I will be moving our ASA 5520 firewall/VPN appliance to a new location in our network. In the near future I would like to split the firewall and VPN functions to two seperate ASA 5520's, but for now I am keeping them together. My question is, I would rather put an RFC 1918 IP Address on the inside and outside ASA interfaces? The interfaces connect in and out of the same router (aka firewall on a stick) and the router will be doing the forwarding and receiving packets, just simple static routes for packets to be sent in then back out of the firewall/VPN box. The way the ASA is currently deployed, it has public IP Addresses assigned to the outside interface in order for off site users to remote VPN in to our enterprise network (i.e. webvpn.college.edu = 100.100.100.1 public IP). Is there anyway to configure the WebVpn URL's for a public IP Address, but leave the outside interfaces non-routables?
I need to add, the 100.100.100.1 (not the real address) public IP Address is the one assigned to the outside interface of our ASA and is the same address that equals to http://webvpn.college.edu.