<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Routing design help on ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/routing-design-help-on-asa/m-p/1436701#M856814</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you please verify this configuration when ASA is configured for DMZ interface and route between vlans&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; description LAN1&lt;BR /&gt; vlan 1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.0.5.2 255.255.255.0&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; description LAN2&lt;BR /&gt; vlan 2&lt;BR /&gt; nameif DMZ2&lt;BR /&gt; security-level 90&lt;BR /&gt; ip address 10.0.6.2 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 11.12.13.14 255.255.255.240&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside-Outside traffic&lt;BR /&gt;nat (inside) 1 10.0.5.0 255.255.255.0&lt;BR /&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Outside-Inside traffic&lt;BR /&gt;access-list outside_in remark Permit outside access to inside networks&lt;BR /&gt;access-list outside_in extended permit tcp any host 11.12.13.14 eq www&lt;BR /&gt;access-list outside_in extended permit tcp any host 11.12.13.14 eq 81&lt;BR /&gt;access-list outside_in extended permit tcp any host 11.12.13.14 eq 82&lt;BR /&gt;access-list outside_in extended permit tcp any host 11.12.13.14 eq https&lt;BR /&gt;access-group outside_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 11.12.13.14 www 10.0.5.12 www netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp 11.12.13.14 81 10.0.5.12 81 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp 11.12.13.14 82 10.0.5.12 82 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp 11.12.13.14 https 10.0.5.14 https netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DMZ2-Outside traffic &lt;BR /&gt;nat (DMZ2) 2 10.0.6.0 255.255.255.0&lt;BR /&gt;global (outside) 2 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Outside-DMZ2 traffic&lt;BR /&gt;No portforwarding needed as DMZ2 is all workstations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside-DMZ2 traffic&lt;BR /&gt;nat (inside) 0 access-list inside_nonat_outbound&lt;BR /&gt;access-list inside_nonat_outbound extended permit ip 10.0.5.0 255.255.255.0 10.0.6.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DMZ2-Inside traffic &lt;BR /&gt;nat (DMZ2) 0 access-list inside_nonat_outbound&lt;BR /&gt;access-list inside_nonat_outbound extended permit ip 10.0.6.0 255.255.255.0 10.0.5.0 255.255.255.0&lt;BR /&gt;access-list DMZ2_Traffic extended permit ip any any&lt;BR /&gt;access-list DMZ2_Traffic extended permit tcp any any&lt;BR /&gt;access-group DMZ2_Traffic in interface DMZ2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 03 May 2010 22:21:07 GMT</pubDate>
    <dc:creator>sarat1317</dc:creator>
    <dc:date>2010-05-03T22:21:07Z</dc:date>
    <item>
      <title>Routing design help on ASA</title>
      <link>https://community.cisco.com/t5/network-security/routing-design-help-on-asa/m-p/1436697#M856810</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a client who added more users on the network which made by DHCP scope full which is on Class C network. Current network as below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LAN -&amp;gt; L2 switches -&amp;gt; ASA 5510 -&amp;gt; ISP router. All workstations currently have GW pointed to ASA which is doing routing and firewalling&lt;/P&gt;&lt;P&gt;All workstations and servers are on VLAN1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I see I have 2 options here&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Change to class B network&lt;/LI&gt;&lt;LI&gt;Create Layer 3 network and add another VLAN2 and move some departments to the new VLAN&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I prefer option2 as I have 12 site-site VPNs on ASA and dont want to take downtime to change the tunnel configs to change to Class B network&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I choose Option2,&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Is it good to install a layer3 switch, create VLANs and do routing through that switch and just use ASA for firewalling or&lt;/LI&gt;&lt;LI&gt;Is it good to configure a subinterface or use eth0/2 on ASA, create as DMZ interface (VLAN2), configure ACLs for intervlan routing on ASA so I can eliminate using layer3 switch on the network? &lt;UL&gt;&lt;LI&gt;DMZ interface will only have workstations that will access the servers on VLAN1&lt;/LI&gt;&lt;LI&gt;I will create a DHCP scope for VLAN2 IP scheme on the server and configure VLAN2 workstations to have GW pointed to DMZ interface IP. I am hoping there will not be any issue for VLAN2 workstations to receive DHCP IPs from server on VLAN1&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your time&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:37:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-design-help-on-asa/m-p/1436697#M856810</guid>
      <dc:creator>sarat1317</dc:creator>
      <dc:date>2019-03-11T17:37:31Z</dc:date>
    </item>
    <item>
      <title>Re: Routing design help on ASA</title>
