<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Triple WAN 1/2/3 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/triple-wan-1-2-3/m-p/4657571#M1092160</link>
    <description>&lt;P&gt;See , The problem is we don't have any Reverse Proxy for our web servers&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;each (2) web app is hosted each Static Public IP and open the port 443&amp;nbsp;&lt;/P&gt;&lt;P&gt;the next web server APP is ready to host so we need to use another public IP .&lt;/P&gt;&lt;P&gt;so the Lan Traffic is mostly passed in WAN1 but the Web access is coming through WAN1 and WAN2 no expecting to next WAN3&lt;/P&gt;&lt;P&gt;so I am seeking the advise PBR configuration in FMC with appropriate NAT/PAT for WEB apps&amp;nbsp;&lt;/P&gt;&lt;P&gt;what I can do please advise&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 26 Jul 2022 13:22:05 GMT</pubDate>
    <dc:creator>Sharath Rajan</dc:creator>
    <dc:date>2022-07-26T13:22:05Z</dc:date>
    <item>
      <title>Triple WAN 1/2/3</title>
      <link>https://community.cisco.com/t5/network-security/triple-wan-1-2-3/m-p/4657302#M1092148</link>
      <description>&lt;P&gt;Dear Experts&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kindly seeking your advises because of that I have running SonicWALL firewall with three ISP WAN connections from Same ISP&amp;nbsp;&lt;/P&gt;&lt;P&gt;and the migration process is going on from SonicWALL to FMC 7.0/1200 FTD&lt;/P&gt;&lt;P&gt;how to configure the 3 WAN in FMC/FTD 2 wan public IP is opened 443 for sum web tires apps&amp;nbsp;&lt;/P&gt;&lt;P&gt;kindly help me to get it successful configuration in CISCO&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jul 2022 06:11:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/triple-wan-1-2-3/m-p/4657302#M1092148</guid>
      <dc:creator>Sharath Rajan</dc:creator>
      <dc:date>2022-07-26T06:11:00Z</dc:date>
    </item>
    <item>
      <title>Re: Triple WAN 1/2/3</title>
      <link>https://community.cisco.com/t5/network-security/triple-wan-1-2-3/m-p/4657541#M1092155</link>
      <description>&lt;P&gt;Are the "three ISP WAN connections from Same ISP" in different subnets?&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jul 2022 12:43:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/triple-wan-1-2-3/m-p/4657541#M1092155</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-07-26T12:43:12Z</dc:date>
    </item>
    <item>
      <title>Re: Triple WAN 1/2/3</title>
      <link>https://community.cisco.com/t5/network-security/triple-wan-1-2-3/m-p/4657549#M1092156</link>
      <description>Hello&lt;BR /&gt;&lt;BR /&gt;There is WAN 1 and 2 is 255.255.255.252&lt;BR /&gt;&lt;BR /&gt;WAN 3 is 255.255.255.0 subnets are running now in&lt;BR /&gt;SonicWALL from same ISP&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 26 Jul 2022 12:52:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/triple-wan-1-2-3/m-p/4657549#M1092156</guid>
      <dc:creator>Sharath Rajan</dc:creator>
      <dc:date>2022-07-26T12:52:53Z</dc:date>
    </item>
    <item>
      <title>Re: Triple WAN 1/2/3</title>
      <link>https://community.cisco.com/t5/network-security/triple-wan-1-2-3/m-p/4657562#M1092159</link>
      <description>&lt;P&gt;FTD (and ASA) firewalls do not have the same capabilities as SonicWall does with respect to WAN interfaces. An FTD firewall generally has only a single external default route. While you can use policy-based routing to setup services on a second or third WAN interface, it requires that you know the remote addresses to be included in advance. You cannot, for example, say "Use the /24 for everything except web servers A and B which use WAN 1 and WAN 2 interfaces."&lt;/P&gt;
&lt;P&gt;However, since you have a /24 why not just use it for all traffic?&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jul 2022 13:04:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/triple-wan-1-2-3/m-p/4657562#M1092159</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-07-26T13:04:25Z</dc:date>
    </item>
