<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Single Public IP on ASA Firewal in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/single-public-ip-on-asa-firewal/m-p/3737853#M9174</link>
    <description>&lt;P&gt;you can use any port, say 2323 and port forward that to the routers internal IP and tcp port 23.&amp;nbsp; Now, opening it up external;ly is not recommended.&amp;nbsp; so make sure you use strong passwords,&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 02 Nov 2018 12:31:44 GMT</pubDate>
    <dc:creator>Dennis Mink</dc:creator>
    <dc:date>2018-11-02T12:31:44Z</dc:date>
    <item>
      <title>Single Public IP on ASA Firewal</title>
      <link>https://community.cisco.com/t5/network-security/single-public-ip-on-asa-firewal/m-p/3736121#M9166</link>
      <description>&lt;P&gt;hi all,&lt;/P&gt;
&lt;P&gt;i just need a quick confirmation. i got a site that will use ASA 5525-X to PAT internal users to internet and establish a site-to-site IPSec VPN to HQ using a single public IP address on the WAN/outside interface.&lt;/P&gt;
&lt;P&gt;i usually get a /30 public WAN and /28 or /29 public LAN IPs but this time i just got a WAN IP.&lt;/P&gt;
&lt;P&gt;my question, is it possible to use the single public IP for:&lt;/P&gt;
&lt;P&gt;- PAT inside users&lt;/P&gt;
&lt;P&gt;- build site-to-site IPSec VPN&lt;/P&gt;
&lt;P&gt;-for port forwarding for the router behind the FW for remote access (from internet)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;also, is my NAT statements/sequence correct? i.e. configure the static/port forwarding first, then the identity/"no NAT" for the internal subnet to VPN to HQ, last would be dynamic NAT/PAT using &lt;STRONG&gt;after-auto&lt;/STRONG&gt; keyword.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network OBJ-RT01&amp;nbsp;&amp;nbsp; &amp;lt;&amp;lt;&amp;lt; PORT FORWARD TO ROUTER USING WAN/OUTSIDE IP&lt;BR /&gt;&amp;nbsp;host 192.168.128.1&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 22 22&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network OBJ-192.168.128.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;&amp;lt;&amp;lt; "NO NAT" ON INTERNAL SUBNET TOWARDS HQ&lt;BR /&gt;&amp;nbsp;subnet 192.168.128.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;nat (inside,outside) source static OBJ-192.168.128.0 OBJ-192.168.128.0 destination static OBJ-192.168.128.0 OBJ-192.168.128.0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network OBJ-192.168.128.0&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;&amp;lt;&amp;lt; DYNAMIC NAT/PAT INTERNAL USERS&lt;BR /&gt;&amp;nbsp;subnet 192.168.128.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;nat (inside,outside) after-auto 1 source dynamic interface&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:24:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-public-ip-on-asa-firewal/m-p/3736121#M9166</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2020-02-21T16:24:57Z</dc:date>
    </item>
    <item>
      <title>Re: Single Public IP on ASA Firewal</title>
      <link>https://community.cisco.com/t5/network-security/single-public-ip-on-asa-firewal/m-p/3736143#M9169</link>
      <description>&lt;P&gt;yes strictly speaking this is possible, you can have your outside if (IP address respond to isakmp/ipsec/esp) to establish a tunnel. at the same time do a port forward on for instance 443 to an internal webserver.&amp;nbsp; Then on the out, do an overload for internal to external browsing.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Oct 2018 02:59:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-public-ip-on-asa-firewal/m-p/3736143#M9169</guid>
      <dc:creator>Dennis Mink</dc:creator>
      <dc:date>2018-10-31T02:59:38Z</dc:date>
    </item>
    <item>
      <title>Re: Single Public IP on ASA Firewal</title>
      <link>https://community.cisco.com/t5/network-security/single-public-ip-on-asa-firewal/m-p/3736145#M9170</link>
      <description>&lt;P&gt;hi dennis,&lt;/P&gt;
&lt;P&gt;thanks! i just made an edit to my question.&lt;/P&gt;
&lt;P&gt;could you also confirm my NAT statements and sequence if they're correct?&lt;/P&gt;</description>
      <pubDate>Wed, 31 Oct 2018 03:03:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-public-ip-on-asa-firewal/m-p/3736145#M9170</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2018-10-31T03:03:32Z</dc:date>
    </item>
    <item>
      <title>Re: Single Public IP on ASA Firewal</title>
