Avatar of pdsmicro
pdsmicro

asked on 

Two Subnet behind PIX/ASA

we have pix and our subnet ID is 192.168.1.0 .
the pix directly connected to internet.
there is no router behind pix.
all the PCs are getting ip from DHCP and works fine.
i now want another subnet 192.168.2.0 for few PCs instead of using the current subnet id.
is it possible to do that  whithout any router behind the PIX?
if i add this line at the pix.
i added an enry below
route inside 192.168.2.0 255.255.255.0 192.168.1.1 1
and the pc did not go to internet when i put manual ip 192.168.2.100, sunbet 255.255.255.0 DG 192.168.1.1.
thank you for your help in advance.
Anti-Virus AppsNetworking ProtocolsNetwork Security

Avatar of undefined
Last Comment
pdsmicro
SOLUTION
Avatar of Ken Boone
Ken Boone
Flag of United States of America image

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
SOLUTION
Avatar of Cyclops3590
Cyclops3590
Flag of United States of America image

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
ASKER CERTIFIED SOLUTION
Avatar of Ken Boone
Ken Boone
Flag of United States of America image

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
Avatar of pdsmicro
pdsmicro

ASKER

thank you for your help.
Anti-Virus Apps
Anti-Virus Apps

Anti-virus software was originally developed to detect and remove computer viruses. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious layered service providers (LSPs), dialers, fraud tools, adware and spyware. Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity theft (privacy), online banking attacks, social engineering techniques, Advanced Persistent Threat (APT), botnets and DDoS attacks.

23K
Questions
--
Followers
--
Top Experts
Get a personalized solution from industry experts
Ask the experts
Read over 600 more reviews

TRUSTED BY

IBM logoIntel logoMicrosoft logoUbisoft logoSAP logo
Qualcomm logoCitrix Systems logoWorkday logoErnst & Young logo
High performer badgeUsers love us badge
LinkedIn logoFacebook logoX logoInstagram logoTikTok logoYouTube logo