<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Secondary outside/wan IP address on FTD in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/secondary-outside-wan-ip-address-on-ftd/m-p/3874201#M942239</link>
    <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a 5508-X running FTD v6.2.3-83; it is configured in routed mode with "the usual" configuration: outside and inside interfaces / zones with traffic allowed out but not in. I also have AnyConnect services for remote access VPN services&lt;/P&gt;&lt;P&gt;I have a requirement to make a server behind the firewall accessible over https on the "standard port" (i.e. tcp/443) - as it stands, opening tcp/443 would mean removing the AnyConnect configuration which is not really an option (as I understand it, configuring remote-access VPN services on another port than tcp/443 is only possible from FMC, not FDM).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As my ISP provides me with several IP addresses on the link, I was thinking of doing the following:&lt;/P&gt;&lt;P&gt;- let's assume that &amp;lt;public-IP1&amp;gt; is the one currently configured on the outside interface and that &amp;lt;public-IP2&amp;gt; is routed by the ISP, not currently in use, and what my DNS record for the server will point to&lt;/P&gt;&lt;P&gt;- add a new NAT policy along the lines of:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp;Original Packet&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Interface = outside&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Source IP = any-ipv4&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Destination IP = &amp;lt;pubic-IP2&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Source Port = Any&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Destination Port = HTTPS&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; Destination Packet&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Interface = inside&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Source IP = any-ipv4&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Destination IP = &amp;lt;the-LAN-IP-of-my-server&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Source Port = Any&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Destination Port = HTTPS&lt;/P&gt;&lt;P&gt;- add a Access Rules as such:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; Source&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Zone = outside&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Networks = ANY&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Ports = ANY&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; Destination&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Zone = inside&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Networks =&amp;nbsp;&amp;lt;the-LAN-IP-of-my-server&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Ports = HTTPS&lt;/P&gt;&lt;P&gt;...i.e. pretty much how you'd open a port in the firewall usually, except that the "public IP" is not the same as the one configured on the outside interface of the ASA.&lt;/P&gt;&lt;P&gt;It makes sense to me, but as the ASA is currently in production I'd rather dot my I's and cross my T's beforehand... has someone tried that configuration before and got it working - am I missing something?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks in advance for the advice,&lt;/P&gt;&lt;P&gt;Olivier&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 17:13:34 GMT</pubDate>
    <dc:creator>olivier.vigneresse</dc:creator>
    <dc:date>2020-02-21T17:13:34Z</dc:date>
    <item>
      <title>Secondary outside/wan IP address on FTD</title>
      <link>https://community.cisco.com/t5/network-security/secondary-outside-wan-ip-address-on-ftd/m-p/3874201#M942239</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a 5508-X running FTD v6.2.3-83; it is configured in routed mode with "the usual" configuration: outside and inside interfaces / zones with traffic allowed out but not in. I also have AnyConnect services for remote access VPN services&lt;/P&gt;&lt;P&gt;I have a requirement to make a server behind the firewall accessible over https on the "standard port" (i.e. tcp/443) - as it stands, opening tcp/443 would mean removing the AnyConnect configuration which is not really an option (as I understand it, configuring remote-access VPN services on another port than tcp/443 is only possible from FMC, not FDM).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As my ISP provides me with several IP addresses on the link, I was thinking of doing the following:&lt;/P&gt;&lt;P&gt;- let's assume that &amp;lt;public-IP1&amp;gt; is the one currently configured on the outside interface and that &amp;lt;public-IP2&amp;gt; is routed by the ISP, not currently in use, and what my DNS record for the server will point to&lt;/P&gt;&lt;P&gt;- add a new NAT policy along the lines of:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp;Original Packet&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Interface = outside&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Source IP = any-ipv4&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Destination IP = &amp;lt;pubic-IP2&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Source Port = Any&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Destination Port = HTTPS&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; Destination