      <link>https://community.cisco.com/t5/network-security/single-public-ip-on-asa-firewal/m-p/3736147#M9171</link>
      <description>A cursory look at your config samples look good. &lt;BR /&gt;</description>
      <pubDate>Wed, 31 Oct 2018 03:05:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-public-ip-on-asa-firewal/m-p/3736147#M9171</guid>
      <dc:creator>gbekmezi-DD</dc:creator>
      <dc:date>2018-10-31T03:05:45Z</dc:date>
    </item>
    <item>
      <title>Re: Single Public IP on ASA Firewal</title>
      <link>https://community.cisco.com/t5/network-security/single-public-ip-on-asa-firewal/m-p/3736148#M9172</link>
      <description>&lt;P&gt;They Look good to me, please note dont forget to open 80/443 to your internal IP address on the outside IF ingress ACL as well&lt;/P&gt;</description>
      <pubDate>Wed, 31 Oct 2018 03:14:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-public-ip-on-asa-firewal/m-p/3736148#M9172</guid>
      <dc:creator>Dennis Mink</dc:creator>
      <dc:date>2018-10-31T03:14:53Z</dc:date>
    </item>
    <item>
      <title>Re: Single Public IP on ASA Firewal</title>
      <link>https://community.cisco.com/t5/network-security/single-public-ip-on-asa-firewal/m-p/3737733#M9173</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;
&lt;P&gt;just another quick question, i got a cisco router behind the ASA FW that i need to remote access:&lt;/P&gt;
&lt;P&gt;router &amp;lt;&amp;gt; ASA &amp;lt;&amp;gt; internet&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i already got SSH enabled on ASA 'outside' and able to SSH remotely, so my questions:&lt;/P&gt;
&lt;P&gt;1) can i use telnet/TCP 23 to port forward to the router? or do i nee to use non common TCP ports, i.e. 2323&lt;/P&gt;
&lt;P&gt;2) do i configure port forward as tcp 23 23 or tcp 23 2323?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;object network OBJ-RT01&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;host 192.168.0.230&amp;nbsp;&amp;nbsp; &amp;lt;&amp;lt;&amp;lt; ROUTER WAN IP&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;nat (inside,outside) static interface service tcp &lt;FONT color="#FF0000"&gt;23 23&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;FONT color="#000000"&gt;object network OBJ-RT01&lt;BR /&gt;&amp;nbsp;host 192.168.0.230&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp &lt;FONT color="#FF0000"&gt;2323 2323&lt;/FONT&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2) do i need a static/identity NAT for the router's WAN IP (192.168.0.230)?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;object network OBJ-192.168.0.230&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;host 192.168.0.230&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;nat (inside,outside) static OBJ-192.168.0.230&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Nov 2018 06:58:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-public-ip-on-asa-firewal/m-p/3737733#M9173</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2018-11-02T06:58:56Z</dc:date>
    </item>
    <item>
      <title>Re: Single Public IP on ASA Firewal</title>
      <link>https://community.cisco.com/t5/network-security/single-public-ip-on-asa-firewal/m-p/3737853#M9174</link>
      <description>&lt;P&gt;you can use any port, say 2323 and port forward that to the routers internal IP and tcp port 23.&amp;nbsp; Now, opening it up external;ly is not recommended.&amp;nbsp; so make sure you use strong passwords,&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Nov 2018 12:31:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-public-ip-on-asa-firewal/m-p/3737853#M9174</guid>
      <dc:creator>Dennis Mink</dc:creator>
      <dc:date>2018-11-02T12:31:44Z</dc:date>
    </item>
    <item>
      <title>Re: Single Public IP on ASA Firewal</title>
      <link>https://community.cisco.com/t5/network-security/single-public-ip-on-asa-firewal/m-p/3738102#M9175</link>
      <description>I’d add you don’t need to change the port the router uses for ssh to 23.  You can continue to use 22 on the router for SSH.  Create an access list on the ASA to only allow that ssh session from known sources.&lt;BR /&gt;</description>
      <pubDate>Fri, 02 Nov 2018 16:58:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-public-ip-on-asa-firewal/m-p/3738102#M9175</guid>
      <dc:creator>gbekmezi-DD</dc:creator>
      <dc:date>2018-11-02T16:58:37Z</dc:date>
    </item>
  </channel>
</rss>

