get inside clients out to the internet. simple easy steps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Jan 2011 15:07:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-behind-another-firewall/m-p/1625980#M594167</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2011-01-15T15:07:51Z</dc:date>
    </item>
  </channel>
</rss>

