<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA - overlapping IP ranges on outside and dmz interfaces in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-overlapping-ip-ranges-on-outside-and-dmz-interfaces/m-p/1391979#M737992</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What you are doing there is called an identity NAT. It's basically an exempt if you wish. What is the problem with using a static for translating a local DMZ address to the address you wish to use on the outside interface for the OCS?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 02 Feb 2010 16:54:51 GMT</pubDate>
    <dc:creator>Kent Heide</dc:creator>
    <dc:date>2010-02-02T16:54:51Z</dc:date>
    <item>
      <title>ASA - overlapping IP ranges on outside and dmz interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-overlapping-ip-ranges-on-outside-and-dmz-interfaces/m-p/1391974#M737953</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Cisco ASA question, &lt;BR /&gt;if I can carve small range of global IP addresses from big IP range that exists on outside and put this small range to dmz interface?.&lt;/P&gt;&lt;P&gt;The task is to have a few servers assigned global IP but have them behind a firewall so we can control traffic towards them.&lt;BR /&gt;Well, apparently it is doable,wondering if there are any drawbacks with that?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.x.x.x it this test represent globally routable IP addresses from ISP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Three-interface ASA used for testing in the LAB:&lt;BR /&gt;Outside:&amp;nbsp;&amp;nbsp; 10.10.104.2 / 22&lt;BR /&gt;Dmz:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.10.107.241 / 28&amp;nbsp;&amp;nbsp; &amp;lt;- within "outside" ip range&lt;BR /&gt;Inside:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1.1.1.1 / 24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (dmz,outside) 10.10.107.250 10.10.107.250 netmask 255.255.255.255&lt;BR /&gt;global (inside,outside) 10.10.107.238 1.1.1.250 netmask 255.255.255.255,&lt;/P&gt;&lt;P&gt;there are hosts .250 connected on inside and dmz to hangle traffic.&lt;/P&gt;&lt;P&gt;+ Access list "in" on outside permitting everithing to everything&lt;BR /&gt;+ nat-control&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA takes configuring "overlapping" ip ranges on Outside and DMZ without warning and&lt;BR /&gt;I can access 10.10.107.250 and 10.10.107.238 successfully from outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was changing the mask on outside interface from /8 to /23, and as far as the network 10.10.107.240/28 appears to "outside world" as part of "ASA controlled" range and traffic comes to ASA - everything works fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Router would not allow me to configure overlapping ranges, ASA does allow and able to pass traffic, which is good.&lt;BR /&gt;Basically the question becomes, is it a bug or a feature?&lt;/P&gt;&lt;P&gt;Thank you,&lt;BR /&gt;Alexander&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:04:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-overlapping-ip-ranges-on-outside-and-dmz-interfaces/m-p/1391974#M737953</guid>
      <dc:creator>a.gesse</dc:creator>
      <dc:date>2019-03-11T17:04:01Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - overlapping IP ranges on outside and dmz interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-overlapping-ip-ranges-on-outside-and-dmz-interfaces/m-p/1391975#M737957</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Use whatever subnet you wish on the DMZ physically and then you use STATICS to map the addresses to the global pool. Like this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# Interfaces&lt;/P&gt;&lt;P&gt;Outside: 10.10.104.2/22&lt;/P&gt;&lt;P&gt;DMZ: 192.168.1.0/24&lt;/P&gt;&lt;P&gt;Inside: 1.1.1.1/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# Maps the local server address 192.168.1.10 to the outside address of 10.10.104.10&lt;/P&gt;&lt;P&gt;static(DMZ,Outside) 192.168.1.10 10.10.104.10 netmask 255.255.255.255&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Feb 2010 13:11:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-overlapping-ip-ranges-on-outside-and-dmz-interfaces/m-p/1391975#M737957</guid>
      <dc:creator>Kent Heide</dc:creator>
      <dc:date>2010-02-02T13:11:26Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - overlapping IP ranges on outside and dmz interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-overlapping-ip-ranges-on-outside-and-dmz-interfaces/m-p/1391976#M737960</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is possible to use any addresses on DMZ with proper Static statement, that's right&lt;BR /&gt;But my task is to have DMZ with global addresses, (for Microsoft OCS).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can buy extra range (different from what I have on outside) and put on DMZ. That would work but require extra money.&lt;BR /&gt;Or I can use a small range from my existing /22 range on outside interface, and aparently i don't have to change mask on outside.&lt;/P&gt;&lt;P&gt;ASA accepts having overlapping IP ranges on outside and DMZ interfaces, unlike a router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What the honourable society of cisco asa users thinks about doing that?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;BR /&gt;Alexander&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Feb 2010 14:45:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-overlapping-ip-ranges-on-outside-and-dmz-interfaces/m-p/1391976#M737960</guid>
      <dc:creator>a.gesse</dc:creator>
      <dc:date>2010-02-02T14:45:37Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - overlapping IP ranges on outside and dmz interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-overlapping-ip-ranges-on-outside-and-dmz-interfaces/m-p/1391977#M737965</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What is the specific reason to as why static will not be the solution for you?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Feb 2010 15:46:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-overlapping-ip-ranges-on-outside-and-dmz-interfaces/m-p/1391977#M737965</guid>
      <dc:creator>Kent Heide</dc:creator>
      <dc:date>2010-02-02T15:46:51Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - overlapping IP ranges on outside and dmz interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-overlapping-ip-ranges-on-outside-and-dmz-interfaces/m-p/1391978#M737973</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, static is still in use, but it is like that, Global IP 64.1.1.101 from DMZ is mapped to itself on Outside:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,outside) 64.1.1.101 64.1.1.101 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Translations are working fine&lt;/P&gt;&lt;P&gt;My concern is if having overlapping IP spaces on ASA may cause any problem or reduce other functionality&lt;/P&gt;&lt;P&gt;Thanks &lt;BR /&gt;Alexander&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Feb 2010 16:19:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-overlapping-ip-ranges-on-outside-and-dmz-interfaces/m-p/1391978#M737973</guid>
      <dc:creator>a.gesse</dc:creator>
      <dc:date>2010-02-02T16:19:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - overlapping IP ranges on outside and dmz interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-overlapping-ip-ranges-on-outside-and-dmz-interfaces/m-p/1391979#M737992</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What you are doing there is called an identity NAT. It's basically an exempt if you wish. What is the problem with using a static for translating a local DMZ address to the address you wish to use on the outside interface for the OCS?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Feb 2010 16:54:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-overlapping-ip-ranges-on-outside-and-dmz-interfaces/m-p/1391979#M737992</guid>
      <dc:creator>Kent Heide</dc:creator>
      <dc:date>2010-02-02T16:54:51Z</dc:date>
    </item>
  </channel>
</rss>

