<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA and default gateway on the outside in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-and-default-gateway-on-the-outside/m-p/1572405#M685857</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason the packets are going across the firewall could because the router is doing proxy-arp for the server IP. Can you disable proxy-arp on the router interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0.1&lt;BR /&gt; encapsulation dot1Q 1 native&lt;BR /&gt; ip address 100.100.100.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no ip proxy-arp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have multiple such subnets, you can go for multiple context and configure each context in transparent mode. Since the router will be taking care of the routing between subnets, you need to allow traffic to your servers exclusively through the access-lists (sourced from other subnets to your internal servers on a different VLAN).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 20 Sep 2010 17:32:47 GMT</pubDate>
    <dc:creator>Nagaraja Thanthry</dc:creator>
    <dc:date>2010-09-20T17:32:47Z</dc:date>
    <item>
      <title>ASA and default gateway on the outside</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-default-gateway-on-the-outside/m-p/1572402#M685854</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My ASA 5520 is used in transparent mode behind a router used as gateway (ex. 91.123.30.1) for all my hosts. Recently I have changed my topology from :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA -- ROUTER -- SW -- HOSTS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ROUTER -- ASA -- SW -- HOSTS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the new topology I have some issue with the gateway on the outside interface. Cisco in this document (&lt;A href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a008089f467.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a008089f467.shtml&lt;/A&gt;) indicate to use the ip address of the ASA as default gateway and use another address (ex. 91.123.30.254) for the router. Some questions :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Is this the correct way ?&lt;/P&gt;&lt;P&gt;2. How to configure the ASA with multiple subnet on same/different VLAN ? Multi-context ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jerome&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:42:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-default-gateway-on-the-outside/m-p/1572402#M685854</guid>
      <dc:creator>jquintard</dc:creator>
      <dc:date>2019-03-11T18:42:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and default gateway on the outside</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-default-gateway-on-the-outside/m-p/1572403#M685855</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For your first question, I not sure which line you are referring to that states that you need to configure the ASA as the default gateway. Here is an excerpt from the document:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;"Do not specify the security appliance management IP address as the &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;default gateway for connected devices; devices need to specify the router on &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;the other side of the security appliance as the default gateway."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, the router will be the default gateway and you need to specify an IP for the ASA in the same subnet as the router and the clients so you can manage it. If you want to manage it via the management interface (out-of-band option), then you do not need to worry about it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For your second question, if you have all hosts on the same VLAN and have different IP subnets (flat network with multiple subnets within the same vlan), and you are using secondary IP on the router, then you do not need to make any changes. The firewall will just forward the traffic. But if you have multiple internal VLANs, then either you need to configure multiple context or you need to configure a routed solution between the inside switch and the router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Sep 2010 15:52:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-default-gateway-on-the-outside/m-p/1572403#M685855</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-09-20T15:52:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and default gateway on the outside</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-default-gateway-on-the-outside/m-p/1572404#M685856</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello NT,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In fact I have understand "must" instead "avoid", mistake in reading.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My router configuration :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;interface GigabitEthernet0/0.1&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0.1&lt;BR /&gt; encapsulation dot1Q 1 native&lt;BR /&gt; ip address 100.100.100.1 255.255.255.0&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And my ASA configuration (Gi0/1 from the ASA is connected to the Gi0/0 port of the router) :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;firewall transparent&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;BR /&gt; nameif Inside&lt;BR /&gt; security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt; nameif Outside&lt;BR /&gt; security-level 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Acl_Inside extended permit icmp any any echo-reply&lt;BR /&gt;access-list Acl_Inside extended permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Acl_Outside extended permit tcp any any eq www&lt;BR /&gt;access-list Acl_Outside extended permit icmp any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group Acl_Inside in interface Inside&lt;BR /&gt;access-group Acl_Outside in interface Outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address 100.100.100.2 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route Inside 100.100.100.0 255.255.255.0 100.100.100.1 1&lt;BR /&gt;route Outside 0.0.0.0 0.0.0.0 100.100.100.1 1&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With this configuration :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Any host from the outside or from the inside can connect on the http port from any server.&lt;/P&gt;&lt;P&gt;- But a host on the inside can't open a port (ex. 25) on a machine in the same interface, that doesn't work. It's the correct working, because IP packet use the gateway above the outside interface to return to a host in the inside interface, the firewall block each port not autorize by an ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To solve this issue, I have add an ACL to permit tcp/udp ports :&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;access-list Acl_Outside extended permit tcp 100.100.100.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list Acl_Outside extended permit udp 100.100.100.0 255.255.255.0 any&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;- I this the only/best way to permit trafic on the inside interface ? I have 10 subnets, I dont think it's a rigorous config.&lt;/P&gt;&lt;P&gt;- In transparent mode, route inside/route outside are mandatory ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jerome&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Sep 2010 16:54:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-default-gateway-on-the-outside/m-p/1572404#M685856</guid>
      <dc:creator>jquintard</dc:creator>
      <dc:date>2010-09-20T16:54:32Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and default gateway on the outside</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-default-gateway-on-the-outside/m-p/1572405#M685857</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason the packets are going across the firewall could because the router is doing proxy-arp for the server IP. Can you disable proxy-arp on the router interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0.1&lt;BR /&gt; encapsulation dot1Q 1 native&lt;BR /&gt; ip address 100.100.100.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no ip proxy-arp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have multiple such subnets, you can go for multiple context and configure each context in transparent mode. Since the router will be taking care of the routing between subnets, you need to allow traffic to your servers exclusively through the access-lists (sourced from other subnets to your internal servers on a different VLAN).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Sep 2010 17:32:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-default-gateway-on-the-outside/m-p/1572405#M685857</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-09-20T17:32:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and default gateway on the outside</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-default-gateway-on-the-outside/m-p/1572406#M685858</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have disable this settings but It's the same thing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0.1&lt;/P&gt;&lt;P&gt; encapsulation dot1Q 1 native&lt;/P&gt;&lt;P&gt; ip address 100.100.100.1 255.255.255.0&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another idea ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Sep 2010 18:33:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-default-gateway-on-the-outside/m-p/1572406#M685858</guid>
      <dc:creator>jquintard</dc:creator>
      <dc:date>2010-09-20T18:33:34Z</dc:date>
    </item>
  </channel>
</rss>