    <item>
      <title>Re: Triple WAN 1/2/3</title>
      <link>https://community.cisco.com/t5/network-security/triple-wan-1-2-3/m-p/4657571#M1092160</link>
      <description>&lt;P&gt;See , The problem is we don't have any Reverse Proxy for our web servers&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;each (2) web app is hosted each Static Public IP and open the port 443&amp;nbsp;&lt;/P&gt;&lt;P&gt;the next web server APP is ready to host so we need to use another public IP .&lt;/P&gt;&lt;P&gt;so the Lan Traffic is mostly passed in WAN1 but the Web access is coming through WAN1 and WAN2 no expecting to next WAN3&lt;/P&gt;&lt;P&gt;so I am seeking the advise PBR configuration in FMC with appropriate NAT/PAT for WEB apps&amp;nbsp;&lt;/P&gt;&lt;P&gt;what I can do please advise&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jul 2022 13:22:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/triple-wan-1-2-3/m-p/4657571#M1092160</guid>
      <dc:creator>Sharath Rajan</dc:creator>
      <dc:date>2022-07-26T13:22:05Z</dc:date>
    </item>
    <item>
      <title>Re: Triple WAN 1/2/3</title>
      <link>https://community.cisco.com/t5/network-security/triple-wan-1-2-3/m-p/4657605#M1092165</link>
      <description>&lt;P&gt;You could try to use ASA/FTD NAT-divert feature, it works similarly to PBR and sometimes this messes up with people but in your case it could even work in your favor&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;3 default routes with different Administrative distances like 1,20,30 (something you may do anyway and stick an IP SLA on the first two WANs since you will want redundancy for your Internet egress)&lt;/LI&gt;&lt;LI&gt;configure your Internet WAN either in 3 different ZONES or 1 ZONE and 3 different interface groups (I'd recommend this last one) and of course a zone for your INSIDE (or DMZ zone where your webservers are...either 2 zones doesn't matter)&lt;/LI&gt;&lt;LI&gt;configure OUTSIDE (zone or interface group) to INSIDE (or DMZ...) NAT, one for each Webserver you want to publish considering the specific interfaces where your public IP for each webserver is&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;This should allow your traffic to go as you expect but for regular egress traffic only your first interface will be serving egress Internet traffic.&lt;/P&gt;&lt;P&gt;NOTE:&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;#1 you need because NAT performs a route check, it fails if no route exists&lt;/LI&gt;&lt;LI&gt;#2 you need because NAT in FTD is either selected on ZONE pairs or interface group pairs (that exists solely for this and IP SLA purpose I believe)&lt;/LI&gt;&lt;LI&gt;#3 actually should do the trick ad NAT in ASA (and FTD by evolution) code manipulates the traffic flow significantly, hence the saying that a &lt;EM&gt;Firewall is not a router&lt;/EM&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;One other option that comes to mind, but I haven't tried yet is to use VRF-lite context with leaking, if anyone ever tried that it would be interesting to know if that would work here&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jul 2022 21:16:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/triple-wan-1-2-3/m-p/4657605#M1092165</guid>
      <dc:creator>giovanni.augusto</dc:creator>
      <dc:date>2022-07-27T21:16:14Z</dc:date>
    </item>
    <item>
      <title>Re: Triple WAN 1/2/3</title>
      <link>https://community.cisco.com/t5/network-security/triple-wan-1-2-3/m-p/4658625#M1092203</link>
      <description>&lt;P&gt;Hello These all steps do you think will accept FMC because my firepower is registered under FMC&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can I configure 3 wan under PBR/SLA than nat divert .&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jul 2022 14:55:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/triple-wan-1-2-3/m-p/4658625#M1092203</guid>
      <dc:creator>Sharath Rajan</dc:creator>
      <dc:date>2022-07-27T14:55:13Z</dc:date>
    </item>
  </channel>
</rss>

