<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA 5510 New deployment in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-new-deployment/m-p/1519160#M605746</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;int eth0/1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;10.x.x.x mask&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int eth0/1.1&lt;/P&gt;&lt;P&gt;vlan1&lt;/P&gt;&lt;P&gt;nameif DMZ&lt;/P&gt;&lt;P&gt;10.10.x.x mask&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Siva,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even though you quickly typed it up, I'd like to mention not to use the main interface with nameif and only configure sub-interfaces with nameif/ip address etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway, how to route IN to DMZ and DMZ to OUT packets, here is what you need to remember.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R-oute&lt;/P&gt;&lt;P&gt;T-ranslation&lt;/P&gt;&lt;P&gt;P-ermission&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IN to DMZ is high to low so, you need to provide translation static (inside,DMZ) 10.x.x.x 10.x.x.x&lt;/P&gt;&lt;P&gt;DMZ to outside is high to low again so, you need to provide translation.&lt;/P&gt;&lt;P&gt;Permission is not required from high to low in the ASA platform but traffic initiated from LOW to HIGH requires permission.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have a layer three device on the inside it has to have a route to 10.10.x.x on the DMZ via the inside interface IP of the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the DMZ you mentioned that they are directly connected so, they will have the ASA's DMZ interface IP as their GW so, the firewall will take care of routing to inside as well as outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 08 Dec 2010 01:35:22 GMT</pubDate>
    <dc:creator>Kureli Sankar</dc:creator>
    <dc:date>2010-12-08T01:35:22Z</dc:date>
    <item>
      <title>Cisco ASA 5510 New deployment</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-new-deployment/m-p/1519157#M605741</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are a moving to Cisco ASA 5510 from our existing firewall (non-cisco). It is our primary firewall to our head office and i will be directly connecting to the ISP and configuring features like NAT, VPN tunnels, RVPN etc.. Am not configuring failover on the same ASA 5510 but i have purchased two indentical units actually. i am in the process of configuring the firewall and putting it to test on the live network by the end of this month. But before that i have few questions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Since i am connecting my ISP to the outside interface do i have to configure a static route ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. I have a branch office running Cisco 1811 running an IPSEC tunnel to the head office. this 1811 is connected to another 1811 here at the head office through a different ISP. Point to be noted i have two ISP's at my head office. Right now the plan is to migrate that connection to ASA 5510. So how will i configure the new VPN tunnel and what changes do i have to make on the cisco 1811 at my branch office ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. I am configuring int eth 0/1 as my inside interface and also configured a sub int on eth 0/1.1 (vlan 1) as my DMZ. How will i route packets between LAN-DMZ, WAN-DMZ. Is it all done using the access list ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will post more questions when i get to the next level.i am referring to cisco 5510 complete guide for my configurations. your help is appreciated&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;SR&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:19:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-new-deployment/m-p/1519157#M605741</guid>
      <dc:creator>shivudu1984</dc:creator>
      <dc:date>2019-03-11T19:19:37Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5510 New deployment</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-new-deployment/m-p/1519158#M605742</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To answer your questions:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) No, you can pull the route using dhcp "ip address dhcp setroute" option under the interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2) You can set L2L config on the ASA and it is a little simpler than the IOS. Here is a sample doc &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00805e8c80.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00805e8c80.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) I am not sure what the 2 DMZ interfaces are. But you should treat them as regular interfaces. You need ACLs, translations and router to pass traffic between them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Dec 2010 20:23:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-new-deployment/m-p/1519158#M605742</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-12-07T20:23:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5510 New deployment</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-new-deployment/m-p/1519159#M605744</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my third question was&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int eth0/1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;10.x.x.x mask&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int eth0/1.1&lt;/P&gt;&lt;P&gt;vlan1&lt;/P&gt;&lt;P&gt;nameif DMZ&lt;/P&gt;&lt;P&gt;10.10.x.x mask&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry that's just the rough config i typed out. but the point is on my DMZ i will have couple of servers that will be on the same subnet as the LAN. how will i route the packets ?? i.e if an user wants to access the server on the DMZ from local LAN how will the routing be done. and if the user from an outside network wants to access the server on the DMZ how will it be done. But wait i have a guide that has a pictorial n/w diagram. anyways your help will be appreciated and i will understand it better.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Siva R&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Dec 2010 22:20:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-new-deployment/m-p/1519159#M605744</guid>
      <dc:creator>shivudu1984</dc:creator>
      <dc:date>2010-12-07T22:20:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5510 New deployment</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-new-deployment/m-p/1519160#M605746</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;int eth0/1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;10.x.x.x mask&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int eth0/1.1&lt;/P&gt;&lt;P&gt;vlan1&lt;/P&gt;&lt;P&gt;nameif DMZ&lt;/P&gt;&lt;P&gt;10.10.x.x mask&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Siva,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even though you quickly typed it up, I'd like to mention not to use the main interface with nameif and only configure sub-interfaces with nameif/ip address etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway, how to route IN to DMZ and DMZ to OUT packets, here is what you need to remember.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R-oute&lt;/P&gt;&lt;P&gt;T-ranslation&lt;/P&gt;&lt;P&gt;P-ermission&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IN to DMZ is high to low so, you need to provide translation static (inside,DMZ) 10.x.x.x 10.x.x.x&lt;/P&gt;&lt;P&gt;DMZ to outside is high to low again so, you need to provide translation.&lt;/P&gt;&lt;P&gt;Permission is not required from high to low in the ASA platform but traffic initiated from LOW to HIGH requires permission.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have a layer three device on the inside it has to have a route to 10.10.x.x on the DMZ via the inside interface IP of the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the DMZ you mentioned that they are directly connected so, they will have the ASA's DMZ interface IP as their GW so, the firewall will take care of routing to inside as well as outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Dec 2010 01:35:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-new-deployment/m-p/1519160#M605746</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-12-08T01:35:22Z</dc:date>
    </item>
  </channel>
</rss>