      <link>https://community.cisco.com/t5/network-security/routing-design-help-on-asa/m-p/1436698#M856811</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello There&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think your option 2 is the best as well, and adding to that, I think eliminating the option of using a L3 on the network its also a good Idea. I think the only thing that you need to do is to create the vlan2 and put the interface over there, create the NAT rules and the access list depending on the sec level that you assign to that new interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That way all of&amp;nbsp; the traffic would be watched by the firewall increasing the security.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if you have any doubts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Apr 2010 17:32:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-design-help-on-asa/m-p/1436698#M856811</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-04-26T17:32:18Z</dc:date>
    </item>
    <item>
      <title>Re: Routing design help on ASA</title>
      <link>https://community.cisco.com/t5/network-security/routing-design-help-on-asa/m-p/1436699#M856812</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You say you have used all of your private class C address' but your network topology suggests that you have only used a small portion of the class C.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please confirm that you have used all 65534 host address'?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Private Class C:&lt;/P&gt;&lt;P&gt;192.168.0.0 - 192.168.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have not used all 65534 hosts then you have some new choices available to you.&lt;/P&gt;&lt;P&gt;1) change your subnet to include all hosts for your private class C.&lt;/P&gt;&lt;P&gt;2) add additional subnets, i believe this was your 2nd option.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have over 200 hosts in use then preparing for a medium size toplogy should be a top priority.&amp;nbsp; I would also be mindful of IPv6 when making changes so that you will have little to no work to do when you introduce IPv6.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For a organization moving from a small to a medium size topology segmentation and control is generally the first hurdle to overcome. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Introduction to a Medium Size organization:&lt;/P&gt;&lt;P&gt;VLAN1 - native&lt;/P&gt;&lt;P&gt;VLAN2 - DMZ&lt;/P&gt;&lt;P&gt;VLAN3 - Servers&lt;/P&gt;&lt;P&gt;VLAN4 - WLAN&lt;/P&gt;&lt;P&gt;VLAN5 - Workstations&lt;/P&gt;&lt;P&gt;VLAN6 thru VLAN7- WAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Don't forget to save yourself growth space so that DMZ1 and DMZ2 are not VLAN2 and VLAN17.&amp;nbsp; The same goes for address' planning.&amp;nbsp; I generally tell people to plan for the next level up.&amp;nbsp; So plan for your intro to med to become a huge medium that requires the use of the entire 65k+ hosts.&amp;nbsp; You may want to look at doing this in conjunction with converting/introducing Private Class B.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you truly have exceeded the private class C then I would definitly recommend introducing a L3 device.&amp;nbsp; If you have actually exhausted all of the class C subnets then you should look at introducing&amp;nbsp; Class A, Class B, and Class C privates or purchasing a class B public address block.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For an environment of that size you should probabally have the following.&lt;/P&gt;&lt;P&gt;(vlans in no specific order or number)&lt;/P&gt;&lt;P&gt;VLAN1 - native&lt;/P&gt;&lt;P&gt;VLAN2 - DMZ&lt;/P&gt;&lt;P&gt;VLAN3 - Intermix1 (DMZ to Inside Zones)&lt;/P&gt;&lt;P&gt;VLAN4 - Windows Servers (inside1)&lt;/P&gt;&lt;P&gt;VLAN5 - Unix/Linux Servers (inside2)&lt;/P&gt;&lt;P&gt;VLAN6 - Intermix2 (inside to secure zones)&lt;/P&gt;&lt;P&gt;VLAN7 - Windows Secure (secure1)&lt;/P&gt;&lt;P&gt;VLAN8 - Unix/Linux Secure (secure2)&lt;/P&gt;&lt;P&gt;VLAN9 - WLAN&lt;/P&gt;&lt;P&gt;VLAN10 thru VLAN20 - Workstations (inside3)&lt;/P&gt;&lt;P&gt;VLAN21 thru VLAN30 - ISP (WAN)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With 65k+ hosts you generally see a minimum of 20VLANS.&amp;nbsp; Also good to note that by "secure zones" i am refering to the data storage zones, but if your data storage is not a ip based solution, like ISCSI, then you may want to move the servers/devices that connect to the storage in the secure zone.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Apr 2010 17:59:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-design-help-on-asa/m-p/1436699#M856812</guid>
      <dc:creator>rwagner</dc:creator>
      <dc:date>2010-04-26T17:59:31Z</dc:date>
    </item>
    <item>
      <title>Re: Routing design help on ASA</title>
