cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
600
Views
5
Helpful
3
Replies

Router with Firewall NAT question

scott.bridges
Level 1
Level 1

Hello,

Attached is a rough drawing of the topology I'm asking about.

Dark cloud is ISP, Bridge looking device is Cable Modem acting in Bridged mode.  Router's Fa0/0 (1800 Rtr) is getting my residential IP from ISP via DHCP.

Will I need to NAT on the Firewall?  If not, what would the configuration look like concerning transit traffic from inside to outside?  My goal is just for the Router to be a bump in the wire that reports Netflow to a device in the LAN.  All my separate subnets and security will be done on the ASA.

 

Any advice is appreciated.

1 Accepted Solution

Accepted Solutions

You can keep the /30 if you want to run the firewall in routed mode. You can also run the firewall in layer-2 (transparent) mode and use one ip in the 192.168.8.0/24 subnet for both inside and outside with 2 different vlans.

http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/fwmode.html

HTH

 

 

View solution in original post

3 Replies 3

Reza Sharifi
Hall of Fame
Hall of Fame

Hi,

Looking at your diagram it appears the firewall does not have any public IPs.  If you want the firewall to do the NAT for you the outside interface of it needs to have a public IP, if not you can NAT on the router.

HTH

Reza,

Thanks for the tip.

After some Google'ing, looks like I can apply the following config on the router:

access-list 1 permit 192.168.8.0 255.255.255.0
ip nat inside source list 1 FastEthernet0/0 overload
interface FastEthernet0/1
 ip nat inside
interface FastEthernet0/0
 ip nat outside

Now the question is:  Do I keep the current /30 between the Router/ASA, or does that need to be in the LAN /24?

Thanks again

You can keep the /30 if you want to run the firewall in routed mode. You can also run the firewall in layer-2 (transparent) mode and use one ip in the 192.168.8.0/24 subnet for both inside and outside with 2 different vlans.

http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/fwmode.html

HTH