<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Supporting two outside interfaces on ASA 5510 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/supporting-two-outside-interfaces-on-asa-5510/m-p/4542470#M1086922</link>
    <description>&lt;P&gt;Thank you Rob and everyone else helping.&amp;nbsp; I will try a couple of suggestions and ideas presented here and test.&amp;nbsp; Thank yo all again for your help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 31 Jan 2022 01:50:01 GMT</pubDate>
    <dc:creator>skhader</dc:creator>
    <dc:date>2022-01-31T01:50:01Z</dc:date>
    <item>
      <title>Supporting two outside interfaces on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/supporting-two-outside-interfaces-on-asa-5510/m-p/4541682#M1086861</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am planning to change my Internet provider, but it must be done in stages so in addition to my existing outside interface, I need to create a secondary outside interface to a different carrier.&amp;nbsp; But both interfaces need to NAT to an inside server.&amp;nbsp; Here is an example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif Outside1&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 1.1.1.1 255.255.255.192&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif Inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 100&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 192.x.x.x 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;nameif Outside2&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 2.2.2.2 255.255.255.192&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;static (Inside,Outside1) udp interface 5050 TMAPP 5050 netmask 255.255.255.255 &amp;nbsp;&lt;/P&gt;&lt;P&gt;static (Inside,Outside2) udp interface 5050 TMAPP 5050 netmask 255.255.255.255 &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture3.PNG" style="width: 358px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/142562iD3400B2835F1C208/image-size/large?v=v2&amp;amp;px=999" role="button" title="Capture3.PNG" alt="Capture3.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Can this be done?&lt;/P&gt;</description>
      <pubDate>Sat, 29 Jan 2022 02:33:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/supporting-two-outside-interfaces-on-asa-5510/m-p/4541682#M1086861</guid>
      <dc:creator>skhader</dc:creator>
      <dc:date>2022-01-29T02:33:06Z</dc:date>
    </item>
    <item>
      <title>Re: Supporting two outside interfaces on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/supporting-two-outside-interfaces-on-asa-5510/m-p/4541697#M1086863</link>
      <description>&lt;P&gt;yes that can be achieved, please look some examples&amp;nbsp; also for reference :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.practicalnetworking.net/stand-alone/cisco-asa-nat/" target="_blank"&gt;https://www.practicalnetworking.net/stand-alone/cisco-asa-nat/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 29 Jan 2022 04:27:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/supporting-two-outside-interfaces-on-asa-5510/m-p/4541697#M1086863</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-01-29T04:27:09Z</dc:date>
    </item>
    <item>
      <title>Re: Supporting two outside interfaces on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/supporting-two-outside-interfaces-on-asa-5510/m-p/4541756#M1086865</link>
      <description>&lt;P&gt;Are you aware that you are running an EOL security device with probably tons of security vulnerabilities that didn't get updated for probably seven years? Hopefully you are not working in a country where you are legally responsible for the damage you can cause by that.&lt;/P&gt;</description>
      <pubDate>Sat, 29 Jan 2022 10:33:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/supporting-two-outside-interfaces-on-asa-5510/m-p/4541756#M1086865</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2022-01-29T10:33:43Z</dc:date>
    </item>
    <item>
      <title>Re: Supporting two outside interfaces on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/supporting-two-outside-interfaces-on-asa-5510/m-p/4541819#M1086866</link>
      <description>&lt;P&gt;Yes that could be done, however, one of the big limitations you would run into would be how to route the outbound traffic across the two ISPs. The ASA does not support multiple default routes, which means that the outbound traffic would be routed via a single ISP, unless you configure a policy based routing to force part of the traffic to be routed via the ISP1, and other via the ISP2. Alternatively you could configure two specific routes and split the destination public IP ranges in two parts, one via ISP1 and another via ISP2.&lt;/P&gt;</description>
      <pubDate>Sat, 29 Jan 2022 11:38:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/supporting-two-outside-interfaces-on-asa-5510/m-p/4541819#M1086866</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2022-01-29T11:38:10Z</dc:date>
    </item>
    <item>
      <title>Re: Supporting two outside interfaces on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/supporting-two-outside-interfaces-on-asa-5510/m-p/4542104#M1086890</link>