      <link>https://community.cisco.com/t5/network-security/routing-design-help-on-asa/m-p/1436700#M856813</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry. I should have said Class C with /24 subnet and my option1 was about changing to a different subnet. Was in a bit hurry typing the original message twice as my page expired. Really, I will be flying if I am somewhere managing 65k hosts!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway thank you for your guidelines. That is helpful. I guess I will just go with my second option that you also mentioned. I am working on the config now&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Apr 2010 20:17:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-design-help-on-asa/m-p/1436700#M856813</guid>
      <dc:creator>sarat1317</dc:creator>
      <dc:date>2010-04-26T20:17:24Z</dc:date>
    </item>
    <item>
      <title>Re: Routing design help on ASA</title>
      <link>https://community.cisco.com/t5/network-security/routing-design-help-on-asa/m-p/1436701#M856814</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you please verify this configuration when ASA is configured for DMZ interface and route between vlans&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; description LAN1&lt;BR /&gt; vlan 1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.0.5.2 255.255.255.0&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; description LAN2&lt;BR /&gt; vlan 2&lt;BR /&gt; nameif DMZ2&lt;BR /&gt; security-level 90&lt;BR /&gt; ip address 10.0.6.2 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 11.12.13.14 255.255.255.240&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside-Outside traffic&lt;BR /&gt;nat (inside) 1 10.0.5.0 255.255.255.0&lt;BR /&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Outside-Inside traffic&lt;BR /&gt;access-list outside_in remark Permit outside access to inside networks&lt;BR /&gt;access-list outside_in extended permit tcp any host 11.12.13.14 eq www&lt;BR /&gt;access-list outside_in extended permit tcp any host 11.12.13.14 eq 81&lt;BR /&gt;access-list outside_in extended permit tcp any host 11.12.13.14 eq 82&lt;BR /&gt;access-list outside_in extended permit tcp any host 11.12.13.14 eq https&lt;BR /&gt;access-group outside_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 11.12.13.14 www 10.0.5.12 www netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp 11.12.13.14 81 10.0.5.12 81 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp 11.12.13.14 82 10.0.5.12 82 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp 11.12.13.14 https 10.0.5.14 https netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DMZ2-Outside traffic &lt;BR /&gt;nat (DMZ2) 2 10.0.6.0 255.255.255.0&lt;BR /&gt;global (outside) 2 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Outside-DMZ2 traffic&lt;BR /&gt;No portforwarding needed as DMZ2 is all workstations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside-DMZ2 traffic&lt;BR /&gt;nat (inside) 0 access-list inside_nonat_outbound&lt;BR /&gt;access-list inside_nonat_outbound extended permit ip 10.0.5.0 255.255.255.0 10.0.6.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DMZ2-Inside traffic &lt;BR /&gt;nat (DMZ2) 0 access-list inside_nonat_outbound&lt;BR /&gt;access-list inside_nonat_outbound extended permit ip 10.0.6.0 255.255.255.0 10.0.5.0 255.255.255.0&lt;BR /&gt;access-list DMZ2_Traffic extended permit ip any any&lt;BR /&gt;access-list DMZ2_Traffic extended permit tcp any any&lt;BR /&gt;access-group DMZ2_Traffic in interface DMZ2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 May 2010 22:21:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-design-help-on-asa/m-p/1436701#M856814</guid>
      <dc:creator>sarat1317</dc:creator>
      <dc:date>2010-05-03T22:21:07Z</dc:date>
    </item>
    <item>
      <title>Re: Routing design help on ASA</title>
      <link>https://community.cisco.com/t5/network-security/routing-design-help-on-asa/m-p/1436702#M856815</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you please verify this configuration when ASA is configured for DMZ interface and route between vlans&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;description LAN1&lt;BR /&gt;vlan 1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.0.5.2 255.255.255.0&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;description LAN2&lt;BR /&gt;vlan 2&lt;BR /&gt;nameif DMZ2&lt;BR /&gt;security-level 90&lt;BR /&gt;ip address 10.0.6.2 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 11.12.13.14 255.255.255.240&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside-Outside traffic&lt;BR /&gt;nat (inside) 1 10.0.5.0 255.255.255.0&lt;BR /&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Outside-Inside traffic&lt;BR /&gt;access-list outside_in remark Permit outside access to inside networks&lt;BR /&gt;access-list outside_in extended permit tcp any host 11.12.13.14 eq www&lt;BR /&gt;access-list outside_in extended permit tcp any host 11.12.13.14 eq 81&lt;BR /&gt;access-list outside_in extended permit tcp any host 11.12.13.14 eq 82&lt;BR /&gt;access-list outside_in extended permit tcp any host 11.12.13.14 eq https&lt;BR /&gt;access-group outside_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 11.12.13.14 www 10.0.5.12 www netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp 11.12.13.14 81 10.0.5.12 81 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp 11.12.13.14 82 10.0.5.12 82 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp 11.12.13.14 https 10.0.5.14 https netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DMZ2-Outside traffic &lt;BR /&gt;nat (DMZ2) 2 10.0.6.0 255.255.255.0&lt;BR /&gt;global (outside) 2 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Outside-DMZ2 traffic&lt;BR /&gt;No portforwarding needed as DMZ2 is all workstations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside-DMZ2 traffic&lt;BR /&gt;nat (inside) 0 access-list inside_nonat_outbound&lt;BR /&gt;access-list inside_nonat_outbound extended permit ip 10.0.5.0 255.255.255.0 10.0.6.