Packet&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Interface = inside&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Source IP = any-ipv4&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Destination IP = &amp;lt;the-LAN-IP-of-my-server&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Source Port = Any&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Destination Port = HTTPS&lt;/P&gt;&lt;P&gt;- add a Access Rules as such:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; Source&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Zone = outside&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Networks = ANY&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Ports = ANY&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; Destination&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Zone = inside&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Networks =&amp;nbsp;&amp;lt;the-LAN-IP-of-my-server&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Ports = HTTPS&lt;/P&gt;&lt;P&gt;...i.e. pretty much how you'd open a port in the firewall usually, except that the "public IP" is not the same as the one configured on the outside interface of the ASA.&lt;/P&gt;&lt;P&gt;It makes sense to me, but as the ASA is currently in production I'd rather dot my I's and cross my T's beforehand... has someone tried that configuration before and got it working - am I missing something?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks in advance for the advice,&lt;/P&gt;&lt;P&gt;Olivier&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:13:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secondary-outside-wan-ip-address-on-ftd/m-p/3874201#M942239</guid>
      <dc:creator>olivier.vigneresse</dc:creator>
      <dc:date>2020-02-21T17:13:34Z</dc:date>
    </item>
    <item>
      <title>Re: Secondary outside/wan IP address on FTD</title>
      <link>https://community.cisco.com/t5/network-security/secondary-outside-wan-ip-address-on-ftd/m-p/3874724#M942245</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As your 2nd PUB IP is routed by your ISP to your primary IP, it shouldn't be a big deal.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For ACL, you're right.&lt;/P&gt;
&lt;P&gt;For Nat, here a screenshot how to configure it:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 796px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/38810i409BDA3DE777D065/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2019 02:48:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secondary-outside-wan-ip-address-on-ftd/m-p/3874724#M942245</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2019-06-18T02:48:21Z</dc:date>
    </item>
    <item>
      <title>Re: Secondary outside/wan IP address on FTD</title>
      <link>https://community.cisco.com/t5/network-security/secondary-outside-wan-ip-address-on-ftd/m-p/3877146#M942252</link>
      <description>&lt;P&gt;Hi Francesco,&lt;/P&gt;&lt;P&gt;For context, we have just sent the purchase order to buy 2 x 4110 appliances and I'm labbing like crazy to get a solid understanding of how Cisco Firepower works, i have no background in ASA or firepower (just PA, Forti ans Sophos) so i have a question about this process.....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I 100% totally agree with your answer, i know it works that way, my lab reflects it, but my question is....why?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The process of "publishing" an external address seems somewhat backward to me, when your publishing an IP address on the outside for a web-server on the inside for example, would the traffic not be initiated from the outside? so the NAT should be outside==&amp;gt;inside not inside==&amp;gt;outside? that's the way we configure the ACP, why is NAT different?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks heaps in advance if you answer as this has been bugging me for weeks &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Warren&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jun 2019 00:56:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secondary-outside-wan-ip-address-on-ftd/m-p/3877146#M942252</guid>
      <dc:creator>Warren Sullivan - Corp</dc:creator>
      <dc:date>2019-06-21T00:56:02Z</dc:date>
    </item>
    <item>
      <title>Re: Secondary outside/wan IP address on FTD</title>
      <link>https://community.cisco.com/t5/network-security/secondary-outside-wan-ip-address-on-ftd/m-p/3877196#M942255</link>
      <description>I agree the gui isn't the most explicit here. Behind the scene there's asa code called lina.&lt;BR /&gt;The real command is nat (real-ifce, mapped-ifce) which means your real service is in your inside while the mapped interface is where external users are coming to to hit your exposed service.&lt;BR /&gt;That's why you have to configure it this way.&lt;BR /&gt;&lt;BR /&gt;Here a link i always share to help people understand:&lt;BR /&gt;&lt;A href="http://www.practicalnetworking.net/stand-alone/cisco-asa-nat/#nat-syntax" target="_blank"&gt;http://www.practicalnetworking.net/stand-alone/cisco-asa-nat/#nat-syntax&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 21 Jun 2019 03:30:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secondary-outside-wan-ip-address-on-ftd/m-p/3877196#M942255</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2019-06-21T03:30:01Z</dc:date>
    </item>
  </channel>
</rss>

