Hi Mansoor, my question, why does un-trusted network have to dictate what IP address you should use in your FW eth2, in most cases un-trusted in your scenario would be consider a DMZ point in your firewall one that you have full admin control, you should configure eth2 with a private subnet of your choice with a /24 and give the un-trusted entity an IP address from the /24 subnet for their Fe0/0 router interface.
In any case, in your scenario, for example un-trusted network wants to connect to trusted server 192.168.100.18 for RDP connection in your inside LAN, you give trusted server 192.168.100.18 a static nat address from the 10.150.39.x private ip block for inbound access, say you have allocated 10.150.39.40 for the NAT address translation of your inside trusted server.
access-list eth2_access_in permit tcp any host 10.150.30.40 eq 3380
access-group eth2_access_in in interface eth2
For failover IP you need to allocate an IP address from the same 10.150.30.x IP subnet and use it for failover Ip address , go over this document for an overview of active/standby interface configurations.. if you have any questions please ask.
2. I have to utilized the two IPs given by the untrust network personal.
3. Now how to utilize the two IPs is real issue as if one will be given to router interface and other will be given to firewall than I will not get the IP for Standby firewall as well as the IP for NAT.
Sorry to bother you again. If you look again at my network setup What IP Address should be given to Router Interface fa0/0? What now i understand from your advice is that i will give the two IPs to eth2 interface.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :