<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Hosting a web service with Dual ISP connections on ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/hosting-a-web-service-with-dual-isp-connections-on-asa/m-p/3689807#M13894</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;I found a possible solution to this problem without disabling uRPF check.&amp;nbsp; However, it cannot be used in our case (see below).&amp;nbsp; Still sharing so that this may be useful for anyone having a similar problem.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The solution could be to configure a Traffic Zone, say, 'Internet'.&amp;nbsp; Put both ISP interfaces into this zone.&amp;nbsp; It will then allow traffic to enter or leave from any interface within the zone.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From ASDM GUI:&lt;/P&gt;
&lt;P&gt;"You can assign multiple interfaces to a traffic zone, which lets traffic from an existing flow exit or enter the ASA on any interface within the zone."&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However, within the documentation, it warns that .....&lt;/P&gt;
&lt;P&gt;"Do not configure other services (such as VPN or Botnet Traffic Filter) for interfaces in a traffic zone; they may not function or scale as expected."&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This in my case will leave this solution useless as we do host VPNs on the interfaces I was planning to put in this zone.&amp;nbsp; I guess with further configuration, a new interface could be configured in this zone and all non-vpn services could be made part of this as all Access Rules, NAT, Service Rules (other than QoS traffic policing), and Routing are supported with zones.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any thoughts from any one?&lt;/P&gt;</description>
    <pubDate>Thu, 16 Aug 2018 15:42:38 GMT</pubDate>
    <dc:creator>magurwara</dc:creator>
    <dc:date>2018-08-16T15:42:38Z</dc:date>
    <item>
      <title>Hosting a web service with Dual ISP connections on ASA</title>
      <link>https://community.cisco.com/t5/network-security/hosting-a-web-service-with-dual-isp-connections-on-asa/m-p/3683896#M13888</link>
      <description>&lt;P&gt;I am getting deny reverse path check errors when trying to host a TCP service on the firewall that has two ISP links.&lt;/P&gt;
&lt;P&gt;Trying to host the service on ISP-2 IP range while the default route on the firewall is through ISP-1.&lt;/P&gt;
&lt;P&gt;Using route-map to route the traffic out through ISP-2 works fine which I thought would be enough for hosting the service as well since the incoming requests should be coming in via ISP-2's link. &amp;nbsp;However, the incoming request to the hosted service fails due to the reverse path check failure.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there a workaround? Further configurations? Or is there no way to make this work without disabling reverse path check?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:04:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hosting-a-web-service-with-dual-isp-connections-on-asa/m-p/3683896#M13888</guid>
      <dc:creator>magurwara</dc:creator>
      <dc:date>2020-02-21T16:04:26Z</dc:date>
    </item>
    <item>
      <title>Re: Hosting a web service with Dual ISP connections on ASA</title>
      <link>https://community.cisco.com/t5/network-security/hosting-a-web-service-with-dual-isp-connections-on-asa/m-p/3683916#M13891</link>
      <description>The command 'no ip verify reverse-path interface IF-NAME' disables uRPF&lt;BR /&gt;</description>
      <pubDate>Wed, 08 Aug 2018 08:27:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hosting-a-web-service-with-dual-isp-connections-on-asa/m-p/3683916#M13891</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2018-08-08T08:27:33Z</dc:date>
    </item>
    <item>
      <title>Re: Hosting a web service with Dual ISP connections on ASA</title>
      <link>https://community.cisco.com/t5/network-security/hosting-a-web-service-with-dual-isp-connections-on-asa/m-p/3684020#M13892</link>
      <description>&lt;P&gt;Thanks Mohammed but disabling reverse path check is what I don't want to do.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However, I am wondering whether it is serving a purpose in this scenario.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Aug 2018 11:39:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hosting-a-web-service-with-dual-isp-connections-on-asa/m-p/3684020#M13892</guid>
      <dc:creator>magurwara</dc:creator>
      <dc:date>2018-08-08T11:39:02Z</dc:date>
    </item>
    <item>
      <title>Re: Hosting a web service with Dual ISP connections on ASA</title>
      <link>https://community.cisco.com/t5/network-security/hosting-a-web-service-with-dual-isp-connections-on-asa/m-p/3689807#M13894</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;I found a possible solution to this problem without disabling uRPF check.&amp;nbsp; However, it cannot be used in our case (see below).&amp;nbsp; Still sharing so that this may be useful for anyone having a similar problem.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The solution could be to configure a Traffic Zone, say, 'Internet'.&amp;nbsp; Put both ISP interfaces into this zone.&amp;nbsp; It will then allow traffic to enter or leave from any interface within the zone.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From ASDM GUI:&lt;/P&gt;
&lt;P&gt;"You can assign multiple interfaces to a traffic zone, which lets traffic from an existing flow exit or enter the ASA on any interface within the zone."&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However, within the documentation, it warns that .....&lt;/P&gt;
&lt;P&gt;"Do not configure other services (such as VPN or Botnet Traffic Filter) for interfaces in a traffic zone; they may not function or scale as expected."&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This in my case will leave this solution useless as we do host VPNs on the interfaces I was planning to put in this zone.&amp;nbsp; I guess with further configuration, a new interface could be configured in this zone and all non-vpn services could be made part of this as all Access Rules, NAT, Service Rules (other than QoS traffic policing), and Routing are supported with zones.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any thoughts from any one?&lt;/P&gt;</description>
      <pubDate>Thu, 16 Aug 2018 15:42:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hosting-a-web-service-with-dual-isp-connections-on-asa/m-p/3689807#M13894</guid>
      <dc:creator>magurwara</dc:creator>
      <dc:date>2018-08-16T15:42:38Z</dc:date>
    </item>
  </channel>
</rss>

