<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 2nd dmz and nat config in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/2nd-dmz-and-nat-config/m-p/753374#M983711</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You do not have to NAT unless you want to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But in order to access a network from lower to higher security level you need a static and access-list statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you do not want to NAT it is quite simple, just configure a static for the entire network:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,BTWAN) 1.0.84.0 1.0.84.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You also need a route statement on each side, pointing to the BT router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And finally you need an access-list to let traffic enter from BTWAN. Apply it to the BTWAN interface:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group acl_btwan in interface BTWAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can indeed use the WAN link as a backup for outbound internet traffic. If the primary gateway is down that static route is removed and a static route to the BT network is installed in the routing table. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the documentation for it: &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806e880b.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806e880b.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You also have to configure NAT for the backup connection, something like global (BTWAN) 20 interface to let the internal network exit that way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 27 Jul 2007 09:58:12 GMT</pubDate>
    <dc:creator>mattiaseriksson</dc:creator>
    <dc:date>2007-07-27T09:58:12Z</dc:date>
    <item>
      <title>2nd dmz and nat config</title>
      <link>https://community.cisco.com/t5/network-security/2nd-dmz-and-nat-config/m-p/753368#M983705</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have two pix 515e's that I want to add second dmz interfaces on in order to route internal LAN traffic to each site over a managed mpls link. they site currently use a L2L.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have attached the current configs. Can anyone let me know what Nat / access rules / routing i should configure?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;J Mack&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:49:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2nd-dmz-and-nat-config/m-p/753368#M983705</guid>
      <dc:creator>johnnymac</dc:creator>
      <dc:date>2019-03-11T10:49:14Z</dc:date>
    </item>
    <item>
      <title>Re: 2nd dmz and nat config</title>
      <link>https://community.cisco.com/t5/network-security/2nd-dmz-and-nat-config/m-p/753369#M983706</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can anyone help with this? I'm starting to tear my hair out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;J Mack&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jul 2007 11:46:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2nd-dmz-and-nat-config/m-p/753369#M983706</guid>
      <dc:creator>johnnymac</dc:creator>
      <dc:date>2007-07-26T11:46:18Z</dc:date>
    </item>
    <item>
      <title>Re: 2nd dmz and nat config</title>
      <link>https://community.cisco.com/t5/network-security/2nd-dmz-and-nat-config/m-p/753370#M983707</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;J Mack,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try giving a more complete description of the problem. This may get you help faster. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jul 2007 13:26:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2nd-dmz-and-nat-config/m-p/753370#M983707</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-07-26T13:26:10Z</dc:date>
    </item>
    <item>
      <title>Re: 2nd dmz and nat config</title>
      <link>https://community.cisco.com/t5/network-security/2nd-dmz-and-nat-config/m-p/753371#M983708</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had already posted this. But again to no response. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have two 515e's at different locations which are currently connected using a L2L vpn. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have just had a managed BT MPLS link installed. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We gave BT our internal network ranges and they confirmed their side of the work has been completed. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what I want to do now is use the pix at either end to route and connect the internal networks. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So far I have managed to establish connectivity between the 515e's on their 192.168.1.0/24 and 192.168.3.0/24 networks but am not sure where to go now? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have posted the configs for both PIX's and would be really grateful if anoyone could help. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards &lt;/P&gt;&lt;P&gt;J Mack &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jul 2007 14:02:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2nd-dmz-and-nat-config/m-p/753371#M983708</guid>
      <dc:creator>johnnymac</dc:creator>
      <dc:date>2007-07-26T14:02:28Z</dc:date>
    </item>
    <item>
      <title>Re: 2nd dmz and nat config</title>
      <link>https://community.cisco.com/t5/network-security/2nd-dmz-and-nat-config/m-p/753372#M983709</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'd like to help you, but you need to be a lot more specific about what you want to do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You say that BT is routing the internal network, but you also say you want to configure NAT? Which is it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to NAT, what addresses do you need to access from each location? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do you want to permit? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The BTWAN has the same security level as the outside, do you want traffic to flow freely between those interfaces? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jul 2007 23:01:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2nd-dmz-and-nat-config/m-p/753372#M983709</guid>
      <dc:creator>mattiaseriksson</dc:creator>
      <dc:date>2007-07-26T23:01:11Z</dc:date>
    </item>
    <item>
      <title>Re: 2nd dmz and nat config</title>
      <link>https://community.cisco.com/t5/network-security/2nd-dmz-and-nat-config/m-p/753373#M983710</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We gave BT a list of our internal networks before they set up they MPLS. However i thought i may have to NAT as i'm using PIX's instead of routers?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The internal address at each location are 192.168.96.0/21 and 1.0.84.0/24. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't need the BTWAN and outside to flow freely as they both sites have they're own internet break outs. However i'd be interested to know if this is possible as a means of failover?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In short what i what to acheive is connect my internal LANS accross the MPLS, using my 515's to route internal traffic to the BT routers.   &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jul 2007 09:03:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2nd-dmz-and-nat-config/m-p/753373#M983710</guid>
      <dc:creator>johnnymac</dc:creator>
      <dc:date>2007-07-27T09:03:46Z</dc:date>
    </item>
    <item>
      <title>Re: 2nd dmz and nat config</title>
