11-05-2017 08:34 AM - edited 02-21-2020 06:38 AM
I just purchased a 5506 and would like some guidance. First I'll say that I'm pretty green and trying to learn so be patient with me. I thought I read that the 5506 supports more networks than the 5505 and they can route traffic between each other. I would like to do the following, first define 3 networks (net1, net2 and net3), connect to remote vpn and route traffic between net1 and net2. network 3 will be my guest network. I have the following working
vpn connected
net1 routes to the internet
net1 routes to remove network over VPN
net2 routes to the internet
net3 routes to the internet
Do I accomplish with setting up a NAT rule between net1 and net2? Do they need the same network security level?
11-05-2017 01:01 PM
Hi @grggyoung
The answer depends on your environment. NAT is required when traffic goes to the Internet, when you have VPN with remote site and they have the same IP range as you or if you just want to hide your IP addressing.
Security level also depends on you. Usually Internet interface gets Security level 0 and Inside interface 100.
If net 1 and net 2 are inside interface they can get same security level of 100. This make it easier to manage traffic.
-If I helped you somehow, please, rate it as useful.-
11-06-2017 02:02 AM
Cisco ASA 5506-X next-gen firewall with FirePOWER Services. There have been questions regarding the ASA 5506-X not supporting L2 switch ports and what alternatives to consider to provide this support.
For those instances where customers require L2 switching capabilities with the ASA5506-X, the following options are available:
The ASA 5506-X brings Cisco’s threat-protection capability to small to midsize businesses and distributed enterprises. Added features include:
Answering your question regarding NAT, I would say that there is no such hard and fast requirement of NAT within internal network. I depends upon your choice if you want to mask your real IP, you can sure go ahead and do it.
It is mandatory in Case, when you need to go to internet.
Now regarding security level, The internet facing interface must need to kept at lowest security level, usually it is kept 0. Rest of interfaces can be kept at same security but if you need to allow a command "same-security-traffic permit inter-interface command"
Now to add to this statement, you can also get it done by using acls but,
then if you have an interface with an ACL and another interface without an ACL and you want to pass traffic between the two interfaces, then the interface without an ACL will rely on the security level while the interface with the ACL configured will rely on the ACL entries configured.
The security-level interface becomes irrelevant if an ACL is applied to filter traffic on that particular interface. Thus, traffic flow that is not permitted in the ACL will be dropped due to the "implicit deny" at the end of the ACL.
--
Please remember to select a correct answer and rate helpful posts
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide