Firewall – Can Cisco ASA be a firewall for another public IP

cisco-asafirewall

New to Cisco here, and wanting to know if an idea is possible with my ASA 5506-X (version 9.5).

The ASA has a public/external IP that (for example) is z.z.z.3. Currently, it is performing SNAT for my internal LAN, handling site-to-site VPNs, etc. (I believe in Cisco terms it's called PAT.)

I have another machine that we'll call Host X. It also has a public IP (z.z.z.4) on the same subnet as the ASA. The diagram below shows how things are currently set up.

Network diagram showing router connected to ASA and "Host X"

My question is:
Can I have the ASA be a firewall for Host X with the restrictions below?

  • Host X must keep it's public IP (I have no admin access to Host X)
  • I have additional empty physical interfaces on the ASA.
  • The ASA must be able to continue doing source NAT for the internal LAN so they have access to the Internet.
  • The ASA must keep it's current external IP address so it can continue being a terminating point for the site-to-site VPNs (not pictured).

That way I can lock down access to Host X with ASA access-lists rather than rely on Host X's firewall. I know this sort of thing would be easy with Linux, but I can't quite wrap my head around how the ASA should be configured.

Best Answer

Yes, ASA can be firewall for another public IP.

Write a specific route for host_x on the router pointing towards firewall and similarly change the default gateway on host_x to point to the firewall IP z.z.z.3

Router(config)# ip route z.z.z.4 255.255.255.255 z.z.z.3

Also, you need to enable the command same-security-level intra-interface traffic command on the firewall.

This way, you can control the traffic going to and fro by the access-list defined on interface connecting to the switch on the firewall.

I know changing default gateway in the host_x requires admin access. I think all the scenarios require changing the default gateway on host_x.