<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: two outside interface for two inside VLAN network using one  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/two-outside-interface-for-two-inside-vlan-network-using-one-asa/m-p/685276#M1035432</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, you can only have 1 *real* default gateway, so no, I don't think you can do that.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But if the traffic is always initiated from the outside and is stateful, (ie tcp), then you can do that by creating 2 default routes with different metrics and doing static NAT.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 23 Nov 2006 09:01:35 GMT</pubDate>
    <dc:creator>mlowery</dc:creator>
    <dc:date>2006-11-23T09:01:35Z</dc:date>
    <item>
      <title>two outside interface for two inside VLAN network using one ASA Box</title>
      <link>https://community.cisco.com/t5/network-security/two-outside-interface-for-two-inside-vlan-network-using-one-asa/m-p/685275#M1035431</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to use the extra port of the ASA5510 with base license upgraded to enhanced license to for a new OUTSIDE segment network that will NAT to a new internal VLAN network, the 3rd interface of the ASA is running trunk.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Say 10.10.X.X(new internal VLAN) translates to the new OUTSIDE interface ( with network 192.11.X.X&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any links how to do this in ADSM? or commandline?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 08:58:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-outside-interface-for-two-inside-vlan-network-using-one-asa/m-p/685275#M1035431</guid>
      <dc:creator>r.docuyanan</dc:creator>
      <dc:date>2019-03-11T08:58:01Z</dc:date>
    </item>
    <item>
      <title>Re: two outside interface for two inside VLAN network using one</title>
      <link>https://community.cisco.com/t5/network-security/two-outside-interface-for-two-inside-vlan-network-using-one-asa/m-p/685276#M1035432</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, you can only have 1 *real* default gateway, so no, I don't think you can do that.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But if the traffic is always initiated from the outside and is stateful, (ie tcp), then you can do that by creating 2 default routes with different metrics and doing static NAT.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Nov 2006 09:01:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-outside-interface-for-two-inside-vlan-network-using-one-asa/m-p/685276#M1035432</guid>
      <dc:creator>mlowery</dc:creator>
      <dc:date>2006-11-23T09:01:35Z</dc:date>
    </item>
  </channel>
</rss>