      <link>https://community.cisco.com/t5/network-security/2nd-dmz-and-nat-config/m-p/753374#M983711</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You do not have to NAT unless you want to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But in order to access a network from lower to higher security level you need a static and access-list statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you do not want to NAT it is quite simple, just configure a static for the entire network:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,BTWAN) 1.0.84.0 1.0.84.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You also need a route statement on each side, pointing to the BT router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And finally you need an access-list to let traffic enter from BTWAN. Apply it to the BTWAN interface:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group acl_btwan in interface BTWAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can indeed use the WAN link as a backup for outbound internet traffic. If the primary gateway is down that static route is removed and a static route to the BT network is installed in the routing table. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the documentation for it: &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806e880b.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806e880b.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You also have to configure NAT for the backup connection, something like global (BTWAN) 20 interface to let the internal network exit that way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jul 2007 09:58:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2nd-dmz-and-nat-config/m-p/753374#M983711</guid>
      <dc:creator>mattiaseriksson</dc:creator>
      <dc:date>2007-07-27T09:58:12Z</dc:date>
    </item>
    <item>
      <title>Re: 2nd dmz and nat config</title>
      <link>https://community.cisco.com/t5/network-security/2nd-dmz-and-nat-config/m-p/753375#M983712</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is very helpful,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would something like this be appropriate for the acl.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl_btwan permit ip 192.168.96.0 255.255.248.0 1.0.84.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group acl_btwan in interface BTWAN &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and for the second PIX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl_btwan permit ip  1.0.84.0 255.255.255.0 192.168.96.0 255.255.248.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group acl_btwan in interface BTWAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jul 2007 10:50:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2nd-dmz-and-nat-config/m-p/753375#M983712</guid>
      <dc:creator>johnnymac</dc:creator>
      <dc:date>2007-07-27T10:50:17Z</dc:date>
    </item>
    <item>
      <title>Re: 2nd dmz and nat config</title>
      <link>https://community.cisco.com/t5/network-security/2nd-dmz-and-nat-config/m-p/753376#M983713</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes. But then you will permit everything between the networks. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jul 2007 11:05:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2nd-dmz-and-nat-config/m-p/753376#M983713</guid>
      <dc:creator>mattiaseriksson</dc:creator>
      <dc:date>2007-07-27T11:05:22Z</dc:date>
    </item>
    <item>
      <title>Re: 2nd dmz and nat config</title>
      <link>https://community.cisco.com/t5/network-security/2nd-dmz-and-nat-config/m-p/753377#M983714</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It will but, it is all going to be part of the same domain. So this is really a LAN extension. Would you do this differently?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jul 2007 11:09:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2nd-dmz-and-nat-config/m-p/753377#M983714</guid>
      <dc:creator>johnnymac</dc:creator>
      <dc:date>2007-07-27T11:09:16Z</dc:date>
    </item>
    <item>
      <title>Re: 2nd dmz and nat config</title>
      <link>https://community.cisco.com/t5/network-security/2nd-dmz-and-nat-config/m-p/753378#M983715</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the information that passes between the sites is very sensitive, I would use IPSec between the firewalls to encrypt everything over the provider network. Or I might use IPSec anyway acctually, just in case &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jul 2007 11:26:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2nd-dmz-and-nat-config/m-p/753378#M983715</guid>
      <dc:creator>mattiaseriksson</dc:creator>
      <dc:date>2007-07-27T11:26:05Z</dc:date>
    </item>
    <item>
      <title>Re: 2nd dmz and nat config</title>
      <link>https://community.cisco.com/t5/network-security/2nd-dmz-and-nat-config/m-p/753379#M983716</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok thanks, i'll look into that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just one more question, after adding the static command i can now ping 192.168.3.2 from a node on the 1.0.84.0 network however i cannot ping the bt router int, 192.168.3.1. (this is pingable from the PIX). Does that seem correct to you?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;j mack&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jul 2007 12:04:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2nd-dmz-and-nat-config/m-p/753379#M983716</guid>
      <dc:creator>johnnymac</dc:creator>
      <dc:date>2007-07-27T12:04:37Z</dc:date>
    </item>
    <item>
      <title>Re: 2nd dmz and nat config</title>
      <link>https://community.cisco.com/t5/network-security/2nd-dmz-and-nat-config/m-p/753380#M983717</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Then it does not look like the BT router knows about the 1.0.84.0 network, which it probably should do. And you can't reach the remote network as well?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 28 Jul 2007 07:51:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2nd-dmz-and-nat-config/m-p/753380#M983717</guid>
      <dc:creator>mattiaseriksson</dc:creator>
      <dc:date>2007-07-28T07:51:13Z</dc:date>
    </item>
    <item>
      <title>Re: 2nd dmz and nat config</title>
      <link>https://community.cisco.com/t5/network-security/2nd-dmz-and-nat-config/m-p/753381#M983718</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi ya,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What are your core switches at both sites? Do you have 3550's at both sites? If so I wouldn't be terminating the MPLS onto the PIX's you can terminate them directly onto the core switch (if you have layer 3 switches) using gre tunnels. This will be much simpler and faster throughput.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The method of terminating it directly onto the PIX will be a nightmare to setup redundancy for your internet link depending on how your clients currently get out to the internet. Are you using proxies in each location sitting in the DMZ - or do clients route straight out to the internet?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know what switches you have as it may be a better solution for you. Also PIX's are really shite at routing - anything complex and it get's pretty ugly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MM&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Aug 2007 08:24:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2nd-dmz-and-nat-config/m-p/753381#M983718</guid>
      <dc:creator>mightymouse2045</dc:creator>
      <dc:date>2007-08-08T08:24:41Z</dc:date>
    </item>
  </channel>
</rss>

