<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA Routing (Network Addressing) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-routing-network-addressing/m-p/885476#M958790</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Technically, what you want is possible. But for efficently using ASA, you should meet the following requirements&lt;/P&gt;&lt;P&gt;  1)Inside and outside interfaces should be in different networks&lt;/P&gt;&lt;P&gt;  2)If all hosts including the seperated 6 will be pluuged into 1 switch, then you should apply VLANs. Or use a different hub or switch for these 6 hosts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 12 Dec 2007 20:11:20 GMT</pubDate>
    <dc:creator>Alan Huseyin Kayahan</dc:creator>
    <dc:date>2007-12-12T20:11:20Z</dc:date>
    <item>
      <title>ASA Routing (Network Addressing)</title>
      <link>https://community.cisco.com/t5/network-security/asa-routing-network-addressing/m-p/885473#M958787</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just wanted to know a basic answer I guess... does the ASA5510 only act as a routing device or can I deploy it within a network already having a router as a gateway?&lt;/P&gt;&lt;P&gt;I already have a network setup with around 100 hosts (out of 254). I have to deploy the firewall on 6 hosts within it, can I just assign IP addresses to its external and internal interface from within the network and connect those hosts to its internal interface ?&lt;/P&gt;&lt;P&gt;Or do I have to set it up as a gateway for those hosts ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Murtaza&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:42:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-routing-network-addressing/m-p/885473#M958787</guid>
      <dc:creator>csco11029214</dc:creator>
      <dc:date>2019-03-11T11:42:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Routing (Network Addressing)</title>
      <link>https://community.cisco.com/t5/network-security/asa-routing-network-addressing/m-p/885474#M958788</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Murtaza&lt;/P&gt;&lt;P&gt;    Sure you can. Tell us what exactly you want to achieve so that we can help in design.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2007 15:24:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-routing-network-addressing/m-p/885474#M958788</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2007-12-12T15:24:08Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Routing (Network Addressing)</title>
      <link>https://community.cisco.com/t5/network-security/asa-routing-network-addressing/m-p/885475#M958789</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Husy,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have 6 hosts on a network 31.8 - 31.13 , I want these hosts to be behind the ASA5510 so is it possible to connect the external interface of the ASA5510 to the switch and then the 6 hosts to its internal interface? The other hosts still remain connected to the switch. &lt;/P&gt;&lt;P&gt;So the ASA just acts as a bridge I guess and if I address it's external interface as 31.6 and the internal interface as 31.7 and the required hosts connected through a hub to 31.7, will the firewall server the purpose this way ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Murtaza&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2007 17:14:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-routing-network-addressing/m-p/885475#M958789</guid>
      <dc:creator>csco11029214</dc:creator>
      <dc:date>2007-12-12T17:14:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Routing (Network Addressing)</title>
      <link>https://community.cisco.com/t5/network-security/asa-routing-network-addressing/m-p/885476#M958790</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Technically, what you want is possible. But for efficently using ASA, you should meet the following requirements&lt;/P&gt;&lt;P&gt;  1)Inside and outside interfaces should be in different networks&lt;/P&gt;&lt;P&gt;  2)If all hosts including the seperated 6 will be pluuged into 1 switch, then you should apply VLANs. Or use a different hub or switch for these 6 hosts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2007 20:11:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-routing-network-addressing/m-p/885476#M958790</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2007-12-12T20:11:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Routing (Network Addressing)</title>
      <link>https://community.cisco.com/t5/network-security/asa-routing-network-addressing/m-p/885477#M958791</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, that means what I am thinking of doing is not possible on the same network within a single switch. What about Passive and Active firewall, can I achieve that if the firewall is mad Passive ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Dec 2007 12:37:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-routing-network-addressing/m-p/885477#M958791</guid>
      <dc:creator>csco11029214</dc:creator>
      <dc:date>2007-12-13T12:37:11Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Routing (Network Addressing)</title>
      <link>https://community.cisco.com/t5/network-security/asa-routing-network-addressing/m-p/885478#M958792</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please explain in details what you want to do with ASA, what benefits of ASA do you need and why do you seperate these 6 hosts. And what is the model of your switch?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Dec 2007 12:43:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-routing-network-addressing/m-p/885478#M958792</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2007-12-13T12:43:41Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Routing (Network Addressing)</title>
      <link>https://community.cisco.com/t5/network-security/asa-routing-network-addressing/m-p/885479#M958793</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, we have around 200 servers on the network 31.0 - 31.255 at the DC. One of our clients having 6 servers within needs his servers to be secured by ASA5510 with ACLs and Crypto tunnels. I have configured the firewall but I was looking for a way to deploy the firewall on those servers without actually changing the IP addresses of the servers.&lt;/P&gt;&lt;P&gt;Being technically aware that I should create a /29 subnet for the 6 servers and then deploy the firewall as the gateway, I was looking for a workaround as the guys at the data center will not put efforts in subnetting and I can not do it remotely.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Dec 2007 12:58:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-routing-network-addressing/m-p/885479#M958793</guid>
      <dc:creator>csco11029214</dc:creator>
      <dc:date>2007-12-13T12:58:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Routing (Network Addressing)</title>
      <link>https://community.cisco.com/t5/network-security/asa-routing-network-addressing/m-p/885480#M958794</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does any one have any suggestion for my situation ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Murtaza&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Dec 2007 11:53:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-routing-network-addressing/m-p/885480#M958794</guid>
      <dc:creator>csco11029214</dc:creator>
      <dc:date>2007-12-14T11:53:03Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Routing (Network Addressing)</title>
      <link>https://community.cisco.com/t5/network-security/asa-routing-network-addressing/m-p/885481#M958795</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Murtaza&lt;/P&gt;&lt;P&gt;  You really should make changes on infrastructure while adding a firewall doesnt matter if it is PIX, Microsoft ISA or etc. What you want achieve is a Demilitarized Zone (DMZ) for these 6 servers take place. But you can not assign IP adresses to two different interfaces in same network. Each interface should have different netwokrs.&lt;/P&gt;&lt;P&gt;  Besides as you know, a host do not require a gateway to pass through if the destination host is in same network, so firewall would not function in this case.&lt;/P&gt;&lt;P&gt;  A scruffy workaround is, adding another PIX or router, creating a network between, then creating one-to-one NATs like&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;x.x.31.8-- --172.16.1.8--R--x.x.31.8&lt;/P&gt;&lt;P&gt;x.x.31.9--A--172.16.1.9--O--x.x.31.9&lt;/P&gt;&lt;P&gt;x.x.31.10-S--172.16.1.10-U--x.x.31.10&lt;/P&gt;&lt;P&gt;x.x.31.11-A--172.16.1.11-T--x.x.31.11&lt;/P&gt;&lt;P&gt;x.x.31.12- --172.16.1.12-E--x.x.31.12&lt;/P&gt;&lt;P&gt;x.x.31.13- --172.16.1.13-R--x.x.31.13&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;^_______^  ^___________^  ^___________^&lt;/P&gt;&lt;P&gt;   DMZ       CO-NETWORK    REAL NETWORK&lt;/P&gt;&lt;P&gt;  &lt;/P&gt;&lt;P&gt;The CO-Network will be unseen for both real network and DMZ. ASA's outside interface is directly connected to router's inside interface. And router's outside interface is connected to real network.&lt;/P&gt;&lt;P&gt;  There is no other way than that. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Dec 2007 14:12:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-routing-network-addressing/m-p/885481#M958795</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2007-12-14T14:12:39Z</dc:date>
    </item>
  </channel>
</rss>

