<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Advice Required for Setup in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/advice-required-for-setup/m-p/836060#M973582</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you can still NAT inbound traffic comming  from eth2 to 192.168.100.18 server &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g using RDP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl_eth2 permit tcp any host 192.168.100.18 eq 3389&lt;/P&gt;&lt;P&gt;access-group acl_eth2 in interface eth2&lt;/P&gt;&lt;P&gt;nat (eth3) 1 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global (eth2) 1 interface &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (eth3,eth2) interface 192.168.100.18 tcp 3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 18 Oct 2007 02:21:32 GMT</pubDate>
    <dc:creator>JORGE RODRIGUEZ</dc:creator>
    <dc:date>2007-10-18T02:21:32Z</dc:date>
    <item>
      <title>Advice Required for Setup</title>
      <link>https://community.cisco.com/t5/network-security/advice-required-for-setup/m-p/836057#M973579</link>
      <description>&lt;P&gt;Greetings&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As per my network setup, the scenario will be that the server on the untrust side will send data to the server on the Trusted site.&lt;/P&gt;&lt;P&gt;I have received in total 3 IP Addresses from the UNTRUST NETWORK PROVIDER those are as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. 10.150.39.253/24&lt;/P&gt;&lt;P&gt;2. 10.150.39.243&lt;/P&gt;&lt;P&gt;3. 10.150.39.244&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The first IP Address i.e. 10.150.39.253/24 is used for the WAN connection with the untrust network.&lt;/P&gt;&lt;P&gt;The rest of the two IPs have to be used for the Trusted Server Communication with Untrust Server. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In actual I have two firewalls used as an active/standby configuration.&lt;/P&gt;&lt;P&gt;Now I have the following issues:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I used the IP address 10.150.39.243 on Routers interface Fa0/0 and IP Address 10.150.39.244 on eth2 interface of Firewall than how can i perform the Nating for the Trusted Server IP Address?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also what IP Address than will be used for the Standby Firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mansoor Hafeez&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:25:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/advice-required-for-setup/m-p/836057#M973579</guid>
      <dc:creator>Mansoor Hafeez</dc:creator>
      <dc:date>2019-03-11T11:25:41Z</dc:date>
    </item>
    <item>
      <title>Re: Advice Required for Setup</title>
      <link>https://community.cisco.com/t5/network-security/advice-required-for-setup/m-p/836058#M973580</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mansoor, my question, why does un-trusted network have to dictate what IP address you should use in your FW eth2, in most cases  un-trusted in your scenario would be consider  a DMZ point in your firewall one that you have full admin  control, you should configure eth2 with a private subnet of your choice with a /24 and give the un-trusted entity an IP address from the /24 subnet for their Fe0/0 router interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In any case, in your scenario, for example  un-trusted network  wants to connect to trusted server  192.168.100.18   for RDP connection  in your inside LAN,  you give trusted server  192.168.100.18 a static nat address from the 10.150.39.x private ip block for inbound access, say you have allocated 10.150.39.40 for the NAT address translation  of your inside trusted server.&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;static (eth3,eth2) 10.150.30.40 192.168.100.18 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list eth2_access_in  permit tcp any  host 10.150.30.40 eq 3380&lt;/P&gt;&lt;P&gt;access-group eth2_access_in in interface eth2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For failover IP you need to allocate an IP address from the same 10.150.30.x IP subnet and use it for failover Ip address ,  go over this document for an overview of active/standby interface configurations.. if you have any questions please ask.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807dac5f.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807dac5f.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rgds&lt;/P&gt;&lt;P&gt;Jorge&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Oct 2007 03:07:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/advice-required-for-setup/m-p/836058#M973580</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2007-10-16T03:07:48Z</dc:date>
    </item>
    <item>
      <title>Re: Advice Required for Setup</title>
      <link>https://community.cisco.com/t5/network-security/advice-required-for-setup/m-p/836059#M973581</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have few limitations with me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. I cannot place the trusted server in DMZ zone. &lt;/P&gt;&lt;P&gt;2. I have to utilized the two IPs given by the untrust network personal.&lt;/P&gt;&lt;P&gt;3. Now how to utilize the two IPs is real issue as if one will be given to router interface and other will be given to firewall than I will not get the IP for Standby firewall as well as the IP for NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope that you now understand my issue...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Oct 2007 23:38:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/advice-required-for-setup/m-p/836059#M973581</guid>
      <dc:creator>Mansoor Hafeez</dc:creator>
      <dc:date>2007-10-17T23:38:37Z</dc:date>
    </item>
    <item>
      <title>Re: Advice Required for Setup</title>
      <link>https://community.cisco.com/t5/network-security/advice-required-for-setup/m-p/836060#M973582</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you can still NAT inbound traffic comming  from eth2 to 192.168.100.18 server &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g using RDP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl_eth2 permit tcp any host 192.168.100.18 eq 3389&lt;/P&gt;&lt;P&gt;access-group acl_eth2 in interface eth2&lt;/P&gt;&lt;P&gt;nat (eth3) 1 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global (eth2) 1 interface &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (eth3,eth2) interface 192.168.100.18 tcp 3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Oct 2007 02:21:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/advice-required-for-setup/m-p/836060#M973582</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2007-10-18T02:21:32Z</dc:date>
    </item>
    <item>
      <title>Re: Advice Required for Setup</title>
      <link>https://community.cisco.com/t5/network-security/advice-required-for-setup/m-p/836061#M973583</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry to bother you again. If you look again at my network setup What IP Address should be given to Router Interface fa0/0? What now i understand from your advice is that i will give the two IPs to eth2 interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please correct me if i am wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mansoor&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 21 Oct 2007 14:25:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/advice-required-for-setup/m-p/836061#M973583</guid>
      <dc:creator>Mansoor Hafeez</dc:creator>
      <dc:date>2007-10-21T14:25:41Z</dc:date>
    </item>
  </channel>
</rss>