      <description>&lt;P&gt;Hi Aref,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the reply and feedback.&amp;nbsp; Maybe I can clarify further.&amp;nbsp; The source is a mobile device connected to a mobile router (Mobile Gateway Router) configured and connected with a cellular SIM from Verizon.&amp;nbsp; The mobile device behind the MGR is configured to talk to a server inside the network via the public IP address of ISP1, so the destination configuration of the mobile device is the public IP address of ISP1 (for this example 1.1.1.1).&amp;nbsp; The communication path as shown in the diagram is from mobile device to the MGR to the cellular carrier to the Egress port on the firewall E 0/0 with the IP address provided by ISP 1 when it hits the Egress port of the firewall it gets NAT’d to the inside IP address of the inside server TMAPP (192.168.x.x) on port 5050 as shown in the example above.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The goal is to replace ISP1 with ISP2, but it will take some time to touch all the mobile devices and change the IP address destination to the new public IP address of ISP2 (for this example 2.2.2.2), therefore some mobile devices will be configured with destination of 1.1.1.1 and others will be configured with the new address 2.2.2.2 until all device configurations are changed, we will have to keep both ISPs. &amp;nbsp;All mobile devices will need to communicate to the same server with actual address of 192.168.x.x.&amp;nbsp; So, both outside ports E0/0 and E0/2 will have to NAT the traffic on the same port 5050 to the same server?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not sure if I complicated this more than it needs to be or it makes sense?&amp;nbsp; The best thing to do is a cold cutover and switch the ISP providers, but unfortunately it will take few weeks to re-configure all the mobile devices with the new IP address destinations and that is why I wanted to do this translation over time until all mobile devices are changed and then will drop ISP1.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Sat, 29 Jan 2022 22:04:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/supporting-two-outside-interfaces-on-asa-5510/m-p/4542104#M1086890</guid>
      <dc:creator>skhader</dc:creator>
      <dc:date>2022-01-29T22:04:50Z</dc:date>
    </item>
    <item>
      <title>Re: Supporting two outside interfaces on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/supporting-two-outside-interfaces-on-asa-5510/m-p/4542122#M1086891</link>
      <description>&lt;P&gt;You are welcome. I do still think this wouldn't work with the return traffic. The issue here is not much with the inbound traffic, that would work with the two NAT rules you pasted before, however, for the return traffic from the internal server to the outside word we need some sort of enforcement to take the same path in which the traffic was received. Thinking about it more I think the best option in this case would be to configure the mobile devices with a FQDN rather than an IP address, pointing the DNS resolution to ISP1, and once all the mobile devices are configured with that FQDN, you switch the DNS to point to ISP2.&lt;/P&gt;</description>
      <pubDate>Sun, 30 Jan 2022 00:30:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/supporting-two-outside-interfaces-on-asa-5510/m-p/4542122#M1086891</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2022-01-30T00:30:30Z</dc:date>
    </item>
    <item>
      <title>Re: Supporting two outside interfaces on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/supporting-two-outside-interfaces-on-asa-5510/m-p/4542133#M1086892</link>
      <description>&lt;P&gt;Hi Aref,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately, the mobile device I have does not support or work with FQDN, I have to use an IP address only.&amp;nbsp; I thought the ASA is smart enough to know where the traffic came from so the return traffic takes the same path. &amp;nbsp;Are there any other options? How about using dynamic or overloading NAT?&amp;nbsp; If there is no other option, maybe I will have to temporary use a second firewall but not a preference?&amp;nbsp; Thanks for the help.&lt;/P&gt;</description>
      <pubDate>Sun, 30 Jan 2022 01:45:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/supporting-two-outside-interfaces-on-asa-5510/m-p/4542133#M1086892</guid>
      <dc:creator>skhader</dc:creator>
      <dc:date>2022-01-30T01:45:23Z</dc:date>
    </item>
    <item>
      <title>Re: Supporting two outside interfaces on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/supporting-two-outside-interfaces-on-asa-5510/m-p/4542214#M1086895</link>
      <description>&lt;P&gt;I don't believe the ASA would have that functionality, but maybe&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;has some ideas.&lt;/P&gt;</description>
      <pubDate>Sun, 30 Jan 2022 08:45:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/supporting-two-outside-interfaces-on-asa-5510/m-p/4542214#M1086895</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2022-01-30T08:45:49Z</dc:date>
    </item>
    <item>
      <title>Re: Supporting two outside interfaces on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/supporting-two-outside-interfaces-on-asa-5510/m-p/4542221#M1086896</link>
      <description>&lt;P&gt;have you consider a defautl floating route. this could be easy way going forward&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;interface Ethernet0/0
 nameif Outside1
 security-level 0
 ip address 1.1.1.1 255.255.255.192
!