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DMZ2-Inside traffic &lt;BR /&gt;nat (DMZ2) 0 access-list inside_nonat_outbound&lt;BR /&gt;access-list inside_nonat_outbound extended permit ip 10.0.6.0 255.255.255.0 10.0.5.0 255.255.255.0&lt;BR /&gt;access-list DMZ2_Traffic extended permit ip any any&lt;BR /&gt;access-list DMZ2_Traffic extended permit tcp any any&lt;BR /&gt;access-group DMZ2_Traffic in interface DMZ2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 May 2010 16:22:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-design-help-on-asa/m-p/1436702#M856815</guid>
      <dc:creator>sarat1317</dc:creator>
      <dc:date>2010-05-04T16:22:52Z</dc:date>
    </item>
    <item>
      <title>Re: Routing design help on ASA</title>
      <link>https://community.cisco.com/t5/network-security/routing-design-help-on-asa/m-p/1436703#M856816</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can someone please verify this configuration in my previous post?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And also I have a DHCP server with 10.0.5.10 with gateway 10.0.5.2 currently providing DHCP IPs for hosts on 10.0.5.x network. I want to create another DHCP scope (10.0.6.x) on the same server to provide DHCP IPs for hosts on 10.0.6.x network. Hosts on 10.0.6.x has the gateway 10.0.6.2. As I do not have a layer 3 device, should I use DHCP relay configuration on ASA as below so the hosts on 10.0.6.x contact 10.0.5.10?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcprelay server 10.0.5.10 inside&lt;/P&gt;&lt;P&gt;dhcprelay enable DMZ2&lt;BR /&gt;dhcprelay setroute DMZ2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Sarat&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Jul 2010 17:07:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-design-help-on-asa/m-p/1436703#M856816</guid>
      <dc:creator>sarat1317</dc:creator>
      <dc:date>2010-07-22T17:07:45Z</dc:date>
    </item>
    <item>
      <title>Re: Routing design help on ASA</title>
      <link>https://community.cisco.com/t5/network-security/routing-design-help-on-asa/m-p/1436704#M856817</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration looks correct. You are right in that you have to use DHCP&lt;/P&gt;&lt;P&gt;Relay to achieve what you are looking for. You can use the ASA as a DHCP&lt;/P&gt;&lt;P&gt;server as well if you like.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example091&lt;/P&gt;&lt;P&gt;86a008075fcfb.shtml&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Jul 2010 17:41:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-design-help-on-asa/m-p/1436704#M856817</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-07-22T17:41:18Z</dc:date>
    </item>
    <item>
      <title>Re: Routing design help on ASA</title>
      <link>https://community.cisco.com/t5/network-security/routing-design-help-on-asa/m-p/1436705#M856818</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I came across another question when I put the design on paper. If I use the server to configure both pools and ASA as DHCP relay, how does the server know to assign 10.0.6.x IPs to certain group of hosts? I have 10 programs and wanted to put hosts on 4 programs in 10.0.6.x and hosts on 6 programs in 10.0.5.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Sarat&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Sep 2010 14:10:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-design-help-on-asa/m-p/1436705#M856818</guid>
      <dc:creator>sarat1317</dc:creator>
      <dc:date>2010-09-01T14:10:10Z</dc:date>
    </item>
    <item>
      <title>Re: Routing design help on ASA</title>
      <link>https://community.cisco.com/t5/network-security/routing-design-help-on-asa/m-p/1436706#M856819</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is something you configure on the server. The server can have bindings on the mac that is requesting an ip and assign the ip addresses that you want.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is something the the ASA is not involved with and the dhcp server should be configured to do it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Sep 2010 22:10:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-design-help-on-asa/m-p/1436706#M856819</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-09-01T22:10:33Z</dc:date>
    </item>
  </channel>
</rss>

