Cisco ASA - Combination of PUBLIC and LOCAL IP within one ASA 5510.
We configured ASA5510 like this:
Int0 – outside connected to modem
Int1 – inside connected to internal switch
IP Route is managed by configuring PPPOE within ASA
Our inside has IP 188.8.131.52/29
Our outside has IP 184.108.40.206
Obviously, we could use any of the static public IP address within range /29 connected to internal interface int1 which they are all consider behind Firewall and we could manage to open port or services to any. (e.g. if we connect application mail server to one static IP facing inside network like 220.127.116.11, we could manage to open SMTP ports in/out and or SSH to trusted IP)
What we need now is to have another range of internal IP address (i.e. class C like 10.10.10.1/24) in 3rd interface ASA (int2) and they have routed to one of the public IP within int1 (inside).
For instant, we want to have 10.10.10.1/24 routed to 18.104.22.168 and also have an opportunity to do apply firewall rules and NATing from external to internal (i.e. assume we set web-server on IP 10.10.10.195, we like to open port HTTP and HTTPS to public while external IP would be 22.214.171.124)
Clearly this is possible by adding another router – but we want to use same ASA5510 for both of these requirements.
If anyone done this before or have some solution, we would apricated the help and feedback.
With the enhancements in ISE 3.0 for integrating with Azure AD via SAML IdP, it is now possible to leverage Microsoft Single Sign-On for multiple ISE Portals (for example Sponsor and Guest/BYOD Portals).
At the time of this writing, ISE cann...
With the enhancements in ISE 3.0 for integrating with Azure AD via SAML IdP, it is now possible to create a BYOD Flow to provide Wireless network access using an employee’s Azure AD credentials.
The table below shows the whole Cisco Security solutions + Splunk integrations add-ons. Kindly let me know if I have missed some add-ons or if there are any new updates. Thank you!
Hope this will be helpful for everyone who is looking for Splunk in...
A python based script to generate report if there are disabled rules under an Access Control Policy and an option to delete those rules in bulk.
Step 1 Download the script on PCStep 2 Make sure python3 is installed on PC and have reach...
A python based script to generate report if there are double logging on FMC ACP (logging at beginning and end), having rule action "Allow" or "Trust". (Option1 )
Also, the logging at the begging will be disabled if logging is detected for both beginning ...