[c-nsp] ASA 5505 multiple netblock functionality

Kaj Niemi kajtzu at basen.net
Thu Mar 5 06:46:58 EST 2009


Hi,


The default license allows for 2 unrestricted vlans + 1 restricted  
('dmz'). The restricted one cannot initiate traffic towards one of the  
other vlans.

# sh ver

Cisco Adaptive Security Appliance Software Version 8.0(4)16

...
Hardware:   ASA5505, 256 MB RAM, CPU Geode 500 MHz
...
Licensed features for this platform:
Maximum Physical Interfaces  : 8
VLANs                        : 3, DMZ Restricted
Inside Hosts                 : 10

To get around this restriction you would need to buy another license  
(Security Plus). As for 'multiple contexts' - the 5505 does not  
support any.

Refer to http://www.cisco.com/en/US/prod/collateral/vpndevc/ps6032/ps6094/ps6120/product_data_sheet0900aecd802930c5.html 
  for more info.



Kaj

On Mar 5, 2009, at 00:55, Jonathan Brashear wrote:

> Apologies if this has been addressed previously, I looked through  
> the last 12 months of c-nsp threads and didn't see this mentioned.
>
> There is some debate going on in my department over a particular  
> implementation and the 5505's capability to handle multiple  
> netblocks. A quick primer on the situation:
>
> Firewall IP: 1.2.3.4(publicly routable, but changing for cust privacy)
> Customer netblock: 5.6.7.0/26(it's publicly routable as well, I'm  
> changing for sake of cust privacy)
> Customer NAT: 192.168.0.0/24
>
>
> The /26 is statically routed to 1.2.3.4 from the router level, and  
> the customer wants to run NAT for their internal devices(db servers,  
> etc.). Our implementations guy states that the 5505 can't handle  
> assigning 3+ netblocks because they can't run multiple contexts. My  
> experience with the ASA firewalls is limited so I very well may be  
> wrong, but I believe the 5505s should be able to handle multiple  
> netblocks on the internal side of the firewall using something such  
> as sub-interfaces or similar. Can anyone help explain why this is or  
> isn't feasible?
>
> They don't need to be on the same physical interface necessarily, we  
> can run them to separate physical interfaces because this customer  
> is hairpinned behind a switch(and the servers are connected to said  
> switch instead of the firewall directly) so port density isn't a big  
> issue(to a point).
>
> We can assign a netblock to each internal port on the firewall if  
> need be - which seems to be the best solution from what I'm  
> uncovering - and that works as a reasonable alternative. It doesn't  
> scale very well obviously, but I don't think this customer is going  
> to chew through netblocks at a rate where this will be an issue.
>
> Network Engineer, JNCIS-M
>> 214-981-1954 (office)
>> 214-642-4075 (cell)
>> jbrashear at hq.speakeasy.net
> http://www.speakeasy.net
> _______________________________________________
> cisco-nsp mailing list  cisco-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/





Kaj
-- 
Kaj J. Niemi
<kajtzu at basen.net>
FI +358 45 63 12000
KSA +966 54 52 43277






More information about the cisco-nsp mailing list