interface Ethernet0/1
 nameif Inside
 security-level 100
 ip address 192.x.x.x 255.255.255.0
!
interface Ethernet0/2
nameif Outside2
 security-level 0
 ip address 2.2.2.2 255.255.255.192
!
static (Inside,Outside1) udp interface 5050 TMAPP 5050 netmask 255.255.255.255  
!
static (Inside,Outside2) udp interface 5050 TMAPP 5050 netmask 255.255.255.255
!
route Outside1 0.0.0.0 0.0.0.0 next-hop
route Outside2 0.0.0.0 0.0.0.0 next-hop 10&lt;/PRE&gt;
&lt;P&gt;now if Ouside1 cutover the Outside2 route will kick in.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 30 Jan 2022 08:54:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/supporting-two-outside-interfaces-on-asa-5510/m-p/4542221#M1086896</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2022-01-30T08:54:40Z</dc:date>
    </item>
    <item>
      <title>Re: Supporting two outside interfaces on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/supporting-two-outside-interfaces-on-asa-5510/m-p/4542223#M1086897</link>
      <description>&lt;P&gt;ASA does have this function.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1305062"&gt;@skhader&lt;/a&gt; you could use this link &lt;A href="https://tayam-infra.net/cisco-asa-backup-isp-route-setup-using-sla-monitor/" target="_self"&gt;here&lt;/A&gt; the confiuration using the back interface with ip-sla. hope this will help you&lt;/P&gt;</description>
      <pubDate>Sun, 30 Jan 2022 09:04:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/supporting-two-outside-interfaces-on-asa-5510/m-p/4542223#M1086897</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2022-01-30T09:04:05Z</dc:date>
    </item>
    <item>
      <title>Re: Supporting two outside interfaces on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/supporting-two-outside-interfaces-on-asa-5510/m-p/4542224#M1086898</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1305062"&gt;@skhader&lt;/a&gt;&amp;nbsp;I agree with &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/284594"&gt;@Aref Alsouqi&lt;/a&gt; initial response, the ASA would only route the return traffic via the default route, there can only be one active and the ASA (afaik) is not intelligent to know which interface the traffic came in on. Failover of default routes I don't think will help.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Perhaps during cutover phase, if you know the source IP addresses define static routes via the other interface (ISP2), leaving the default route via ISP1 for the existing communication. Once the migration is complete, you can then change the default route via ISP2.&lt;/P&gt;</description>
      <pubDate>Sun, 30 Jan 2022 09:04:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/supporting-two-outside-interfaces-on-asa-5510/m-p/4542224#M1086898</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-01-30T09:04:38Z</dc:date>
    </item>
    <item>
      <title>Re: Supporting two outside interfaces on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/supporting-two-outside-interfaces-on-asa-5510/m-p/4542227#M1086899</link>
      <description>&lt;P&gt;Yes the ASA has the SLA monitor and tracking functionality but not to return the traffic out of the interface it was received on.&lt;/P&gt;</description>
      <pubDate>Sun, 30 Jan 2022 09:13:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/supporting-two-outside-interfaces-on-asa-5510/m-p/4542227#M1086899</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2022-01-30T09:13:06Z</dc:date>
    </item>
    <item>
      <title>Re: Supporting two outside interfaces on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/supporting-two-outside-interfaces-on-asa-5510/m-p/4542470#M1086922</link>
      <description>&lt;P&gt;Thank you Rob and everyone else helping.&amp;nbsp; I will try a couple of suggestions and ideas presented here and test.&amp;nbsp; Thank yo all again for your help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 31 Jan 2022 01:50:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/supporting-two-outside-interfaces-on-asa-5510/m-p/4542470#M1086922</guid>
      <dc:creator>skhader</dc:creator>
      <dc:date>2022-01-31T01:50:01Z</dc:date>
    </item>
  </channel>
</rss>

