We have one Cisco ASA 5510 model connected with ISP router where-on the public IP pool is 220.127.116.11/24. 18.104.22.168 IP Address is assigned to ISP router interface and 22.214.171.124 IP Address is assigned to ASA outside interface.
We have now one additional router and we want to use the router to make a VPN connection which is connected with firewall second interface and router interface IP is 126.96.36.199. Now i want to do one thing that firewall, ISP router and router will communicate with each other, how it's possible. I don't have any additional device to place anywhere.
We need to achieve this among only there three devices.
I am not sure of the existing configuration on the firewall, but you might wanna look into setting the ASA in transparent mode. Transparent mode ASA running version 8.0.2 and above support NAT and PAT.
This way you could connect the ISP router to the ASA, and the ASA to the VPN router, with all of them having the same subnet ip address. If the ASA is currently in production, in routed mode, then you will have to schedule a downtime to set this all up.
The easier and better way, would be to have a hub or a switch, to which all 3 devices connect.
Hope this helps.
P.S.: Please mark this question as answered if it has been resolved. Do rate helpful posts. Thanks.
The purpose of this document is to demonstrate how ISE authenticate / authorize a user that uses a smart card (PIN + Certificate) and password mechanism to login their system. This document describes the components used for this setup, configuration of IS...
For all versions of the Email Security Appliance (ESA) and Security Management Appliance (SMA), some Secure Sockets Link (SSL) certificates issued from the QuoVadis root certificate authority (CA) trust chain before 2021-03-31 cannot b...
Automation and programmability for networking and security are increasingly important topics. Every release since ISE 1.2 has included new REST API capabilities to better automate and integrate ISE with the rest of your network, appli...
The latest iteration (v2.3.4) of the Cisco Secure Firewall Migration Tool adds public beta support for S2S VPN migrations from ASA:
Policy-based (crypto map) Pre-Shared key authentication type VPN configuration to Firepower Management Center
Cisco Defense Orchestrator (CDO) is a cloud-based, multi-device manager that manages security products like Adaptive Security Appliance (ASA), Firepower Threat Defense next-generation firewall, and Meraki devices, to name a few.
We make improvement...